Vaduvala's Blog (1)

Models used in micro-segmentation

The security protocols implemented when a workload was first deployed in a changing environment will no longer be enforceable after a short while. The situation is mostly common in scenarios where the policy relied on loose associations. Examples of loose associations with workloads include protocol, port, and IP address. The challenge of maintaining this persistent security is aggravated by workloads to the hybrid cloud, or even other data centers.

Administrators are given more…


Added by vaduvala on October 31, 2018 at 4:34 — No Comments

Most Popular Blog Posts

Monthly Archives


© 2020   Created by Brenda Day.   Powered by

Badges  |  Report an Issue  |  Terms of Service