* Modern data centers have ‘porous perimeter’ - with specific security issues Medieval cities were built like fortresses: city walls separated “insiders” from “outsiders,” with the city gate acting as a single point of access control. Similarly, data centers used to be located in an organization’s headquarters, with a clear security perimeter, and a single ingress/egress firewall to control access.Alas, the modern data center is more like a modern city, with millions of entry points and connections through which both employees and partners gain access. Generally referred to as the “porous perimeter,” this architecture has important security implications.Employees may be accessing the data center from their office desktops over a LAN, the branch office over the WAN, a home DSL connection, a cell phone, a PDA and so forth. (According to our research, more than 87% of employees work outside of headquarters and access the data center remotely.)Moreover, access to the data center is not restricted to employees. Partners, clients, contractors and other third parties also access the data center, and they often do so through the same connection as the employees. That is, a single Internet connection may carry hundreds of connections for internal and external users of your data center. How do you keep data safe in such an environment? Deploy identity-management-based security. Identity management products distinguish between internal and external users so that you can authorize the appropriate level of access for each, while providing a common set of management tools to manage accounts across the enterprise.These tools consist of several components: * Provisioning and account management tools.* Directory servers to store and cross-reference identity information.* Authentication tokens or agents for various endpoint devices.Vendors such as RSA, Sun, Novell, IBM and Oblix offer products for identity management, and interest in the deployment of them is huge. According to our research, more than 70% of IT executives we asked have already deployed identity management suites, or are actively evaluating the technology for deployment within the next 12 months.For more information about effective identity management, see Nemertes Research’s upcoming benchmark series “Externalizing The Enterprise” due out in June. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe