SDNs offer the ability to centralize and automate network security functions, but only if security requirements are implemented correctly from the ground up. Learn how to secure the many components of the SDN.
With the emergence of software-defined networks (SDNs), security must become a core component of the network. Network security can no longer be an afterthought, or added with the assumption that it will "just work" on top of an existing network. With SDN, security services are pre-planned and become the foundation for connectivity. The benefits are centralized policy management, automated provisioning, and real-time mitigation. Sounds good, right?
The problem is the security perks you get from SDN are only as good as what you build into the system from the start. If any element or interaction in the SDN model can be compromised, the integrity of the whole network can be affected.
Integrating Security And SDN
Regardless of the architectural model or the controller-agent communication protocol you choose, SDNs provide perimeter security to an organization. Yes, networks still have a perimeter in terms of today's threat landscape. The perimeter, however, is no longer a single boundary or device dividing outside from inside.
The whole concept of the Internet of everything, where any IP-based device connected to a network may pose a threat, requires each network element or function within an organization be secured in its own right. SDNs address this issue, because agents and controllers can be provisioned to provide perimeters to individual devices or services.
The Business of Going DigitalDigital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.