Securing Cloud Infrastructure
By Biren Mehta, Senior Marketing Manager, SP Marketing in Routing and Switching, Cisco
Businesses and governments are bullish on the benefits that cloud computing promises to bring, but security concerns remain a key barrier to entry. Carrier networks provide critical infrastructure and services that governments and businesses depend on to operate every day. Services provided by carriers today are articulated on the mobile endpoint, the customer premise, the network and data center edge, and the public, private, and hybrid clouds. The sum of these is the “carrier cloud.” With cloud enabled service infrastructure, enterprise data and applications must move easily and securely through many clouds. That’s why the network that connects, protects, and moves data fiercely through cloud means more than ever.
Carrier networks must protect customers’ data and applications residing in the carrier’s cloud infrastructure from ever escalating Distributed Denial of Service (DDoS) and other malicious attacks. Security provides the foundation of service assurance. Miscreants continue to get smarter, more agile, and more destructive and the threats that they impose against networks delivering critical services become more severe and disruptive. As carrier networks continue to converge, it is increasingly important to properly segment threats and vulnerabilities by domain, but examine the aggregate threat landscape at the same time. Examples of this include the evolved packet core where traditional and mobile services share an infrastructure leveraging the Carrier Data Center and Cloud for operational efficiency and also for service delivery. Architectural innovation introduced by SDN enables new set of threat mitigation strategies and proactive measures to defending threats.
Security is a key aspect of delivering cloud services with confidence. Join us next week at Light Reading’s Ethernet Expo in New York where our security architect and technical leader, Mike Geller (pictured right) will discuss how we can insure proper application of visibility and control required to secure the Carrier networks and Carrier Cloud to keep us ahead of the miscreants.Tags: