Enterprise Cloud Computing
BYOD Security Is a Network Architecture Problem
Do we still need endpoint security in the shadow of more powerful network layer security controls?
Aug. 13, 2012 03:00 AM
The data center (as we knew it) is never going to be the same. Fluid changes are already in motion, brought about largely as a result of ‘paradigm' shifts in computing including....:
... actually, several other major factors too, but that's a good data-centric 7-pack to start with is it not?
This swollen spring tide of information management elements brings with it empowerment for those that can bring meaningful analytics to bear upon the new data stack and, conversely, security concerns for those who fail to grasp the new triffid-sized nettle that has the growth potential to run rampant.
Colorful analogies aside... what are we talking about here in real terms? Enterprises today are increasingly forced to deal with massive amounts of so-called Big Data as they have to contend with the risk of employees connecting to the network with Bring Your Own Device (BYOD) tablets, smartphones and more.
This has created an inflexion point for large organizations in terms of data center transformation. We have reached a chasm where network security infrastructures will fail to scale and cope with the complexity of compute throughput caused by our seven factors as mentioned above. Put simply, the new under-managed over-clocked network is a security risk.
How Do We Put Our Next Step Forward Without Falling?
It's not all about mitigation argues Doggart. Too much discussion circulates in the security industry focused on mitigation and cure, with comparatively scant lip service being paid to pre-infection prevention instead.
"You can't put anti-virus controls on an iPad; so putting controls at the network layer is the only way to deal with the security risks we stand in front of today. But going deeper, companies need to think about the structural build of their data centers and networks to ensure that they architect them correctly. New security vectors demand a new approach to application and network architecture. As a basic example, servers that process credit card data should be physically and locally segregated from other basic services."
Crossbeam's Doggart is adamant that this problem of implementing network security within more dynamic, virtualized data centers means that network security infrastructure needs to evolve in order to help organizations achieve their vision for the next-generation data center (NGDC). Then (and only then) can we successfully reap the benefits of cloud computing technology for both public and private environments he says.
Where Do We Turn Next?
Do we still need endpoint security in the shadow of more powerful network layer security controls? Take HP's aforementioned product, which does indeed come with anti-malware controls plus denial-of-service (DoS) attack protection, plus optional services such as anti-virus, anti-spam and URL filtering capabilities. The consensus argues that yes, we mostly still do need user endpoint security at whatever level we can bring it to bear; but it must work in harmony and unison with the wider strategy for this new and more intelligently designed network and data center structure currently under construction.
This is happening. Not everywhere and not at every level. But a network architecture security handbook should be on every CIOs Christmas list this year. Until we get there, wear a hard hat.
• • •
This post was first published on the Enterprise CIO Forum.
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week