Voice&Data

Secure Next Gen Data Centers

Firms need to rebuild security structure to fit BYOD...

- vndedit@cybermedia.co.in

40 | SECURITY

The modern data center has truly become the home of everything. We’re seeing entire businesses born from a cloud model as executives take direct advantage of new data center resources. Today’s data centers are moving at a faster rate. Moving fast on data acquisitio­n and moving fast on acquiring new networks. All this is creating a new breed of data centers that need security more than they need anything else. Increasing data traffic and network connection­s, virtualiza­tion of the data centers, increasing cyber-attacks with physical attacks and insider threats are driving this market. Let’s take a deeper look.

Consider this: The global data center security market was estimated to be $6.46 billion in 2013 and is expected to grow to $13.77 billion in 2018. This represents a Compound Annual Growth Rate (CAGR) of 16.3 percent from 2013 to 2018. Currently, BFSI is well ahead being the largest adopter for data center security solutions followed by Telecom and IT.

Even though there is a need for integrated physical as well as logical security solutions for data center security, both the solutions need to be independen­tly implemente­d to secure the facility. Major companies are trying to integrate both the security solutions on a single platform for ease of implementa­tion and to reduce the total cost of ownership while ensuring security compliance and regulatory policies.

The data center security solutions and service providers are looking forward to gain a better competitiv­e advantage in this growing market, thereby creating new solutions and intelligen­t and integrated security platforms for securing the data centers. These solutions providers are enabling organizati­ons reduce the risk of improper access by privileged users, through either careless or malicious actions by governing employee and partner access. They also help ensure that your confidenti­al informatio­n is properly classified and protected from improper use or disclosure, thereby helping you avoid the reputation­al damage that can result from informatio­n theft.

With the blurring of boundaries between physical, virtual and public/private cloud, organizati­ons are on an evolutiona­ry curve towards next-generation data centres. Resultantl­y, they will face the reality of securing data that moves between server, storage, and networking resources (physical and virtual) of next-generation data centres.

There have been other technologi­es that have promoted this increased usage of data center platforms and security. More resource availabili­ty, datacenter optimizati­ons, and of course mobility are all impacting the direct boom in data center security demand. Looking ahead, what are some of the major technologi­cal solutions that will impact data center and security? What are the key trends that will change the way a data center delivers content? How can data centers continue to meet the demands of both the users and the business? Let’s find out!

Over the next few years, many of the traditiona­l cloud platforms we have come to know will evolve. Already, we are seeing new ways to utilize cloud traffic

and distribute data. The next-generation cloud will allow for greater levels of interconne­ctivity, optimized resource utilizatio­n, and creating a more powerful environmen­t for the end-user. As more devices connect and more content is delivered – web-based communicat­ion will grow to become even more important, especially in terms of security.

Today, hybrid cloud as a technology is getting pretty hot. With so much cloud adoption happening, organizati­ons need a good way to interconne­ct and secure a wide variety of resources. A hybrid cloud is no longer defined by a simple connection between a private and public data center. Now, data centers can interconne­ct with resources spanning a variety of environmen­ts. This means that pieces can be in a private, public or “as-a-Service” delivery. All of these components can be connected together to bring home a powerful and secure hybrid cloud platform. More services, many more users and a more interconne­cted world will prove to be the driving force behind a hybrid cloud platform.

Moreover, the world of Apps and APIs is completely changing, so is the mechanism that allows these applicatio­ns to interconne­ct and function in today’s IT world. The amazing thing here is that applicatio­ns are becoming completely hardware agnostic. They aim to deliver clear usability and data. The future of the applicatio­n world will revolve around constant connectivi­ty, ease-of-use, and the power of the data center. New types of APIs are also allowing applicatio­ns to access key resources much faster. This type of granular interconne­ct creates better and more agile cloud-centric applicatio­ns. Remember, all of these future cloud applicatio­ns reside within the data center increasing the relevance of a wellplanne­d data center-security strategy.

BYOD, another booming IT trend, now needs to be looked at from different dimensions like data loss prevention, network access control, internal intrusion prevention systems, authentica­tion system, internal firewalls, securing Wi-Fi etc. A smarter enterprise thus seeks a single security solution for issues related to BYOD. Firms need to rebuild security

“The growth of mobile devices and apps in the enterprise is blurring the lines between personal and corporate data and leading to new challenges for enterprise­s.”

structure to fit BYOD whilst being watchdogs of IT security and compliance.

If you’re not ready for the mobility revolution it’s time to get on this very fast-moving train. Users, devices and data are becoming a lot more mobile. Users are consuming informatio­n in entirely new ways and your organizati­on must be ready to facilitate these demands. This means managing mobile resources, users, and data center resources. Whether these are mobile applicatio­n servers, virtual hosts, or entire racks dedicated to a mobile user platform – be ready to accommodat­e the new way that users compute.

The growth of mobile devices and apps in the enterprise is blurring the lines between personal and corporate data and leading to new challenges for enterprise­s. Much like the mobility revolution, the content that will be delivered to these devices will have to be optimized as well. On top of it all, maintainin­g device agnosticis­m is crucial. Users want access to their applicatio­ns and data regardless of OS or hardware. This is why new types of applicatio­ns and rich content will be delivered to a variety of users located all over the world. Intelligen­t data center automation controls will optimize the user’s connection by creating automated experience orchestrat­ion. That is, engines will dynamicall­y define the user experience based on device, connection, location, security, and other factors. This is the future of how users will consume their informatio­n.

To combat the threat of advanced malware, many organizati­ons are relying on their legacy security products or using stand-alone malware products that are not integrated with the rest of the environmen­t. Hence, there is a need to adopt advanced threat defence solutions to respond to attacks faster and seamlessly move from analysis to protection and resolution.

The next couple of years will certainly be interestin­g. We’ll see more cloud-centric workloads deployed as the modern user becomes even more mobile. There is more big data and business intelligen­ce, we have a lot more mobility on the user front, and we are certainly seeing a lot more data center convergenc­e take place. At the heart of it all – where so many new technologi­es and solutions live – sits the all-important data center and creating a more agile, flexible, scalable, and costeffici­ent data center-security strategy is a transforma­tion that CIOs must strive to conquer.

Data center will continue to serve a critical role in the evolution of IT. With business complexiti­es increasing due to big data and its complicati­ons, we will see even more data center automation, greater distribute­d technologi­es and even the utilizatio­n of intelligen­t robotics. The need is to relook at appropriat­e strategies of IT infrastruc­ture in order to gain greater efficiency, agility, and business continuity. One thing will always be true – it’ll be up to the IT profession­al, cloud architect, or technology executive to utilize these powerful tools to align business goals with IT solutions.

 ??  ??
 ??  ??
 ?? Vic Mankotia ?? Vice President, Solution Strategy, Asia Pacific & Japan,
CA Technologi­es Prior to joining CA Technologi­es, Vic spent 10 years with Symantec Corporatio­n where he held various sales leadership positions. His last role was Vice President of Security for...
Vic Mankotia Vice President, Solution Strategy, Asia Pacific & Japan, CA Technologi­es Prior to joining CA Technologi­es, Vic spent 10 years with Symantec Corporatio­n where he held various sales leadership positions. His last role was Vice President of Security for...

Newspapers in English

Newspapers from India