Access your Pro+ Content below.
Security: The genesis of SDN
This article is part of the October 2013 Vol. 15 / No. 8 issue of Information Security magazine
Software-defined networking (SDN) is a rare case of technology led by security—a fact that hasn't received nearly as much attention as it deserves. The genesis of original ideas that led to SDN's creation occurred to Martin Casado, now VMware's chief technology officer of networking and security, just after 9/11 while he was working within the intelligence community on systems in incredibly secure settings. How do you build isolated groups of compute that have their own security policy, which remains invariant independent of where the VMs go? Martin Casado, chief technology officer of networking and security, VMware Casado realized that it was entirely possible to program a computer to deal with security at that level, but the same wasn't remotely true for the network. They were pretty much stuck with whatever networking vendors were selling and there wasn't much they could do to change it. In terms of operationalizing security networks, it was the weakest link. Casado took his ideas about improving enterprise network security ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.
In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.
Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues.
Columns in this issue
We've tallied the votes in our Readers' Choice Awards 2013. Find out the best security products of the year.
In his inaugural Security Economics column, Peter Lindstrom looks at technology risk management, and how to make the hard decisions pay off.
Iowa State University recruits industry professionals and hackers to provide students with "real-world" security education.