Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Email Security

Converged Infrastructure Implications for Email Security

What’s old is new again

What’s old is new again

Converged Infrastructure is a new name for a very old idea: getting compute, network, storage, and infrastructure management software in a fully integrated package, usually from a single vendor. In the old days, you bought minicomputer, mainframe or super computer infrastructure from a single vendor, be it IBM, Control Data, DEC, or Wang. The entire system was engineered to work together with a complete suite of software for managing the infrastructure. Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing.

Converged Infrastructure Security Vendors like the Converged Infrastructure paradigm because it locks in customers on their solutions. No longer are IT buyers searching out best of breed infrastructure components from different vendors, and switching out commoditized components. Instead they are getting fully integrated suites from one vendor. Customers benefit from a superior management and orchestration software suite for the infrastructure that permits greater abstraction of the IT resources to a computing fabric suitable for cloud computing, where application workloads are managed, not servers.

Challenges to the dominant email security paradigm

The trend toward Converged Infrastructure has important implications for the email security IT infrastructure. Prior to the advent of cloud computing, the dominant paradigm for the delivery of email security infrastructure was the purpose-built email security appliance. This was a physical server with a pre-loaded software suite of email security applications including an MTA for routing email, anti-spam, anti-virus and possibly encryption. With the advent of cloud computing, in some cases, the infrastructure wxas migrated to a SaaS provider for Internet mail, however, there is still a place for an email security infrastructure for the management of internal email security. Once the data center is converted to a cloud computing paradigm on a Converged Infrastructure computing fabric, everything, including network addresses are now virtualized and potentially changeable, including the network topology. This makes the old paradigm for email security with physical appliances obsolete.

Enter the virtual appliance

The email security infrastructure must be virtualized along with everything else. Thus, the new paradigm is for virtualized appliances or enterprise software suites to implement email security. It is unlikely that enterprise software for email security will make a come-back after being displaced by email security appliances, because of the complexity, cost, and lack of vendors still in the business of email security enterprise software. Email security appliances displaced enterprise software because the software packages were costly to acquire and maintain, involved multiple vendors, and placed additional training burdens on IT staff. Appliances were a single vendor solution incorporating best-of-breed security software in an integrated package with lower training and maintenance requirements.

Virtual appliances bring the benefits of physical appliances: pre-integrated best-of-breed security software with a unified management infrastructure from a single vendor, but without the physical residence in the data center. The cloud now provides the compute infrastructure. Virtual appliances are managed like any application workload in a cloud. They are loaded into virtual machine containers and benefit from the entire underlying virtualization infrastructure for high availability and fault tolerance.

Advertisement. Scroll to continue reading.

Remaining Challenges

There is one area where virtual email security appliances must adapt—adapting to network topology changes. Converged Infrastructure permits changes to the underlying network topology (as an enabler of cloud computing). Changes in network topology present a challenge to security infrastructure (an not just email security) that rely on IP addresses and network partitions to implement access to various applications and services. No vendor has yet integrated at the lowest level of the virtualization infrastructure to adapt to changes in network topology, but it is likely that vendors will eventually integrate to cloud infrastructure APIs to adapt automatically to those changes.

The Promise of Converged Infrastructure

Converged Infrastructure promises to bring an old paradigm to a new infrastructure that has the potential to bring new operational savings to the modern data center. Cloud computing permits the management of virtual workloads and rapid provisioning of resources for new applications. The virtual email appliance is a key component to the security infrastructure for the cloud and potentially will displace the previous email security paradigm of physical email security appliances.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Application Security

After skipping last month, Adobe returned to its scheduled Patch Tuesday cadence with the release of fixes for at least 38 vulnerabilities in multiple...