x
Security

Tata Communications Upskills U on Data Center Security

Data centers are taking on a central role in network transformation as service providers become more reliant on new virtualized network architectures, fabrics and clouds. Yet security threats are also evolving and compliance requirements are rapidly changing as data centers become more active in the industry-wide push to virtualized networks.


Upskill yourself on Security with our new Upskill U online university! Sign up for our free course with Tata Communications now!

Rasool Kareem Irfan, head of telecom & infrastructure security practice for Tata Communications Ltd. Transformation Services, will examine how data center security can adapt to network transformation and also meet stringent security compliances and audits in an Upskill U course this Friday. Irfan will discuss data center technology trends, challenges to data center security, strategic priorities for securing data centers, and more. (Register for Security: Evolving the Data Center.)

Tata Communications' Rasool Kareem Irfan examines best practices  for data center security in an upcoming course at Upskill U.
Tata Communications' Rasool Kareem Irfan examines best practices
for data center security in an upcoming course at Upskill U.

The Cybersecurity series at Upskill U launched earlier this week with a lecture on the changing face of security in the era of virtualization. Rita Marty, executive director of mobility & cloud security for the chief security office at AT&T Inc. (NYSE: T), explained how securing a virtual network differs from securing a traditional network, and addressed the fundamental technical and mindset changes service providers need to make as they prepare for virtualized networks. (Listen to Securing a Virtual World.)

"Traditional security is based on a variety of vendors, all specialized hardware and software ... it's a really complex environment [without] a single ops model [or] a single database of record," Marty said. "Many organizations are driving different security technologies or solutions like firewalls, for example. [Virtual] security would evolve with the network. We expect security functions to be virtualized, to be dynamically orchestrated in the cloud, as needed, with the ability to scale up and down to respond to an attack, for example."

In order to take full advantage of security functions in virtualized networks, Marty advised that security best practices should be embedded in the design of the overall architecture from day one. She also explained several use cases of security opportunities from virtualization, among which is the ability of cloud-based architectures to provide resiliency against DDoS attacks by scaling up functions to accommodate increased traffic.

Don't miss these other timely courses in Upskill U's Security series:

Tune in to Upskill U to boost your understanding of why security measures and best practices are changing, and learn how your organization can rapidly adapt to new threats to the network. Each course includes a live Q&A -- don't miss this opportunity to ask expert lecturers your toughest security questions. I'll see you on the chat boards!

— Kelsey Kusterer Ziser, editor, Upskill U

Be the first to post a comment regarding this story.
HOME
Sign In
SEARCH
CLOSE
MORE
CLOSE