SDNs offer the ability to centralize and automate network security functions, but only if security requirements are implemented correctly from the ground up. Learn how to secure the many components of the SDN.
With the emergence of software-defined networks (SDNs), security must become a core component of the network. Network security can no longer be an afterthought, or added with the assumption that it will "just work" on top of an existing network. With SDN, security services are pre-planned and become the foundation for connectivity. The benefits are centralized policy management, automated provisioning, and real-time mitigation. Sounds good, right?
The problem is the security perks you get from SDN are only as good as what you build into the system from the start. If any element or interaction in the SDN model can be compromised, the integrity of the whole network can be affected.
Integrating Security And SDN
Regardless of the architectural model or the controller-agent communication protocol you choose, SDNs provide perimeter security to an organization. Yes, networks still have a perimeter in terms of today's threat landscape. The perimeter, however, is no longer a single boundary or device dividing outside from inside.
The whole concept of the Internet of everything, where any IP-based device connected to a network may pose a threat, requires each network element or function within an organization be secured in its own right. SDNs address this issue, because agents and controllers can be provisioned to provide perimeters to individual devices or services.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.