When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.
The best way to achieve public, private, hybrid and multicloud interconnection is to first leverage smaller, distributed, connected data centers at the digital edge.
Interestingly DDoS attacks have moved beyond the simple large volume attacks of yore to sophisticated, dynamic combinations of stealthy multi-vector application-level attacks and even campaigns of attacks that morph while they’re in progress. This requires a multi-layered approach to your DDoS security that includes on-premises, in-line protection and intelligent communication with your ISP or MSP, so it knows to deploy its own DDoS defenses when necessary.
To tackle latency issues, many organizations have started placing significant portions of their application and IT infrastructure at the digital edge where they are close to globally dispersed users, partners and cloud services.
“Collaborative communities” harness the power of proximity not only to meet the demands of the digital economy, but to exceed them.
Networking at the Edge: Simplify your topology to increase network performance, resiliency and scalability
To accelerate your IOA strategy for networking, we offer a “Network Blueprint.” This guide lays out the steps you can take to address latency, bandwidth and security issues by deploying a more distributed network infrastructure out at your enterprise’s digital edge, where population centers (customers, employees, partners) and digital ecosystems (clouds, mobile, social networks, B2B partners) meet.
Our use of application isolation, containers and microservices continues to evolve at Equinix to streamline and scale the development of our interconnection solutions and colocation data center monitoring services, such as IBX SmartView, for our more than 8,000 customers.
Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.
By mixing and matching your company's business needs to the best cloud services, you have the opportunity to create a more agile, flexible and scalable IT service delivery infrastructure that better supports your organization's digital business goals. But are you making the most out of this new dynamic, digital environment?
In September, a series of attacks included an assault on the French web hosting company OVH that reached a once inconceivable 1.1 terabits per second. And the very next month, an attack on the web infrastructure provider Dyn topped that, reportedly hitting 1.2 terabits per second.