Vaduvala's Blog (1)

Models used in micro-segmentation

The security protocols implemented when a workload was first deployed in a changing environment will no longer be enforceable after a short while. The situation is mostly common in scenarios where the policy relied on loose associations. Examples of loose associations with workloads include protocol, port, and IP address. The challenge of maintaining this persistent security is aggravated by workloads to the hybrid cloud, or even other data centers.

Administrators are given more…

Continue

Added by vaduvala on October 31, 2018 at 4:34 — No Comments

Most Popular Blog Posts

Monthly Archives

2018

© 2019   Created by Brenda Day.   Powered by

Badges  |  Report an Issue  |  Terms of Service