Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Cisco > Five Steps For Securing The Data Center: Why Traditional Security May Not Work
 

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

White Paper Published By: Cisco
Cisco
Published:  Aug 24, 2015
Type:  White Paper
Length:  5 pages

Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.

Download this white paper to see why securing the data center requires a solution that can:

  • Provide visibility and control over custom data center applications
  • Handle asymmetric traffic flows and application transactions between devices and data centers
  • Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco Application-Centric Infrastructures (ACIs) and beyond
  • Address the entire attack continuum: before, during, and after an attack
  • Integrate with security deployed across the entire network
  • Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments



Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management