BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
SDN security initiatives
SDN introduces a number of vulnerabilities that attackers can use to breach your customers' networks. Read Now
With the rise of technologies such as software-defined networking, hyper-converged infrastructure, and the Internet of Things, customers are facing new security vulnerabilities as the attack surface of their IT environment shifts in dramatic ways.
In this IT security tutorial, we conducted interviews with several key industry executives who discussed how these emerging technologies are changing the security landscape. Experts explained the vulnerabilities of each technology and offered strategies for preventing attacks.
Click through this IT security tutorial to learn about important security weaknesses and get tips on how to strengthen a customer's security posture.
While making management easier, the convergence of compute, network and storage produces a wide attack surface. And that's not the only vulnerability of hyper-converged systems. A root compromise anywhere in HCI provides complete and unfettered access to everything in that system.
2The Internet of Things
Connected environments introduce a new set of security issues to overcome. IoT increases the number of vulnerable endpoints, many of which were never designed to be secured in connected environments, and few standards govern how objects should connect to networks.
Software-defined networking (SDN) is a network architecture that aims to make data center networks agile and flexible. Read Now
Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware. Read Now
Internet of Things
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Read Now