A lot has been written about how today’s I.T. Infrastructure security models are broken. The days of securing the perimeter and trusting everything and everybody inside are gone. To make such a statement may seem bold, but you only have to look to a recent Forrester survey* identifying the top three corporate security breaches as (1) the loss/theft of corporate assets; (2) inadvertent misuse by an insider and (3) external attacks targeting corporate systems, to understand that such a statement is far from bold and in fact a matter organisations should start to consider more seriously.Read More
System Virtualisation and the Software Defined Data Centre (SDDC) have lead to radical changes in how we design and implement security in our environments.
When designing a new environment, we need to consider the different paths of traffic that will need securing. These will be our North to South traffic: client to server, and East to West Traffic: server to server.
As with every design, it will be driven by the customer’s requirement, however this blog will hopefully provide some food for thought.Read More