Alternatives for Securing Virtual Networks

Alternatives for Securing Virtual Networks

Cover

Invisible networks are spreading within data centers. Virtualization of computing hardware is creating these networks of VMs within physical servers. Traditional network monitoring and security measures are unable to see or control the growing volume of inter-VM traffic.

Enterprises are increasingly concerned about the risks of virtual networks, which range from undeterred malware exploits to mixing trusted and untrusted systems. Some have scaled back the scope and economic benefits of virtualization. Others have tried to apply traditional security to the virtual environment. However, key virtualization technologies such as VMotion from VMware break the traditional models of physical network tools.

Juniper Networks® vGW Virtual Gateway has been purpose-built to mitigate the risks of virtual networks, while maintaining the ROI of virtualization. A next-generation security solution specifically designed for the virtual environment, the vGW monitors and controls inter-VM traffic, enforcing security policies at the individual VM level. Because vGW was designed from scratch to secure the latest virtualization technologies, it provides the thorough protection and ease of operation missing from traditional physical networking products and workarounds.

In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.

Vendor:
Juniper Networks, Inc.
Posted:
29 Mar 2011
Published:
28 Mar 2011
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor