Tag Archives: Network

Security Is a Prisoner of the Network

Cybersecurity professionals must gain experience and get comfortable with virtual network security

I have a very distinct memory about a conversation I had with a colleague in the mid-to-late 1990s about how NetWare worked. I told him that file and print services resided “in the network” but he couldn’t get his arms around this concept. He continually pushed back by saying things like, “well the printers and file servers have to be plugged into the network so isn’t NetWare just running on these devices?”

His assumption was somewhat accurate since NetWare did control physical file servers and printers. What he didn’t get however was that NetWare made physical network devices subservient to a global and virtual file and print services. Before NetWare (and similar technologies like Sun’s NFS), you had to have a physical connection to a device and/or control these connections on a device-by-device basis. Novell radically changed this by using software to abstract connections. This made it much easier to point users at local printers and file shares while applying central access controls for security and privacy.

Why am I strolling down memory LAN (author’s note: I am pretty proud of this pun)? Because we face a similar changing situation today with regard to network security and cloud computing. I contend that security has been a prisoner of the network over the past 20 years.

During this timeframe, large organizations deployed an army of network security devices to filter or at least inspect IP packets for security purposes. As organizations added more servers and more network traffic, they were forced to add more network security devices. This required a series of unnatural acts like moving traffic to and fro so it could pass by various security checkpoints. Security and network engineers also created security zones with physical and virtual network segmentation, and employed teams of people to create and manage ACLs, firewalls, WAFs, etc.

Not surprisingly, network security has become incredibly complex, cumbersome, and fragile as a result of layers upon layers of network imprisonment. It now takes a heroic effort from cybersecurity and network operations team to keep up with these challenges.

Fast forward to 2015 and there is a radical change occurring. IT initiatives like server virtualization, cloud computing, NFV, and SDN are game changers poised to break the tight coupling between cybersecurity and the network.

Now this breakup is still in its early stages and like the song says: Breaking up is hard to do. For example, ESG research reveals that 60% of organizations say they are still learning how to apply network security policies (and policy enforcement) to public/private cloud infrastructure. Furthermore, 60% of organizations say that their network security operations and processes lack the right level of automation and orchestration necessary for public/private cloud computing infrastructure (note: I am an ESG employee).

As painful as this separation is today, CISOs and network engineers must understand that there may be a network security rainbow on the horizon. Just as NetWare turned file and print into a productive and operationally-efficient virtual network service, there are a number of technology trends and innovations that could enable CISOs to virtualize and distribute network security services across the entire network. For example:

Foundational technologies like SDN, NFV, Cisco ACI and VMware NSX.
Cloud security monitoring tools from HyTrust, ThreatConnect, and SkyHigh Networks as well as cloud connectors for ArcSight, QRadar, RSA, and Splunk.

NetWare-like network security services software from CloudPassage, Illumio, and vArmour.

Network security orchestration tools from firms like RedSeal and Tufin.
Virtual editions of leading physical network security products from vendors like Check Point, Fortinet, Juniper, and Palo Alto Networks.

A few years ago, VMware declared that organizations could actually improve their cybersecurity positions by embracing server virtualization. While this seemed like blasphemy at the time, VMware was absolutely right. And the addition of the technologies and trends I mention above makes this statement even more possible. In order to get there however, CIOs, CISOs, and networking professionals have to think differently. Rather than try to emulate physical network security in the cloud, cybersecurity and networking staff must embrace virtual network security services, learn how to use them, and understand how to use them to improve security efficacy and operational efficiency.

Back in the 1990s, NetWare transformed file and print services and introduced an army of skilled IT professionals with CNE certifications. Over the next few years, we will see a similar revolution as security sheds its physical network shackles and assumes a role of virtual network services.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

What to expect at TechEd North America 2012

As anyone who’s been to TechEd will attest, the event is not a sprint; it’s a marathon. With hundreds of technical sessions, workshops, labs and vendors, the annual Microsoft event doesn’t lack quantity. But what’s actually worth paying attention to?

Thanks to the timing of the event, the published agenda and the tarot cards found lying around the TechTarget office, we have a few informed guesses regarding what attendees can expect to hear a lot about, and where Microsoft wants the industry conversation to go. Here are the top topics we’ll be watching:

Windows Server 2012
With the recent name change from Windows Server 8, there’s a renewed anticipation for Microsoft’s upcoming server OS – and heightened expectations for all the things the company claims it can do. Server and Tools Business president Satya Nadella will be one of the featured keynote speakers at the show, and he’ll likely hammer on all of the many documented improvements within Server 2012, from enhancements to Hyper-V and PowerShell to the new Resilient File System. There are also 72 technical sessions in the Windows Server track, which should sate folks eager to play with the Release Candidate, available now.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
Windows 8
It’s no secret that Microsoft is betting big on Windows 8, its “reimagined,” “fast and fluid” new client operating system. With the next iteration – dubbed the Release Preview – now available, you can bet it’ll be a major point of emphasis for many speakers, if not for the IT pros who remain skeptical of how the touch-centric interface will translate to the enterprise. The agenda includes technical sessions on Windows 8 deployment, Metro-style app delivery, Windows To Go and more. Developers will have plenty to chew on as well: Visual Studio corporate vice president Jason Zander will be speaking during Monday’s keynote session, and Antoine LeBlond, corporate vice president for Windows Web Services (with a focus on the Windows Store) takes the stage on Tuesday.

Certifications
Sure, IT pros have been able to take certification exams at TechEd every year. But this year adds some intrigue, given the recent changes to Microsoft’s program, including the return of the MCSE and a focus on the cloud. Many are wondering what the changes mean for them, whether they should get recertified and what the value of these things are, anyway. If there is any place to get answers, it’s here.

Device (or user) management
It’s pretty difficult to avoid the topic of consumerization and BYOD programs at any conference these days, and for good reason: Any organization that isn’t dealing with it now will soon need to or risk being beaten over the head by iPad-wielding employees. One of the main ways that Microsoft is addressing the new reality is through improved device management. The revamped Windows Intune, which will purportedly give IT the ability to manage and deliver applications to iOS and Android devices in addition to Windows devices, will be featured in demos and discussions throughout the week (as will System Center Configuration Manager 2012). Expect to hear about Microsoft’s “user-centric” management model a lot, and get explanations as to why Windows RT tablets don’t need to join Active Directory domains.

Cloud
The word “cloud” at a Microsoft conference usually means Azure. The public cloud platform will definitely be a major coverage area at TechEd, given both the timing – there was a recent branding brouhaha, and the company is scheduled to make a significant Azure announcement on June 7 – and the speaker slate (which includes sessions from Azure executives Scott Guthrie and Mark Russinovich, and purportedly something on the new Windows Azure Active Directory). But don’t discount Microsoft’s private cloud push, which includes System Center 2012 and Hyper-V.

System Center 2012
Though Microsoft’s updated systems management suite got plenty of time in the spotlight during the Management Summit in April, IT pros are looking to learn more about how to better monitor and respond to increasingly complex environments. Many of the suite’s most significant products, including Virtual Machine Manager, Operations Manager and Orchestrator, will get dedicated technical sessions, and should be touted as ways to tie together many of the topics mentioned above.

Office
We’ve heard very little about how things are going with Office 365, Microsoft’s answer to Google Apps, and maybe that’s for a reason. But the roadmap should become a little clearer during TechEd, as there are several sessions scheduled that cover the cloud-based productivity suite in depth, including its tie-ins to the Sharepoint collaboration platform (and we may get more details on the new government-specific version). Though there’s nothing listed, we might also hear something about Office 15, which will reportedly be delivered to Windows devices before anything else.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com