Data center security
What is data center security?

Data security is the process of protecting digital data from unauthorized access, corruption, or theft that may occur from a breach in physical security, data breach, or cyberattack.

The growing wave of east-west data center (server-to-server) traffic is redefining security requirements. The speed and volume of east-west traffic in virtualized and containerized application environments require new security solutions, especially in multitenant scenarios where Zero Trust Security is imperative.

IT personnel in a data center.
  • Data Center Security and Zero Trust
  • Components of a secure data center
  • Core principles of Zero Trust
  • What is endpoint security?
  • Why is infrastructure security important?
  • A new generation of secure data center fabrics
  • Data center fabric migration
Data Center Security and Zero Trust
Business lady in a server room.

Data Center Security and Zero Trust

The cybersecurity threat landscape has changed dramatically in recent years. Today, adversaries are more motivated than ever to penetrate enterprise data centers and steal valuable information. For the data center, this means trusting no entity on the network by default and distrusting all traffic unless a security policy explicitly allows it.

With microservices-based applications, traffic may never be inspected by a hardware firewall, IPS, or other security devices—leaving enterprises vulnerable to attack from within the enterprise itself.

According to NIST SP 800-207, “Zero-trust security models assume that an attacker is present in the environment” and that a Zero Trust architecture is “designed to prevent data breaches and limit internal lateral movement.”

The two biggest threats to data centers are:

  • Infrastructure attacks: Enterprises depend on their technology assets to maintain operations, so protecting technology infrastructure protects the organization itself. Exploits against the functionality of data center components (storage, compute, and network) results in loss of performance, availability, proprietary data, and intellectual property (IP), negatively impacting company’s profitability.
  • Cyberattacks: Threats to technology infrastructure range from phishing attempts and ransomware attacks to distributed denial of service (DDoS) exploits and Internet of Things (IoT) botnets. Dedicated security systems with advanced monitoring, application-aware policy enforcement, and threat detection ensure business-critical and customer-facing applications can run seamlessly.

Related products, solutions or services

A new era of secure data center networks

Data center networks are evolving rapidly as organizations embark on digital initiatives to transform their businesses.

Related topics

Edge-centric, cloud-enabled, and data-driven architectural solutions from HPE Aruba Networking.

Data center networks

Enterprise Data Center

Network switch