
Data center security What is data center security?
Data security is the process of protecting digital data from unauthorized access, corruption, or theft that may occur from a breach in physical security, data breach, or cyberattack.
The growing wave of east-west data center (server-to-server) traffic is redefining security requirements. The speed and volume of east-west traffic in virtualized and containerized application environments require new security solutions, especially in multitenant scenarios where Zero Trust Security is imperative.

- Data Center Security and Zero Trust
- Components of a secure data center
- Core principles of Zero Trust
- What is endpoint security?
- Why is infrastructure security important?
- A new generation of secure data center fabrics
- Data center fabric migration

Data Center Security and Zero Trust
The cybersecurity threat landscape has changed dramatically in recent years. Today, adversaries are more motivated than ever to penetrate enterprise data centers and steal valuable information. For the data center, this means trusting no entity on the network by default and distrusting all traffic unless a security policy explicitly allows it.
With microservices-based applications, traffic may never be inspected by a hardware firewall, IPS, or other security devices—leaving enterprises vulnerable to attack from within the enterprise itself.
According to NIST SP 800-207, “Zero-trust security models assume that an attacker is present in the environment” and that a Zero Trust architecture is “designed to prevent data breaches and limit internal lateral movement.”
The two biggest threats to data centers are:
- Infrastructure attacks: Enterprises depend on their technology assets to maintain operations, so protecting technology infrastructure protects the organization itself. Exploits against the functionality of data center components (storage, compute, and network) results in loss of performance, availability, proprietary data, and intellectual property (IP), negatively impacting company’s profitability.
- Cyberattacks: Threats to technology infrastructure range from phishing attempts and ransomware attacks to distributed denial of service (DDoS) exploits and Internet of Things (IoT) botnets. Dedicated security systems with advanced monitoring, application-aware policy enforcement, and threat detection ensure business-critical and customer-facing applications can run seamlessly.

Related products, solutions or services
Related topics
Edge-centric, cloud-enabled, and data-driven architectural solutions from HPE Aruba Networking.