The ability to leverage attacker intelligence across the infrastructure can improve security and simplify enforcement. Find out how to secure the network at campus edge, data center edge and data center core.
Unique Security Challenges in the Datacenter Demand Innovative Solutions
1. W H I T E P AP E R
U n i q u e S e c u r i t y C h a l l e n g e s i n t h e D a t a c e n t e r D e m a n d
I n n o v a t i v e S o l u t i o n s
Sponsored by: Juniper Networks
Christian A. Christiansen John Grady
Phil Hochmuth
October 2013
I D C O P I N I O N
The enterprise network has become increasingly complex as mobile workers, cloud
applications, ecommerce, and virtualization have become more prevalent. New
security solutions have emerged to address the increased attack surface created by
emerging technologies. However, there remains a lack of clarity around where these
security solutions are best deployed. IDC sees three unique use cases for securing
the enterprise network:
Campus edge: At the campus edge, internal users access external applications.
Organizations require granular control over applications based on each user, as
well as the ability to detect malicious content. Next-generation firewalls (NGFWs)
and unified threat management (UTM) appliances provide this functionality on a
consolidated platform.
Datacenter edge: At the datacenter edge, external users access internal
applications. Users are both numerous and unknown, making threats harder to
detect with a high degree of certainty. Additionally, with many applications hosted
in this part of the network having direct revenue implications, availability is a key
concern. Solutions that mitigate distributed denial-of-service (DDoS) attacks and
block hackers from Web applications with specificity are necessary.
Datacenter core: Internal resources and data are hosted in the core of the
datacenter. Typically, at least a portion of the infrastructure in this part of the
network is virtualized. Latency is not acceptable in the core datacenter, meaning
that performance is of key importance. Solutions that provide consistent policy
enforcement across both physical and virtual environments, high performance,
and the scalability to protect dynamic environments are required.
While each of these use cases has distinct features requiring unique solutions,
integration remains important. The ability to leverage attacker intelligence across the
infrastructure can improve security and simplify enforcement. Juniper Networks offers
a portfolio of products built to address each of the previously mentioned scenarios
specifically while also functioning as a holistic solution.
GlobalHeadquarters:5SpeenStreetFramingham,MA01701USAP.508.872.8200F.508.935.4015www.idc.com