adimas - Fotolia
I've been reading about self-healing networks, and I'm curious if there are any security benefits to the technology beyond optimizing network operations. How do self-healing networks function, and what are the key concepts of a self-healing network that can be integrated into an enterprise security strategy?
The concept of self-healing networks is something that goes back to some of the earlier days of networking. When I was starting out in my IT career, I recall FDDI and SONET technologies having the ability to "failover" if network communication problems occurred. The same concepts -- and technologies -- are still around today in the form of self-healing networks.
In terms of security and business continuity, the name of the game for self-healing networks today is resiliency. This means being able to withstand and/or quickly recover from malware, denial-of-service and other related attacks. Some of this resiliency can be leveraged through back-end communications via traditional ISPs and colocation providers. However, much of the redundancy and resiliency is now handled by virtualization, the cloud and software-defined networking. You could even say that Gigabit Ethernet is a form of this resiliency (or an alternative to cloud, virtualization and SDN) given its cost and pervasiveness in business.
Self-healing network technologies can certainly be a part of any enterprise security strategy. It all depends on the specific nature of the business, additional redundancies built in, and overall level of risk tolerance. If anything, it pays to be thinking about these areas -- especially in terms of business continuity and incident response.
Ask the Expert:
Have a question about network security? Send it via email today. (All questions are anonymous.)
Learn more about implementing robust network design projects
Dig Deeper on Information Security Incident Response-Information
Related Q&A from Kevin Beaver
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Several vulnerabilities were recently discovered in Android bootloaders via the BootStomp tool. Kevin Beaver explains how they work and what risk ... Continue Reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.