Expert Q&A: Establishing a Secure Data Center and Cloud with Remote Access

*Editor’s Note: This is Part One of an article that originally appeared in The Data Center Journal’s  Industry Perspective Column By: Rainer Enders, VPN Expert and CTO, Americas, at NCP engineering: Industry Perspective: What are some of the main security concerns for data center managers today? Rainer Enders: The evolution of modern data centers, while beneficial for many reasons, is exposing serious security pain points along the way. For one, as data centers grow in size to keep up with enterprise computing needs, it becomes increasingly difficult for IT managers to adequately protect all corporate assets, which include everything from data and documentation to software and supplies. As capacity expands, data center managers are finding it harder to maintain critical IT compliance and security measures, such as managing and de-provisioning privileged user access, and running compliance reports that are growing in both depth and volume. Additionally, with the rising popularity of virtualized and cloud environments, data center managers are tasked with baking security into all compute, network, storage and hypervisor layers. This is a considerably difficult task, in light of the numerous emerging attack vectors that constantly increase in sophistication, such as ever-morphing advanced persistent threats (APTs) that are compromising critical corporate information. IP: What specific security challenges arise as companies outsource to the cloud and rely on remote services with increasing frequency? RE: The most critical security challenges that arise in cloud deployments are compromises to remote access connections—in the form of session-hijacking attacks, for example—and compromises of cloud-hosted resources, such as virtual machines, from within the hosted provider network. Insufficient security architectures and controls in operator networks can cause...

What We’re Reading: Week of 1/21

CIO – IT Decision-Makers says Embrace BYOD or Be Left Behind Dark Reading – Avoiding IAM’s Biggest Blunder Network World – Are federal agency workers going rogue with personal devices? SearchEnterpriseWAN – Preparing for a disaster: When remote employees overload your...

What We're Reading: Week of 1/21

CIO – IT Decision-Makers says Embrace BYOD or Be Left Behind Dark Reading – Avoiding IAM’s Biggest Blunder Network World – Are federal agency workers going rogue with personal devices? SearchEnterpriseWAN – Preparing for a disaster: When remote employees overload your...

What We’re Reading: Week of 12/31

CSO – Could China blocking VPNs lead to spying on business? IT Business Edge – BYOD in 2013: Yes, It Is Going to Get Worse Ars Technica – IPv6 takes one step forward, IPv4 two steps back in 2012 eWeek – Targeted Attacks, Weak Passwords Top IT Security Risks in...

What We're Reading: Week of 12/31

CSO – Could China blocking VPNs lead to spying on business? IT Business Edge – BYOD in 2013: Yes, It Is Going to Get Worse Ars Technica – IPv6 takes one step forward, IPv4 two steps back in 2012 eWeek – Targeted Attacks, Weak Passwords Top IT Security Risks in...

What We’re Reading: Week of 12/17

CNET – Four security trends defined 2012, will impact 2013 eWeek – BYOD, Social Media Among Top Security Threats of 2013 CSO – The week in security: Attacks continue; are you ready for 2013? IT Business Edge – How to Approach Mobile Security in...