Perimeter
9/11/2009
02:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Crossbeam Publishes White Paper On Securing Virtualized Data Centers

"The Emergence of Two Clouds" outlines the risks around security virtualization, particularly when it comes to the complexities that arise when trying to manage multiple trust boundaries

BOXBOROUGH, Mass.—September 10, 2009—Crossbeam Systems, Inc., the leading provider of next-generation security platforms for high-performance networks, announced today the availability of a whitepaper titled "The Emergence of Two Clouds." The whitepaper is designed to help IT managers understand the unique challenges of securing virtualized environments and provide insight into a new best practices-based architecture that can greatly simplify management operations, while improving the flexibility and adaptability of the two current options: physical appliances and virtual security appliances. To download a copy of the whitepaper, please visit http://www.crossbeam.com/company/download_registration.php.

"For network security, there are significant consequences to mass deployment of virtualization technology," said Jon Oltsik, principal analyst at Enterprise Strategy Group. "Crossbeam's whitepaper elevates the discussion to help IT staff take advantage of security virtualization—which introduces a host of complex issues related to inter-VM traffic boundaries and VM sprawl. These concepts need to be better understood in order to move security virtualization forward from a great concept to a well-articulated security strategy."

Today, the potential security risks associated with virtualizing data centers are significant, leading many IT managers to stop short of virtualizing everything in the data center. Despite the advancements in virtualization, there is still a fundamental lack of knowledge and best practices that can help IT managers understand the consequences of a fully virtualized infrastructure and, most importantly, avoid the operational pitfalls.

"One of the biggest challenges IT managers face is the complexity of managing trust boundaries between Web, application and database VMs once the physical connections are removed," said Jim Freeze, Crossbeam's chief marketing officer. "Ironically, in an effort to protect between the virtualized layers, they end up replacing appliance sprawl with virtual machine sprawl and opening the door to new levels of risk. As the pressure mounts to virtualize more mission-critical IT infrastructure, the question of whether security virtualization can be done successfully is top of mind. The answer is yes, but not in a traditional IT architecture."

"The Emergence of Two Clouds" whitepaper outlines a third approach that creates a "two cloud" environment between the virtualized applications and the network security infrastructure. This enables companies to maintain trust boundaries and meet performance and reliability requirements, without losing any of the flexibility and adaptability benefits of a virtualized infrastructure.

"Once you have separated security from the application infrastructure, the problems associated with security virtualization are eliminated," added Freeze. "For instance, Crossbeam can centralize control of hundreds of virtualized services such as firewall and IPS and allow IT operations to manage traffic flow dynamically through the appropriate security service depending upon which trust boundary the data is crossing. Deploying these services on the X-Series platform gives IT managers the flexibility they need to scale and provision security services, without experiencing degradation in performance."

Crossbeam's X-Series Next Generation Security Platform enables customers to consolidate their security infrastructure on a scalable, carrier-class platform that virtualizes the delivery of best-of-breed security applications. Large enterprises and service providers use the X-Series to provide unprecedented scalability, flexibility and performance for their security deployments, while driving down costs and energy consumption.

About Crossbeam Crossbeam Systems, Inc. transforms the way enterprises, service providers and government agencies architect and deliver security services. The basis of Crossbeam's solution is its Next Generation Security Platform, a highly scalable software and hardware platform that facilitates the consolidation, virtualization and simplification of security services delivery, while preserving the customers' choice of best-of-breed security applications. Crossbeam offers the only security platform that delivers unparalleled network performance, scalability, adaptability and resiliency. Customers choose Crossbeam to intelligently manage risk, accelerate and maintain compliance, and protect their businesses from evolving threats. Crossbeam is headquartered in Boxborough, Mass., and has offices in Europe, Asia Pacific and Latin America. More information is available at http://www.crossbeam.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Yeah, my cookies were deleted too!!"
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.