Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Cisco > Five Steps for Securing the Data Center
 

Five Steps for Securing the Data Center

White Paper Published By: Cisco
Cisco
Published:  Apr 10, 2015
Type:  White Paper
Length:  5 pages

Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.



Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management