Story image

Top security tips for virtualisation

28 Nov 14

Hamish Soper, Check Point Software Technologies New Zealand country manager, offers tips for virtualising business-critical appliances and applications like security services.

Virtualisation is now commonplace, with many New Zealand organisations capitalising on the advantages it brings: standardisation, simplification, consolidation and control.

As virtualisation rapidly continues to provision and support new services, the security concerns and challenges surrounding virtualisation should be addressed throughout planning and implementation.

There are many opportunities available to the New Zealand channel when virtualising security services for customers.

Security for virtualised environments Virtualised technologies consolidate critical applications onto one physical server, which can result in a single point of failure.

A new class of security challenges is met when securing the virtualised environment. A complete server consolidation or data centre modernisation proposal should treat security virtualisation like any other OS evaluation. This includes requiring an agile and dynamic configuration that has been field-tested in commercial environments.

Audit capabilities The preservation of event logs and audit capabilities depends entirely on the quality of the security virtualisation infrastructure and the effort invested in making it seamless with diagnostic and transaction logs.

Virtualised security services such as firewalls and authentication must be designed with the same logging capabilities as conventional appliances and applications. Virtualised servers can provide full event and transaction detail and segregation of customer data including meeting regulatory requirements for logging and audit trails.

Virtual security platforms Security runs on virtual machines in a virtualised environment. The same economic and operational benefits that apply to virtualising business and web application servers and databases are even more applicable and important for virtualising security services.

Business considerations Virtualisation is an effective technology for consolidation, scalability and provisioning.

Businesses should apply virtualisation as a measured approach in determining the platform, location and modelling of their service security. Ineffective use of virtualisation can, for example, inhibit enablement and life cycle management by way of conflicting service level agreements and change mechanisms between virtual instances sharing the same hardware.

Scalability The process of virtualising is about understanding its application to current and future states, depending on the business requirement. That is, a business utilising virtualisation to consolidate their internal systems should define a scalable solution measured by internal business growth.

This will be much different to a business providing the service of virtual infrastructure, who should instead define a scalable solution measured by their marketable product growth.

In all scenarios, scalability is the combined consideration of base hardware, core technology, memory capacity and software features against the number and, most importantly, size of each environment or service to be virtualised.

Most IT environments have security service appliances or applications that are underutilised much of the time. In addition to the opportunity to reduce physical space requirements, the New Zealand channel can help customers’ security teams yield lasting productivity benefits from the ability to centrally create, configure and manage enterprise-wide security services in a virtualised environment.

Kiwis make waves in IoT World Cup
A New Zealand company, KotahiNet, has been named as a finalist in the IoT World Cup for its River Pollution Monitoring solution.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
How SMBs can use data to drive business outcomes
With the right technology, companies can capture consumer, sales, and expense data, and use it to evaluate and construct future plans.
Survey shows that IoT is RoI across Asia Pacific
A recent Frost & Sullivan survey across Australia, Hong Kong and Singapore shows that IoT deployment improves business metrics by around 12%.
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.