Cover Image
市場調查報告書

虛擬化網路環境的安全

Security in a Virtualized Network Environment

出版商 Heavy Reading 商品編碼 341696
出版日期 內容資訊 英文 29 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
虛擬化網路環境的安全 Security in a Virtualized Network Environment
出版日期: 2015年10月09日 內容資訊: 英文 29 Pages
簡介

安全的問題對ICT產業來說是多年的課題,且事態隨時持續變化。因此,很多產業相關人員有「網路和應用的虛擬化,給予安全和基礎設施怎樣的影響?」的疑問也不奇怪。隨著網路業者推動網路的虛擬化和雲端發展,需要為新安全風險的出現作好準備。

本報告提供虛擬化網路的發展伴隨的安全對策相關分析,網路的虛擬化對ICT產業的各部門 (含安全) 的影響,假定的課題與對策,通訊電信業者的支援體制,相關企業簡介與支援情形等相關調查。

第1章 摘要整理

  • 分析的要點
  • 分析對象企業

第2章 虛擬化帶來安全的變化

  • 電信業者、網路
  • 企業用安全服務

第3章 在虛擬化世界的安全處理

  • 課題
  • 解決的辦法

第4章 支撐電信業者的存在

第5章 企業簡介

  • Alcatel-Lucent
  • Arbor Networks
  • Check Point Software
  • Cisco Systems
  • Ericsson
  • Fortinet
  • Juniper
  • Nokia
  • Oracle
  • Palo Alto Networks
  • Sandvine
  • Sonus Networks
  • Wedge Networks
  • ZTE

第6章 結論

用語一覽

目錄

Over the last year or so, security of networks of all kinds has risen up the news agenda as evidence of major information and communications technology (ICT) systems being compromised or data stolen come to light. Scarcely a week goes by without another story. And if security has become one of the major real-world tech storylines, then virtualization has matched it for newsworthiness inside the telecom industry.

So it is not surprising that many inside telecom are asking: "What is the impact on security of virtualizing network functions and the infrastructure on which applications run and from where services are delivered? Will virtualization help or hinder efforts to be secure? Will security have to be completely rethought, or do the same principles apply in a virtualized world as in the physical?"

As network operators forge ahead with efforts to virtualize and distribute their network functions, as well as build new sets of services from resources within their data centers and from elsewhere, they are discovering that these processes potentially open up their networks to new types of security risk. At the same time, operators can see the opportunities they have to help their business customers with security: It's a pressing concern for businesses of all sizes - and something that many do not have the skills or resources to keep on top of for themselves.

Network, application and data security is under the spotlight as never before. And the open nature of "the cloud" means that it's not possible to simply build higher walls and dig deeper moats round network infrastructure. Much of the old thinking needs to be jettisoned. It will be a wise operator that calls in advice from those that have done the deepest thinking and that can demonstrate the most credible vision. The stakes are very high.

Security in a Virtualized Network Environment considers how virtualization changes the state of security in telecom, both from the perspective of carriers' own network security and the opportunities that arise to deliver managed security services to business customers. It digs into the challenges of securing virtualized and hybrid network environments, as well as the approaches, solutions and products that are being suggested and deployed. It reviews the supply-side landscape for relevant products and profiles 14 leading suppliers, ranging from large network equipment providers to smaller specialists.

There is a very broad range of solutions to these challenges proposed by vendors, which generally fall into one or more of the domains shown in the following excerpt. The space is complex and no hierarchy is assumed - virtualization tends to collapse and blur layered models. Some vendors position their solutions within more defined layers, which can be seen in figures later in the report.

Excerpt:
Where Security Can be Addressed as
Services & Network Functions Virtualize

                        Source: Heavy Reading

Security in a Virtualized Network Environment is published in PDF format.

Table of Contents

1. EXECUTIVE SUMMARY

  • 1.1. Key Findings
  • 1.2. Companies in This Report

2. HOW VIRTUALIZATION CHANGES SECURITY

  • 2.1. Carrier Networks
  • 2.2. Enterprise Security Services

3. DEALING WITH SECURITY IN A VIRTUALIZED WORLD

  • 3.1. The Challenges
  • 3.2. The Solutions

4. WHO IS HELPING CARRIERS

5. COMPANY PROFILES

  • 5.1. Alcatel-Lucent
  • 5.2. Arbor Networks
  • 5.3. Check Point Software
  • 5.4. Cisco Systems
  • 5.5. Ericsson
  • 5.6. Fortinet
  • 5.7. Juniper
  • 5.8. Nokia
  • 5.9. Oracle
  • 5.10. Palo Alto Networks
  • 5.11. Sandvine
  • 5.12. Sonus Networks
  • 5.13. Wedge Networks
  • 5.14. ZTE

6. CONCLUSION

TERMS OF USAGE

SECURITY VIRTUALIZATION SERVICE PROVIDERS COVERED (14)

  • Alcatel-Lucent (NYSE: ALU)
  • Arbor Networks, part of Tektronix Inc., a subsidiary of Danaher Corp. (NYSE: DHR)
  • Check Point Software Technologies Ltd. (Nasdaq: CHKP)
  • Cisco Systems Inc. (Nasdaq: CSCO)
  • Ericsson AB (Nasdaq: ERIC)
  • Fortinet Inc. (Nasdaq: FTNT)
  • Juniper Networks Inc. (NYSE: JNPR)
  • Nokia Corp. (NYSE: NOK)
  • Oracle Corp. (NYSE: ORCL)
  • Palo Alto Networks Inc. (NYSE: PANW)
  • Sandvine Inc. (TSE: SVC)
  • Sonus Networks Inc. (Nasdaq: SONS)
  • Wedge Networks Inc.
  • ZTE Corp. (SHE: 000063)
Back to Top