CloudVision from Arista Ensures Agility and Cloud Security across any Workloads
SANTA CLARA, CA: Taking the Cloud legacy forward, Arista Networks introduces an enhanced capability for CloudVision, Macro-Segmentation Services (MSS).The software offers secure cloud networking while enabling the next-generation firewalls and application Delivery Controllers to function automatically for specific workloads and workflows.
The networking topology over which the technology will operate includes Layer-2, Layer-3 and overlay network virtualization frameworks. It bridges the gap between virtual and physical networks and delivers on the security and network segmentation requirements for complex and dynamic cloud networks. MSS balances itself between the current security deployment models where the embedded security in virtualization hypervisiors addresses inter-VM communication and physical firewalls addresses the north-south traffic.
Arista undertakes the responsibility in improving the security concerns of data centers, by integrating with several industry leaders such as Check Point, F5 Networks, Fortinet, Palo Alto Networks and VMware to provide a strategic development.
Being location independent, MSS allows larger data centers to centralize and insert security in the path between workloads on demand. The agile software helps services dynamically move with them to secure the deployment model.
Powered by Arista CloudVision, MSS helps in maintaining a network-wide database of all state within the network. In addition, it covers direct integration with hypervisor resources like VMware vSphere and NSX. The self sufficient tool makes itself aware of all workloads within the network and collects information on a real-time basis about new devices or workloads that are added or removed from the network servers.
Micro-segmentation leverages fine-grained inter-hypervisor security for cloud networks by enabling dynamic security and services of physical to virtual workloads. Arista’s MSS responds accordingly to the demand of security policy while working in a particular logical network topology. It’s automation capabilities helps in successful deployment of security in an enterprise private or hybrid cloud.