Data centers are taking on a central role in network transformation as service providers become more reliant on new virtualized network architectures, fabrics and clouds. Yet security threats are also evolving and compliance requirements are rapidly changing as data centers become more active in the industry-wide push to virtualized networks.
Rasool Kareem Irfan, head of telecom & infrastructure security practice for Tata Communications Ltd. Transformation Services, will examine how data center security can adapt to network transformation and also meet stringent security compliances and audits in an Upskill U course this Friday. Irfan will discuss data center technology trends, challenges to data center security, strategic priorities for securing data centers, and more. (Register for Security: Evolving the Data Center.)
The Cybersecurity series at Upskill U launched earlier this week with a lecture on the changing face of security in the era of virtualization. Rita Marty, executive director of mobility & cloud security for the chief security office at AT&T Inc. (NYSE: T), explained how securing a virtual network differs from securing a traditional network, and addressed the fundamental technical and mindset changes service providers need to make as they prepare for virtualized networks. (Listen to Securing a Virtual World.)
"Traditional security is based on a variety of vendors, all specialized hardware and software ... it's a really complex environment [without] a single ops model [or] a single database of record," Marty said. "Many organizations are driving different security technologies or solutions like firewalls, for example. [Virtual] security would evolve with the network. We expect security functions to be virtualized, to be dynamically orchestrated in the cloud, as needed, with the ability to scale up and down to respond to an attack, for example."
In order to take full advantage of security functions in virtualized networks, Marty advised that security best practices should be embedded in the design of the overall architecture from day one. She also explained several use cases of security opportunities from virtualization, among which is the ability of cloud-based architectures to provide resiliency against DDoS attacks by scaling up functions to accommodate increased traffic.
Don't miss these other timely courses in Upskill U's Security series:
- Security: Tackling DDoS (Wednesday, Oct. 26, 1:00 p.m. ET): Gary Sockrider, Principal Security Technologist,Arbor Networks , examines how businesses can adopt DDoS countermeasures and redesign their network topology to protect their assets.
- Security: The Plusses and Minuses of Open Source Software (Friday, Oct. 28, 1:00 p.m. ET): Nick Feamster, Acting Director, Center for Information Technology Policy, Princeton University , explains both the risks and benefits open source software presents to security measures.
Tune in to Upskill U to boost your understanding of why security measures and best practices are changing, and learn how your organization can rapidly adapt to new threats to the network. Each course includes a live Q&A -- don't miss this opportunity to ask expert lecturers your toughest security questions. I'll see you on the chat boards!
— Kelsey Kusterer Ziser, editor, Upskill U