CloudVision from Arista Ensures Agility and Cloud Security across any Workloads
SANTA CLARA, CA: Taking the Cloud legacy forward, Arista Networks introduces an enhanced capability for CloudVision, Macro-Segmentation Services (MSS).The software offers secure cloud networking while enabling the next-generation firewalls and application Delivery Controllers to function automatically for specific workloads and workflows.
The networking topology over which the technology will operate includes Layer-2, Layer-3 and overlay network virtualization frameworks. It bridges the gap between virtual and physical networks and delivers on the security and network segmentation requirements for complex and dynamic cloud networks. MSS balances itself between the current security deployment models where the embedded security in virtualization hypervisiors addresses inter-VM communication and physical firewalls addresses the north-south traffic.
Arista undertakes the responsibility in improving the security concerns of data centers, by integrating with several industry leaders such as Check Point, F5 Networks, Fortinet, Palo Alto Networks and VMware to provide a strategic development.
Being location independent, MSS allows larger data centers to centralize and insert security in the path between workloads on demand. The agile software helps services dynamically move with them to secure the deployment model.
Powered by Arista CloudVision, MSS helps in maintaining a network-wide database of all state within the network. In addition, it covers direct integration with hypervisor resources like VMware vSphere and NSX. The self sufficient tool makes itself aware of all workloads within the network and collects information on a real-time basis about new devices or workloads that are added or removed from the network servers.
Micro-segmentation leverages fine-grained inter-hypervisor security for cloud networks by enabling dynamic security and services of physical to virtual workloads. Arista’s MSS responds accordingly to the demand of security policy while working in a particular logical network topology. It’s automation capabilities helps in successful deployment of security in an enterprise private or hybrid cloud.
Cloud Computing Changing Management
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....