I've been reading about self-healing networks, and I'm curious if there are any security benefits to the technology...
beyond optimizing network operations. How do self-healing networks function, and what are the key concepts of a self-healing network that can be integrated into an enterprise security strategy?
The concept of self-healing networks is something that goes back to some of the earlier days of networking. When I was starting out in my IT career, I recall FDDI and SONET technologies having the ability to "failover" if network communication problems occurred. The same concepts -- and technologies -- are still around today in the form of self-healing networks.
In terms of security and business continuity, the name of the game for self-healing networks today is resiliency. This means being able to withstand and/or quickly recover from malware, denial-of-service and other related attacks. Some of this resiliency can be leveraged through back-end communications via traditional ISPs and colocation providers. However, much of the redundancy and resiliency is now handled by virtualization, the cloud and software-defined networking. You could even say that Gigabit Ethernet is a form of this resiliency (or an alternative to cloud, virtualization and SDN) given its cost and pervasiveness in business.
Self-healing network technologies can certainly be a part of any enterprise security strategy. It all depends on the specific nature of the business, additional redundancies built in, and overall level of risk tolerance. If anything, it pays to be thinking about these areas -- especially in terms of business continuity and incident response.
Ask the Expert:
Have a question about network security? Send it via email today. (All questions are anonymous.)
Learn more about implementing robust network design projects
Dig Deeper on Information Security Incident Response-Information
Related Q&A from Kevin Beaver
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective ... Continue Reading
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger ... Continue Reading