{"id":49182,"date":"2015-07-10T00:00:00","date_gmt":"2015-07-10T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/how-network-virtualization-is-used-as-a-security-tool\/"},"modified":"2015-07-30T12:02:10","modified_gmt":"2015-07-30T12:02:10","slug":"how-network-virtualization-is-used-as-a-security-tool","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/2\/31250\/trends\/how-network-virtualization-is-used-as-a-security-tool","title":{"rendered":"How Network Virtualization is Used as a Security Tool"},"content":{"rendered":"
Network virtualization<\/a> has picked up a lot of speed, and providers are looking for new attractions for potential clients. If faster, simpler network management<\/a> isn\u2019t compelling enough, industry leaders like VMware<\/a> and Microsoft are offering new security features for the safety-minded. This new feature can be a major benefit to both early adopters and those looking to try their hand at network virtualization.\n<\/p>\n The speed and efficiency provided by network virtualization may seem overwhelming to those who are unfamiliar with the software, and can be particularly daunting for small businesses. But with security spearheading VMware\u2019s and Microsoft\u2019s lists of benefits, the technology may be more palatable to smaller companies. But how does it work exactly? How can network virtualization protect your business?\n<\/p>\n In the pre-virtualization days, companies used high-power firewalls<\/a> to protect against data breaches<\/a> and outside attacks. But with the shift of data centers toward software-heavy systems, this is no longer an option. Network virtualization is often a patchwork of different products that may require specific and unique protocols to function. Managing a large number of firewall permissions for a variety of software can be a formidable task \u2014 and largely a waste of time.\n<\/p>\n In response to this need for comprehensive, holistic security, VMware introduced micro-segmentation<\/a> and its NSX platform. Using a \u201czero trust\u201d strategy, this security protocol allows you to assign network-specific policies that regulate the flow of incoming and outgoing traffic. Because each network has a unique security protocol, even if it\u2019s infected, the threat won\u2019t be able to travel freely between networks to affect the rest of your system.\n<\/p>\nHow It Works<\/span><\/h2>\n