Independent Lab Tests Show Security In Virtualized Data Center, Cloud Computing Is Possible, Measurable

Independent test lab, Broadband Testing, and test and measurement leader, Spirent Communications, achieved a significant breakthrough in securing virtual environments and allaying user fears about cloud based applications.

A new report Secure Virtual Data Center Testing provides a detailed account of how HP TippingPoint’s Secure Virtualization Framework (SVF) solution is able to create a secure virtual data center environment, resisting all recognized attacks. Even more significant is the way security can be rigorously tested under “real world” operating and attack conditions using Spirent’s pioneering cloud computing testing solutions with performance, availability, security and scalability (PASS) methodology.

“Can we trust the cloud? The answer now is ‘yes,’” said Steve Broadhead, founder and director, Broadband Testing. “Virtual security works in theory but, until there was a way to test it thoroughly under realistic conditions, solution vendors have had a hard time convincing their customers. Without Spirent we could not have done this -- the testing proved not only highly rigorous, but also quite simple to set up and run.

“Testing a complex hard-wired system can be tough, but at least the structure remains static. The cloud is a good description from a network testers’ perspective of the relative shapelessness of the virtual environment. Until the test process itself could be virtualized, the cloud remained pretty opaque.”

Broadband Testing found the solution to this problem in Spirent Avalanche Virtual -- the industry’s first test solution designed specifically for virtual and cloud computing environments.

It was used in conjunction with Spirent Avalanche to test internal and external-to-internal traffic under normal operating and extreme conditions plus a wide range of attack scenarios. All the threats in the HP TippingPoint signature base were successfully blocked, the only ones that passed were those not yet added to the then-current database.

As David Hill, Spirent’s vice president for EMEA points out, “The key takeaway was that testing with Spirent stressed the capability of the security solution right to its limits. People assume that security is the final objective, when what is really needed is a precise way to quantify and tailor the level of security in a complex system. ‘Tried and tested’ means more than any amount of theoretical argument in this case.”

The virtual environment under test was truly representative of the next generation IT environment in that it included physical and virtual elements -- with the HP TippingPoint IPS and SVF, as well as the test bed itself, consisting of physical and virtual versions of Spirent Avalanche. Hybrid physical/virtual environments are fast becoming the norm, hence the reason to find new test methodologies to prove that these solutions actually deliver performance, security and scalability -- all essential requirements of a data centre solution, as tested here.

“The economic benefits of cloud computing are overwhelming, but so are the security concerns of network operators and their customers,” Hill said. “This independent report breaks that deadlock, as reliable testing now makes it easy for system vendors to mitigate the risks of migrating to the cloud, while optimizing resource utilization under an exhaustive range of real-world operating and threat scenarios.”

For more information on this test and more about security testing of cloud computing and virtualized data centers, visit http://www.spirent.com/Broadband/Cloud_Computing.aspx.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3