Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
Why Microsegmentation Should Be #1 In Your Security Strategy
May 01, 2017 | By Ari Chakrabarti @ Financial Institution Consulting
Online viewer:
Comments (0)
20

We are pleased to share with you all an interesting article contributed by Ari Chakrabarti. 

 
 

Ari Chakrabarti

Technical Account Management

at Financial Institution Consulting

 

All Articles by Ari Chakrabarti

 
     
  How to contribute your article to Netmanias.com !  
     
  List of Contributors  

 

 
     
 

Saw this image below today and honestly I see some customers really using this as their security policy. Surprising? But it’s stunningly true. So thought about crafting this Microsegmentation article that most of the customers either avoids or take a half-baked approach at.  

 

 

Let’s start by setting a baseline of what Microsegmentation is about. You may see many different definitions of Microsegmentation, Nano Segmentation, uSegmentation etc etc as you deal with different vendors trying to sell their products. In simple terms, Microsegmentation allows a flexible and optimized way of providing security services to the places where traditional security technologies can’t reach or don’t scale. Microsegmentation can be equally applied to Virtual as well as Bare Metal workloads or Overlay / Underlay Networks.

 

I still see a lot of confusion about Microsegmentation; especially questions like “Do I really need it?” The simple answer is “You Absolutely Do”.

 

Looking at varying range of customers all the way from Fortune 100 Financial Giants to Local Government Agencies; one thing is very clear, if you really understand the security space, Microsegmentation should be your number one priority. Now let me back up my statement why you should make Microsegmentation as your number one priority.

 

Security needs to a be constant with changing networking variable

 

Mobility is standard in every well designed network. Be in a form of disaster recovery or resource pooling or just another multi datacenter design. Mobility of workloads is not only limited to within enterprises but as get more and more cloud oriented; mobility needs to flow from on-prem infrastructure to cloud; both private and public.

 

So when you work loads and applications are mobile in nature, how you really enforce the security irrespective of the location. It really gets tedious to reconfigure everything to enforce the same security measures when you application moves from on-prem to cloud or moves from primary to secondary datacenters.

 

Microsegmentation makes it easier not only to enforce these security policies irrespective of location but also provides a simpler way to configure once and reuse again methods. Microsegmentation abstracts the workload characteristic from its IP addresses, VLAN, Subnets etc. It also enable networks to combine these characteristics to define inherited policy attributes.

 

Security Needs to Be Ubiquitous

 

We prioritize security for important workloads, often at the cost of neglecting lower priority systems. Firewall appliance based traditional network security is expensive to deploy and manage which forces security teams to ration security. Cyber Attackers exploit this, targeting systems with low to zero security protection as their penetration point into a data center.

 

 

With the exponential increase in the cyber attacks high level of security needs to be available to every system/node in the data center. Microsegmentation makes this possible by embedding security functions into the workloads; itself, both virtual or bare metal.

 

Adaptive Security with Zero Trust Model

 

Another key aspect of Microsegmentation is to adapt to evolving network situations. As we are moving from Bare Metal to Virtualized to Containerized model the attack surfaces and threats also keeps evolving. 

 

 

In this evolving environment, Microsegmentation enables us to extend capabilities by integrating additional security functions into their portfolio of defense for instance we can implement stateful firewalling distributed throughout the data center, but add next-gen firewall and IPS for deeper traffic visibility. What Microsegmentation also enables us is to extend the reach of Next gen Firewalls to reach all the way to the application stack or in some cases the kernel of the hypervisor, where typical appliance based Firewalls can never reach. Doing so, it provides the best of both worlds, native Microsegmentation as well as Physical/SVM based Next Gen Firewalls.

 

Whether you're planning your cloud migration strategy or already in the cloud, making accurate cloud decisions requires a deep analytical approach.

 

How Sub-Optimized Security Strategy Affects Business

 

Research shows that more than 30 percent of data center outages are caused by cyber-attacks, and a 60 minute outage can cost businesses upwards of half a million dollars . Cyber threats are coordinated attacks that often include months of reconnaissance, vulnerability exploits, and “sleeper” malware agents that can lie dormant until activated by remote control. Despite increasing types of protection at the edge of data center networks – including advanced firewalls, intrusion prevention systems, and network-based malware detection – attacks are succeeding in penetrating the perimeter, and breaches continue to occur.

 

Putting a number on the cost of cybercrime and cyberespionage is the headline, but the dollar figure begs important questions about the damage to the victims from the cumulative effect of losses in cyberspace. The cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen—incidents in the last year include more than 40 million people in the US, 54 million in Turkey, 20 million in Korea, 16 million in Germany, and more than 20 million in China. One estimate puts the total at more than 800 million individual records in 2013.2 This alone could cost as much as $160 billion per year.3 Criminals still have difficulty turning stolen data into financial gain, but the constant stream of news contributes to a growing sense that cyber crime is out of control.

 

 

The statistics cannot obviously be comprehensive, but the purpose is just to give an overview of the threat landscape. That being said, it’s time to analyze the data!

 

In comparison to 2015, 2016 have collected a slightly larger number of events (1061 vs 1017). The Monthly attack chart shows that the level of activity was similar in the first 5 months. Then 2016 experienced a peak in the central months, and starting from September, 2015 registered a more consistent activity, at least until December when 2016 experienced a new tail of events.

 

How to Choose the Right Vendor

 

There are a myriad of vendors promising the Microsegmentation Utopia. The major key differences are:

  • Native Microsegmentation vs Hybrid
  • Third Party
  • Application OS Agents

 

Native Microsegmentation vs Hybrid

 

VMWare NSX leads the chart here where Microsegmentation is baked into the hypervisor as a part of the kernel model. This is the most optimal model, where NSX Distributed Firewall Model is embedded right on the vNICs of every virtual workload. This where a packet first interacts with the network, overlay or underlay. Essentially this turns every vNIC pair into 18-38Gbps (based on 10 vs 40G NICs) Firewall right on the VM with a unified single pane of glass management.

 

 

The ideal solution to complete datacenter protection is to protect every traffic flow inside the data center with a firewall and only allow the flows required for applications to function. This is also known as the Zero Trust model. Achieving this level of protection and granularity with a traditional firewall is operationally unfeasible and cost prohibitive, as it would require traffic to be hair-pinned to a central firewall and virtual machines to be placed on individual VLANs (also known as pools of security).

 

Third Party

 

PaloAlto Panorama leads the chart here. Panorama network security management enables you to control your distributed network of our firewalls from one central location. View all your firewall traffic, manage all aspects of device configuration, push global policies, and generate reports on traffic patterns or security incidents; all from a single console.

 

 

Application OS Agents

 

Illumio is a segment leader here. The Illumio Adaptive Security Platform is the first cybersecurity system that delivers unprecedented live visibility and Microsegmentation services across the broadest range of computing assets (bare-metal, virtualized platforms, containerized workloads and behind network devices) and environments (data centers, private and public clouds) by delivering the optimal security for every workload and application running across the application environments. The patented Policy Compute Engine (PCE) is the only system that adapts in real-time to changes in your applications environment—whether that is the movement of workloads, changes to security policies, or unauthorized communications among your applications communications among your applications.

 

 
     
Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
Related Contents
07/10/2017
Netmanias Blog
01/18/2017
Netmanias Blog
01/06/2017
Netmanias Blog
09/22/2016
Netmanias Blog
09/05/2016
Netmanias Blog
 
 
 
 

[HFR Private 5G: my5G]

 

Details >>

 

 

 

     
         
     

 

     
     

Subscribe FREE >>

Currently, 55,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file

     
     

 

     
         
     

 

 

 

View All (858)
4.5G (1) 5G (102) AI (8) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) BSS (1) Big Data (2) Billing (1) Blockchain (3) C-RAN/Fronthaul (18) CDN (4) CPRI (4) Carrier Ethernet (3) Charging (1) China (1) China Mobile (2) Cisco (1) Cloud (5) CoMP (6) Connected Car (4) DHCP (5) EDGE (1) Edge Computing (1) Ericsson (2) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (56) KT (43) Korea (20) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LSC (1) LTE (78) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MEC (4) MPLS (2) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (21) Network Slice (1) Network Slicing (4) New Radio (9) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) Private 5G (11) QoS (3) RCS (4) Railway (1) Roaming (1) SD-WAN (17) SDN/NFV (71) SIM (1) SK Broadband (2) SK Telecom (35) Samsung (5) Security (16) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (31) YouTube (6) blockchain (1) eICIC (1) eMBMS (1) iBeacon (1) security (1) telecoin (1) uCPE (2)
Password confirmation
Please enter your registered comment password.
Password