Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Virtual Security: Delivering On-Demand Support to Physical Environments

There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.

There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.

Think about it: Would a museum of fine arts fire its security guards and replace them just with video cameras? Probably not. Ideally, the security guards would use the cameras to more efficiently patrol the facilities and more quickly catch a would-be thief. The same concept applies to protecting the digital world. Adding virtualized versions of key security or virtual specific technologies can be used to add more depth in defenses and complement existing physical models.

Virtualized SecurityAs more companies move their infrastructure to the cloud and provide their products with an “as a service” model, layering on virtualized security solutions can help companies more efficiently manage this new, more complex environment. Like other parts of the virtual data center, these types of security capabilities and controls provide many of the same benefits of being able to quickly turn solutions on and off in near real-time. In an on-demand world, organizations pay for the virtual instances that they consume, so they can better balance their financial outlay with the actual need at any one time. 

According to Gartner, by 2015 over 20 percent of the VPN/firewall market will be deployed in a virtual format.

The Many Benefits

Yet many enterprises are still contemplating why, when and how to deploy virtual services like firewalls, often due to not knowing when to keep physical systems and where virtual versions are more appropriate. When discussing security needs with companies and the topic of if they should “go virtual” comes up, I always tell them to think of virtual services not as a replacement for physical appliances, rather as an essential additional support to increase protection for their evolving networks.

There are certainly several benefits to taking the dive into the virtual world when it comes to security and firewalls in particular.

Virtualized security brings a simple, on-demand deployment model to the network, which can often significantly reduce ongoing operational expenses. There is no box to unpack, no machine to configure and no chassis to install, making deployment much easier and cost effective.

Virtual firewalls are also much simpler to manage and update from a centralized management system, making it easier to ensure security policies remain consistent across a distributed environment. Further, the ability to create customized security controls for different virtual machines based on the needs of customers or the sensitivity of information ensures that proper protections are in place.

Advertisement. Scroll to continue reading.

How to Choose?

When considering virtual firewall choices, companies should keep in mind that it is necessary to ensure the management system can support consistent policies across both physical and virtual systems. Every business has its own solidified policies established for the network, describing which groups or employees have access to specific apps, vLans or files. It’s important to make sure the virtual security services being considered can support consistent policies and are easy to manage.

Virtualization is clearly upon us and it is in the best interest of companies to make an effort to educate themselves on how virtualized security services can play into the mix and secure networks. More often than not, businesses will learn that the easier, faster and more nimble security features that are provided with a virtual environment are worth the investment, and that greater risk might be lurking without adoption as attackers become more intelligent. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...