The typical enterprise data center supports mission-critical applications and houses a high concentration of capital-intensive resources and confidential data—all connected to the inherently insecure Internet as well as internal users. That means securing the data center presents some unique requirements for failsafe security without compromising performance and availability for users. The need increases as enterprises discover new ways to exploit high-performance, Internet-empowered data centers:
- Ensure business continuity. Massive processing throughput and transport bandwidth now make it feasible to store primary and duplicate sets of critical data in multiple data centers
- Support critical business applications. Enterprises use data centers to host business applications, implement firewalls or virtual private networks, provide storage services and content delivery of static and streaming media, and more.
- Produce economies of scale on infrastructure.
Enterprises can consolidate or outsource data center functions, to centralize critical computing resources, create virtual data centers that span multiple locations, and reduce operational costs without the performance penalty or security concerns typically associated with remote access. The “closed” enterprise may outsource its Web presence to a third party, but “extended” and “open” enterprises are exposed to the Internet for customer access, business-to-business connectivity, and interworking with application service providers, disaster recovery providers, and more. There’s a big survival risk for companies that don’t Web-connect with extended communities yet there’s a big security risk for those that do. A comprehensive data center security strategy requires multiple, inter-working technologies, protocols, and procedures with partitioning among these functions provided by VLANs and firewalls.
Switched firewalls can now provide multi-gigabit throughput and state-of-the-art filtering to secure and safeguard data center servers without the performance degradation
Secure Sockets Layer (SSL) protocol—built into most browsers and Web servers—is widely used to protect communications to and from Web applications
Intrusion-detection, anti-virus, and content filtering tools provide essential protections for online commerce and remote computing in general.
Content filtering software
Layer 4 to 7 application switching
BTC Networks has partnered with the following vendors to offer best of Security Solutions for critical Data Canters.
Internet Security Systems (ISS)