Alan Z. Uster - Fotolia
Twenty-five gigabit Ethernet is growing in popularity. Do you think it will replace 10 GbE? Are there security implications of 25 GbE we should be aware of?
When it comes to networking, the faster the better -- at least for me. That way I can get my security assessments performed more quickly. This new 25 gigabit version of Ethernet will most certainly help -- if it ever makes it to mainstream. I'm just now seeing many enterprises complete their rollouts of Gigabit Ethernet, so I suspect we're still years away from seeing 25 GbE (or the formal standard, 40 GbE and 100 GbE) outside of data centers and in the mainstream.
The practical side of me sees 25 GbE as having the same security issues as all of its predecessors:
- Default configurations -- such as passwords and open Web interfaces -- can be manipulated and subsequently have to be locked down via security standards and policies that have been around forever.
- Unencrypted traffic flowing across the wire that can be easily intercepted by anyone on your network with some free tools and bit of ill intent.
- Third-party security controls and network management systems such as security information and event management, intrusion prevention and network analyzers that may not be compatible.
The more things change with information technology, the more we're seeing how important the security basics really are. While the blazing speeds will offer benefits, such as being able to run network assessments at a quicker pace, the same security challenges are going to occur that much faster with 25 GbE. Are you -- and your systems -- ready to drink from that fire hose?
Ask the Expert!
Want to ask Kevin Beaver a question about network security? Submit your question now via email! (All questions are anonymous.)
Learn more about using 25 gigabit Ethernet
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Kevin Beaver
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
Compare host IDS vs. network IDS through the pros and cons of each, and learn how more modern systems may be better suited to ensure effective ... Continue Reading
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.