-
Micro-segmentation For Dummies [VMware edition]下载
资源介绍
Title: Micro-segmentation For Dummies [VMware edition]
Author(s): Lawrence Miller; Joshua Soto
Series: For Dummies
Publisher: John Wiley & Sons City: Hoboken, NJ
Year: 2015
Language: English
Pages (biblio\tech): 77\77
ISBN: 9781119177340 9781119177357
This book provides a broad overview of micro-segmentation in the data center. After reading this book, you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)!
Table of contents :
Title Page......Page 3
Copyright Page......Page 4
Table of Contents......Page 5
Introduction......Page 7
Foolish Assumptions......Page 8
Where to Go from Here......Page 9
Data Breaches Continue to Occur......Page 11
The Lifecycle of a Data Center Attack......Page 12
Throwing Stones at the (Data Center) Perimeter Walls......Page 15
Limiting Lateral Movement within the Data Center......Page 21
Visibility and context......Page 23
Isolation......Page 24
Segmentation......Page 26
Automation......Page 27
Persistence......Page 29
Extensibility......Page 30
Balancing Context and Isolation......Page 31
Implementing Least Privilege and Unit-Level Trust with Micro-segmentation......Page 32
What Micro-segmentation Is Not......Page 33
Key Forces Driving the Need for Data Center Transformation......Page 37
Transforming Your Data Center with Network Virtualization......Page 40
How Network Virtualization Works......Page 42
Essential Elements for Network Virtualization......Page 45
Just planes — no trains or automobiles......Page 46
Encapsulation......Page 47
Creating Security Policies for the Software‐Defined Data Center......Page 51
Network‐based policies......Page 52
Application‐based policies......Page 53
Adapting to Change......Page 54
Responding to Threats......Page 55
Firewalling Tens of Thousands of Workloads with a Single Logical Firewall......Page 57
Achieving Micro‐segmentation......Page 59
Identify patterns and relationships......Page 61
Security Use Cases......Page 62
Network security inside the data center......Page 63
Secure user environments......Page 64
Minimize Risk and Impact of Data Center Security Breaches......Page 67
Automate IT Service Delivery and Speed Time to Market......Page 68
Enable Advanced Security Service Insertion, Chaining, and Traffic Steering......Page 69
Leverage Existing Infrastructure......Page 70
Lower Operating Expenses......Page 72
Securely Enable Business Agility......Page 73
EULA......Page 77