Essential Guide

Browse Sections

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

IT security tutorial: Channel partner tips for new tech

Last updated:February 2016

Editor's note

With the rise of technologies such as software-defined networking, hyper-converged infrastructure, and the Internet of Things, customers are facing new security vulnerabilities as the attack surface of their IT environment shifts in dramatic ways.

In this IT security tutorial, we conducted interviews with several key industry executives who discussed how these emerging technologies are changing the security landscape. Experts explained the vulnerabilities of each technology and offered strategies for preventing attacks.

Click through  this IT security tutorial to learn about important security weaknesses and get tips on how to strengthen a customer's security posture.

1Hyper-converged infrastructure

While making management easier, the convergence of compute, network and storage produces a wide attack surface. And that's not the only vulnerability of hyper-converged systems. A root compromise anywhere in HCI provides complete and unfettered access to everything in that system.

2The Internet of Things

Connected environments introduce a new set of security issues to overcome. IoT increases the number of vulnerable endpoints, many of which were never designed to be secured in connected environments, and few standards govern how objects should connect to networks.

3Glossary

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close