With the rise of technologies such as software-defined networking, hyper-converged infrastructure, and the Internet of Things, customers are facing new security vulnerabilities as the attack surface of their IT environment shifts in dramatic ways.
In this IT security tutorial, we conducted interviews with several key industry executives who discussed how these emerging technologies are changing the security landscape. Experts explained the vulnerabilities of each technology and offered strategies for preventing attacks.
Click through this IT security tutorial to learn about important security weaknesses and get tips on how to strengthen a customer's security posture.
1SDN security tutorial-
The technological innovations that make SDN exceptional also make it vulnerable to attacks. In this IT security tutorial, experts weigh in on inherent risks of SDN, such as those resulting from the separation of the control and data planes, and the security gaps introduced by third-party vendors.
2HCI security tutorial-
While making management easier, the convergence of compute, network and storage produces a wide attack surface. And that's not the only vulnerability of hyper-converged systems. A root compromise anywhere in HCI provides complete and unfettered access to everything in that system.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
3IoT security tutorial-
The Internet of Things
Connected environments introduce a new set of security issues to overcome. IoT increases the number of vulnerable endpoints, many of which were never designed to be secured in connected environments, and few standards govern how objects should connect to networks.