This resource is no longer available

Securing the Physical, Virtual, Cloud Continuum

Cover

The data center is undergoing a radical shift, from virtualization towards internal cloud environments where workloads dynamically move according to real-time performance needs. At the same time, IT practitioners are interested in exploring external cloud computing options--but security and compliance concerns are squelching adoption. A key concern is trust. Moving to a cloud provider shifts the burden of trust onto the provider--something that few providers are able to handle today. To overcome this concern, responsibility for security and compliance needs to stay with the customer.

This requires an overhaul of security practices--all the familiar practices we’ve been using for 15 years. We need new security and compliance controls that span the physical, virtual, cloud continuum (not everything will be virtual so security must continue to protect physical assets). We also need security controls that are location-aware and dynamically enforce policy regardless of workload location. This requires an adaptive perimeter defense and restoration of depth for defense in depth.

Read this white paper to learn more about information security concerns that span physical, virtual, and cloud environments.

Vendor:
Juniper Networks, Inc and Plan B Technologies, Inc
Posted:
26 Jul 2010
Published
26 Jul 2010
Format:
PDF
Length:
9 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.