Twenty-five gigabit Ethernet is growing in popularity. Do you think it will replace 10 GbE? Are there security...
implications of 25 GbE we should be aware of?
When it comes to networking, the faster the better -- at least for me. That way I can get my security assessments performed more quickly. This new 25 gigabit version of Ethernet will most certainly help -- if it ever makes it to mainstream. I'm just now seeing many enterprises complete their rollouts of Gigabit Ethernet, so I suspect we're still years away from seeing 25 GbE (or the formal standard, 40 GbE and 100 GbE) outside of data centers and in the mainstream.
The practical side of me sees 25 GbE as having the same security issues as all of its predecessors:
- Default configurations -- such as passwords and open Web interfaces -- can be manipulated and subsequently have to be locked down via security standards and policies that have been around forever.
- Unencrypted traffic flowing across the wire that can be easily intercepted by anyone on your network with some free tools and bit of ill intent.
- Third-party security controls and network management systems such as security information and event management, intrusion prevention and network analyzers that may not be compatible.
The more things change with information technology, the more we're seeing how important the security basics really are. While the blazing speeds will offer benefits, such as being able to run network assessments at a quicker pace, the same security challenges are going to occur that much faster with 25 GbE. Are you -- and your systems -- ready to drink from that fire hose?
Ask the Expert!
Want to ask Kevin Beaver a question about network security? Submit your question now via email! (All questions are anonymous.)
Learn more about using 25 gigabit Ethernet
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Kevin Beaver
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ... Continue Reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can... Continue Reading
Several vulnerabilities were recently discovered in Android bootloaders via the BootStomp tool. Kevin Beaver explains how they work and what risk ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.