SlideShare a Scribd company logo
1 of 4
Download to read offline
VIRTUALISATION 
18 Autumn 2014
Autumn 2014 19 
The internet may have given us 24/7 
connectivity, but it has thrown up a slew of 
security issues, resulting in the need for 
more advanced offsetting technology, and 
financial institutions are at the vanguard of 
efforts to protect themselves. 
Security breaches have far-reaching consequences 
throughout financial services because of the nature of 
the information they hold – be it consumers’ private 
information or details of corporate assets. 
Security providers face a tough challenge as they 
must deliver relatively easy access to services while 
simultaneously serving the needs of internal 
stakeholders when implementing security. Securing 
these services is a difficult proposition and tradeoffs 
are often made, leaving the networks exposed and 
vulnerable to attack. 
The network server is the number one target of all 
cyber attacks because it is where all crucial client and 
institutional data are stored. In multi-tenant cloud 
environments, financial institutions are also looking 
to protect the network server by providing the ability 
Digital security providers are taking on a 
military approach in defending network security 
as more companies suffer from cyber attacks, 
writes Bruce Tolley of Solarflare Communications 
Strategic 
defences
VIRTUALISATION 
20 Autumn 2014 
to isolate customer traffic and 
services, and mitigating 
against internal attacks and threats, 
misconfigured equipment and misbehaving 
applications. 
A common saying in security is that the bad guy 
only has to be lucky once, while those protecting 
corporate and customer assets have to be lucky 
every time. 
As a result, we are seeing a big push towards 
encryption from end to end. Some companies are 
starting to require every hard drive is encrypted, 
making it almost impossible for potential cyber 
bandits to access key data. 
There is also growing demand for identity 
management. IT today is about providing the right 
(billable) applications and services to the right people at 
the right time and at the right level of service. Cloud 
service providers also want to ensure they know the 
customer on the other end and that all entities that are 
on the network, whether they be virtual, bare metal, or 
in the cloud, are authenticated to be legitimate if not 
assigned specific policies and access rights. 
Military strategies 
Digital security practitioners often borrow from 
military strategies that have proven effective in 
defending valuable assets in the past. One common 
strategy is called ‘defence in depth’, or layered 
defences. Similar to how castles were built with 
cleared land, moats and strong high walls, digital 
security practitioners build networks that consist of 
firewalls at the outermost perimeter, routers with 
access lists, intrusion detection and host antivirus 
as you move further into the network. This 
approach assumes that the network will be 
breached, but the layers of defence will cause the 
attack to slow down, lose momentum and increase 
the chance that the attack becomes visible and 
stopped. 
These are huge advances in technology as, 
traditionally, host systems have been left out of the 
VM 
Tenant A 
Hypervisor 
traffic (storage/ 
management) 
Adaptor Hypervisor 
Filter 
PF 
VM 
Tenant B 
Filter 
PF 
VM 
Tenant B 
Filter 
PF 
PF PF PF 
VNIC VNIC PF 
10G Port 
VNIC VNIC VNIC 
NIC SWITCH NIC SWITCH NIC SWITCH 
Policing and filtering for 
virtualised servers and 
clouds 
Each tenant can be assigned 
a virtual machine or virtual 
server (VM) 
Policing and filtering can be 
executed at each virtual 
server 
Protects servers from attacks 
that get past perimeter 
defences 
Separates and isolates by 
customers and by traffic type 
Mitigates against adverse 
performance impacts from 
badly behaving applications 
or misconfigured machines 
Source: SolarFlare 
Bruce Tolley, vice 
president Solarflare 
Communications.
VIRTUALISATION 
21 
Autumn 2014 
network ‘defence in depth’ paradigm due to the computational cost, technology tradeoffs required to deploy robust security and the monitoring of solutions on production systems at the edge of the network. Host systems can now perform high speed packet capture, filtering, bridging and denial of service defences, due to recent progress in computing power and software. 
The industry is now organising around various infrastructure as a service (IaaS) cloud architectures such as Red Hat OpenStack and Apache CloudStack. The big server manufacturers are also promoting OpenStack, delivering to IT architects a way to build, manage and provision private and multi-tenant clouds from the network. 
Virtualisation 
Security professionals need to leverage these host system capabilities in a virtualised environment. Virtualisation enables IT managers to consolidate workloads on fewer physical servers increasing the utilisation of each server and creating a more flexible, efficient and dynamic data centre environment. As a result, virtualisation can lead to lower capital and ongoing operating costs. 
However, cloud networking and server virtualisation today require more than just the ability to support server consolidation. To meet customer requirements, cloud and virtualisation solutions must scale in performance, protect data integrity and support service level agreements, all while supporting the broad set of virtualisation and cloud features available from the virtual operating system providers and IaaS architectures. 
In many virtualised and cloud environments, data centre managers need to separate and isolate traffic at each virtualised server, and need more flexibility than that allowed by the dedicated firewalls at the periphery of the network, the access control lists available on the network switches, or other expensive switches, routers and dedicated security appliances. For example, Layer 2 through 7 filtering and policing can be deployed at each virtual server in private or multi-tenant cloud to separate and isolate traffic by service type and customer type. Such filtering and policing enables customers to implement security functions natively in the virtual server and enables security decisions to be made lower in the stack, improving efficiency. Using a virtualised environment, security managers are able to filter, log, alert on, or rate limit suspicious traffic at a per server level, which prevents attacks from impacting the host operating systems or host application performance. 
Threat intelligence 
The trend in technology innovation and IT investments is also evolving. Now the emphasis is not just on slowing down cyber attackers who have breached any one private corporate network, but building sensors into the internet itself. These sensors, along with sophisticated data mining tools, enable bad behaviour to be identified before an attack. 
Such a defence, based on data mining and analytics (as opposed to pattern recognition), to identify dangers on the internet is called live threat intelligence. This intelligence is used to build a feedback loop with corporate security defence mechanisms, so that IT systems can identify and stop cyber attacks. By combining live threat detection and other security policies with filtering and blocking on the server itself, an additional layer of security is inserted. Building another layer of defence at the server, combined with realtime updates with live threat intelligence databases, form an effective strategy to block the bad guys from accessing and stealing valuable data and improve IT security.

More Related Content

What's hot

Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMRasool Irfan
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2EC-Council
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY anurama
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)CloudMask inc.
 
Web application firewall
Web application firewallWeb application firewall
Web application firewallAju Thomas
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security TrainingBryan Len
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018sang yoo
 

What's hot (20)

Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEM
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Cloud security
Cloud securityCloud security
Cloud security
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Don't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_complianceDon't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_compliance
 

Viewers also liked

Tips minum air masak dengan banyak
Tips minum air masak dengan banyakTips minum air masak dengan banyak
Tips minum air masak dengan banyakNAJMIFARIZATUL
 
Who is God to you?
Who is God to you?Who is God to you?
Who is God to you?B_F_F
 
まかお テラダ
まかお テラダまかお テラダ
まかお テラダkiyokiyotaka
 
Pp arbeidskrav markus larsen
Pp arbeidskrav markus larsen Pp arbeidskrav markus larsen
Pp arbeidskrav markus larsen Gilb3rt1
 
201509 給与スタートガイド
201509 給与スタートガイド 201509 給与スタートガイド
201509 給与スタートガイド freee株式会社
 
3.1. inno-tds body + protocolos bielorusia nov-2013 novideo
3.1. inno-tds body + protocolos bielorusia nov-2013 novideo3.1. inno-tds body + protocolos bielorusia nov-2013 novideo
3.1. inno-tds body + protocolos bielorusia nov-2013 novideoneomedtec
 
Digital technology and film
Digital technology and filmDigital technology and film
Digital technology and filmitsjanakan
 
Being Prepared Poster (accessible version)
Being Prepared Poster (accessible version)Being Prepared Poster (accessible version)
Being Prepared Poster (accessible version)samsantics3
 
Library Hacks for Teens: A College/Public/School Libraries Collaboration
Library Hacks for Teens: A College/Public/School Libraries CollaborationLibrary Hacks for Teens: A College/Public/School Libraries Collaboration
Library Hacks for Teens: A College/Public/School Libraries CollaborationGina Calia-Lotz
 
флористика
флористикафлористика
флористикаtnk-31
 
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...CLOVE Dental OMNI Hospitals Andhra Hospital
 
Case study
Case studyCase study
Case studyYeji Lee
 
Что же выбрать - контекст или SEO?
Что же выбрать - контекст или SEO?Что же выбрать - контекст или SEO?
Что же выбрать - контекст или SEO?awgua
 

Viewers also liked (15)

Tips minum air masak dengan banyak
Tips minum air masak dengan banyakTips minum air masak dengan banyak
Tips minum air masak dengan banyak
 
Who is God to you?
Who is God to you?Who is God to you?
Who is God to you?
 
まかお テラダ
まかお テラダまかお テラダ
まかお テラダ
 
Pp arbeidskrav markus larsen
Pp arbeidskrav markus larsen Pp arbeidskrav markus larsen
Pp arbeidskrav markus larsen
 
201509 給与スタートガイド
201509 給与スタートガイド 201509 給与スタートガイド
201509 給与スタートガイド
 
3.1. inno-tds body + protocolos bielorusia nov-2013 novideo
3.1. inno-tds body + protocolos bielorusia nov-2013 novideo3.1. inno-tds body + protocolos bielorusia nov-2013 novideo
3.1. inno-tds body + protocolos bielorusia nov-2013 novideo
 
Digital technology and film
Digital technology and filmDigital technology and film
Digital technology and film
 
Chief project officer
Chief project officerChief project officer
Chief project officer
 
Being Prepared Poster (accessible version)
Being Prepared Poster (accessible version)Being Prepared Poster (accessible version)
Being Prepared Poster (accessible version)
 
Library Hacks for Teens: A College/Public/School Libraries Collaboration
Library Hacks for Teens: A College/Public/School Libraries CollaborationLibrary Hacks for Teens: A College/Public/School Libraries Collaboration
Library Hacks for Teens: A College/Public/School Libraries Collaboration
 
флористика
флористикафлористика
флористика
 
Cuadro varones
Cuadro varones Cuadro varones
Cuadro varones
 
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...
Dr. RAHUL VC TIWARI, SIBAR INSTITUTE OF DENTAL SCIENCES, GUNTUR, ANDHRA PRADE...
 
Case study
Case studyCase study
Case study
 
Что же выбрать - контекст или SEO?
Что же выбрать - контекст или SEO?Что же выбрать - контекст или SEO?
Что же выбрать - контекст или SEO?
 

Similar to Military Strategies for Network Security in Virtualized Environments

Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes MainstreamRob Marson
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Secure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdfSecure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdfNK Carpenter
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlockArmour1
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less realguest24ab95c
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...cyberprosocial
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challengesbornresearcher
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureBlock Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureFloyd DCosta
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 

Similar to Military Strategies for Network Security in Virtualized Environments (20)

Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes Mainstream
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Secure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdfSecure Your Sky_ Mastering Cloud Web Security.pdf
Secure Your Sky_ Mastering Cloud Web Security.pdf
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less real
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 

More from Markit

The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementMarkit
 
Esma: funding equity research demystified
Esma: funding equity research demystifiedEsma: funding equity research demystified
Esma: funding equity research demystifiedMarkit
 
Volatility by the numbers
Volatility by the numbers Volatility by the numbers
Volatility by the numbers Markit
 
Bcbs risk data aggregation 239 infographic
Bcbs risk data aggregation 239 infographicBcbs risk data aggregation 239 infographic
Bcbs risk data aggregation 239 infographicMarkit
 
Markit news winter 2015
Markit news winter 2015Markit news winter 2015
Markit news winter 2015Markit
 
Unbundling research commission proposals cause market upheavel
Unbundling research commission proposals cause market upheavelUnbundling research commission proposals cause market upheavel
Unbundling research commission proposals cause market upheavelMarkit
 
2015 predictions
2015 predictions 2015 predictions
2015 predictions Markit
 
SEF liquidity: a year on and still a work in progress
SEF liquidity: a year on and still a work in progressSEF liquidity: a year on and still a work in progress
SEF liquidity: a year on and still a work in progressMarkit
 
Profiling bank risk DNA: Bcbs 239 infographic
Profiling bank risk DNA: Bcbs 239 infographicProfiling bank risk DNA: Bcbs 239 infographic
Profiling bank risk DNA: Bcbs 239 infographicMarkit
 
Talking business with private equity dealmaker Robin Saunders
Talking business with private equity dealmaker Robin SaundersTalking business with private equity dealmaker Robin Saunders
Talking business with private equity dealmaker Robin SaundersMarkit
 
Markit magazine: Autumn 2014
Markit magazine: Autumn 2014Markit magazine: Autumn 2014
Markit magazine: Autumn 2014Markit
 
Sleepless nights spent searching for liquidity
Sleepless nights spent searching for liquiditySleepless nights spent searching for liquidity
Sleepless nights spent searching for liquidityMarkit
 
Banks brace for risk data aggregation and reporting
Banks brace for risk data aggregation and reportingBanks brace for risk data aggregation and reporting
Banks brace for risk data aggregation and reportingMarkit
 
France faces fiscal balancing act
France faces fiscal balancing act France faces fiscal balancing act
France faces fiscal balancing act Markit
 
New rules set to shake up CDS market
New rules set to shake up CDS marketNew rules set to shake up CDS market
New rules set to shake up CDS marketMarkit
 
Bank of England's Ragveer Brar's debates prudent valuation challenges
Bank of England's Ragveer Brar's debates prudent valuation challengesBank of England's Ragveer Brar's debates prudent valuation challenges
Bank of England's Ragveer Brar's debates prudent valuation challengesMarkit
 

More from Markit (16)

The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk management
 
Esma: funding equity research demystified
Esma: funding equity research demystifiedEsma: funding equity research demystified
Esma: funding equity research demystified
 
Volatility by the numbers
Volatility by the numbers Volatility by the numbers
Volatility by the numbers
 
Bcbs risk data aggregation 239 infographic
Bcbs risk data aggregation 239 infographicBcbs risk data aggregation 239 infographic
Bcbs risk data aggregation 239 infographic
 
Markit news winter 2015
Markit news winter 2015Markit news winter 2015
Markit news winter 2015
 
Unbundling research commission proposals cause market upheavel
Unbundling research commission proposals cause market upheavelUnbundling research commission proposals cause market upheavel
Unbundling research commission proposals cause market upheavel
 
2015 predictions
2015 predictions 2015 predictions
2015 predictions
 
SEF liquidity: a year on and still a work in progress
SEF liquidity: a year on and still a work in progressSEF liquidity: a year on and still a work in progress
SEF liquidity: a year on and still a work in progress
 
Profiling bank risk DNA: Bcbs 239 infographic
Profiling bank risk DNA: Bcbs 239 infographicProfiling bank risk DNA: Bcbs 239 infographic
Profiling bank risk DNA: Bcbs 239 infographic
 
Talking business with private equity dealmaker Robin Saunders
Talking business with private equity dealmaker Robin SaundersTalking business with private equity dealmaker Robin Saunders
Talking business with private equity dealmaker Robin Saunders
 
Markit magazine: Autumn 2014
Markit magazine: Autumn 2014Markit magazine: Autumn 2014
Markit magazine: Autumn 2014
 
Sleepless nights spent searching for liquidity
Sleepless nights spent searching for liquiditySleepless nights spent searching for liquidity
Sleepless nights spent searching for liquidity
 
Banks brace for risk data aggregation and reporting
Banks brace for risk data aggregation and reportingBanks brace for risk data aggregation and reporting
Banks brace for risk data aggregation and reporting
 
France faces fiscal balancing act
France faces fiscal balancing act France faces fiscal balancing act
France faces fiscal balancing act
 
New rules set to shake up CDS market
New rules set to shake up CDS marketNew rules set to shake up CDS market
New rules set to shake up CDS market
 
Bank of England's Ragveer Brar's debates prudent valuation challenges
Bank of England's Ragveer Brar's debates prudent valuation challengesBank of England's Ragveer Brar's debates prudent valuation challenges
Bank of England's Ragveer Brar's debates prudent valuation challenges
 

Recently uploaded

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Recently uploaded (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 

Military Strategies for Network Security in Virtualized Environments

  • 2. Autumn 2014 19 The internet may have given us 24/7 connectivity, but it has thrown up a slew of security issues, resulting in the need for more advanced offsetting technology, and financial institutions are at the vanguard of efforts to protect themselves. Security breaches have far-reaching consequences throughout financial services because of the nature of the information they hold – be it consumers’ private information or details of corporate assets. Security providers face a tough challenge as they must deliver relatively easy access to services while simultaneously serving the needs of internal stakeholders when implementing security. Securing these services is a difficult proposition and tradeoffs are often made, leaving the networks exposed and vulnerable to attack. The network server is the number one target of all cyber attacks because it is where all crucial client and institutional data are stored. In multi-tenant cloud environments, financial institutions are also looking to protect the network server by providing the ability Digital security providers are taking on a military approach in defending network security as more companies suffer from cyber attacks, writes Bruce Tolley of Solarflare Communications Strategic defences
  • 3. VIRTUALISATION 20 Autumn 2014 to isolate customer traffic and services, and mitigating against internal attacks and threats, misconfigured equipment and misbehaving applications. A common saying in security is that the bad guy only has to be lucky once, while those protecting corporate and customer assets have to be lucky every time. As a result, we are seeing a big push towards encryption from end to end. Some companies are starting to require every hard drive is encrypted, making it almost impossible for potential cyber bandits to access key data. There is also growing demand for identity management. IT today is about providing the right (billable) applications and services to the right people at the right time and at the right level of service. Cloud service providers also want to ensure they know the customer on the other end and that all entities that are on the network, whether they be virtual, bare metal, or in the cloud, are authenticated to be legitimate if not assigned specific policies and access rights. Military strategies Digital security practitioners often borrow from military strategies that have proven effective in defending valuable assets in the past. One common strategy is called ‘defence in depth’, or layered defences. Similar to how castles were built with cleared land, moats and strong high walls, digital security practitioners build networks that consist of firewalls at the outermost perimeter, routers with access lists, intrusion detection and host antivirus as you move further into the network. This approach assumes that the network will be breached, but the layers of defence will cause the attack to slow down, lose momentum and increase the chance that the attack becomes visible and stopped. These are huge advances in technology as, traditionally, host systems have been left out of the VM Tenant A Hypervisor traffic (storage/ management) Adaptor Hypervisor Filter PF VM Tenant B Filter PF VM Tenant B Filter PF PF PF PF VNIC VNIC PF 10G Port VNIC VNIC VNIC NIC SWITCH NIC SWITCH NIC SWITCH Policing and filtering for virtualised servers and clouds Each tenant can be assigned a virtual machine or virtual server (VM) Policing and filtering can be executed at each virtual server Protects servers from attacks that get past perimeter defences Separates and isolates by customers and by traffic type Mitigates against adverse performance impacts from badly behaving applications or misconfigured machines Source: SolarFlare Bruce Tolley, vice president Solarflare Communications.
  • 4. VIRTUALISATION 21 Autumn 2014 network ‘defence in depth’ paradigm due to the computational cost, technology tradeoffs required to deploy robust security and the monitoring of solutions on production systems at the edge of the network. Host systems can now perform high speed packet capture, filtering, bridging and denial of service defences, due to recent progress in computing power and software. The industry is now organising around various infrastructure as a service (IaaS) cloud architectures such as Red Hat OpenStack and Apache CloudStack. The big server manufacturers are also promoting OpenStack, delivering to IT architects a way to build, manage and provision private and multi-tenant clouds from the network. Virtualisation Security professionals need to leverage these host system capabilities in a virtualised environment. Virtualisation enables IT managers to consolidate workloads on fewer physical servers increasing the utilisation of each server and creating a more flexible, efficient and dynamic data centre environment. As a result, virtualisation can lead to lower capital and ongoing operating costs. However, cloud networking and server virtualisation today require more than just the ability to support server consolidation. To meet customer requirements, cloud and virtualisation solutions must scale in performance, protect data integrity and support service level agreements, all while supporting the broad set of virtualisation and cloud features available from the virtual operating system providers and IaaS architectures. In many virtualised and cloud environments, data centre managers need to separate and isolate traffic at each virtualised server, and need more flexibility than that allowed by the dedicated firewalls at the periphery of the network, the access control lists available on the network switches, or other expensive switches, routers and dedicated security appliances. For example, Layer 2 through 7 filtering and policing can be deployed at each virtual server in private or multi-tenant cloud to separate and isolate traffic by service type and customer type. Such filtering and policing enables customers to implement security functions natively in the virtual server and enables security decisions to be made lower in the stack, improving efficiency. Using a virtualised environment, security managers are able to filter, log, alert on, or rate limit suspicious traffic at a per server level, which prevents attacks from impacting the host operating systems or host application performance. Threat intelligence The trend in technology innovation and IT investments is also evolving. Now the emphasis is not just on slowing down cyber attackers who have breached any one private corporate network, but building sensors into the internet itself. These sensors, along with sophisticated data mining tools, enable bad behaviour to be identified before an attack. Such a defence, based on data mining and analytics (as opposed to pattern recognition), to identify dangers on the internet is called live threat intelligence. This intelligence is used to build a feedback loop with corporate security defence mechanisms, so that IT systems can identify and stop cyber attacks. By combining live threat detection and other security policies with filtering and blocking on the server itself, an additional layer of security is inserted. Building another layer of defence at the server, combined with realtime updates with live threat intelligence databases, form an effective strategy to block the bad guys from accessing and stealing valuable data and improve IT security.