Every boxer wants to float like a butterfly and sting like a bee. To have an awesome offence combined with a solid defense. Giving punches, but not taking any in return – which is a neat way of thinking about network virtualization:

  • A solid offense starts with hardware that can be easily repurposed and consumed on-demand
  • You can also punch above your weight through IT automation and application continuity
  • While flexible, easy-to-deploy and updated security keeps your guard up to deflect any incoming blows

Align your IT resources on the fly

Network virtualization is pretty well understood: using software to simulate the existence of expensive hardware.

However, running a number of virtual machines on a single physical computer system is about more than just cost. The benefits are similar to those associated with server virtualization:

  • Virtual networks operate independently of their underlying IP network hardware
  • Network and security services are dynamically allocated to each virtual machine –according to its  specific needs
  • Administrators can move a virtual machine among physical hosts without having to reconfigure the physical network
  • The physical components of your network turn into a flexible pool of capacity for consumption/repurposing on demand

Keep the incoming threats contained

So virtualization is about maximizing in-house servers. But it’s also about cost savings (hardware and energy), workload flexibility, and recoverability.

But to box smart is also to consider defense, or, in this case, security. In fact, it’s the ability of virtualization to offer more dynamic IT protection that’s brought many doubters around.

Virtualization allows for every virtual machine and every app (regardless of the device being used) to be isolated in its own secure space, thereby limiting the potential for ‘lateral infection’ – where malware moves sideways to contaminate one machine after the other.

Deliver the knockout blow with NSX

All of which brings us to the heavyweight champion of network virtualization solutions: NSX from VMware. Its formidable reputation comes from the fact that it makes your underlying physical network abstract – thereby supporting a more agile and adaptive IT operation.

Yes, you’ll need hardware, but nothing more than a Layer 3 switch. However, it’s not limited to switching, as there’s a significant amount of network intelligence built into the software. That means you can design granular firewalling that’s optimized for east-west datacenter traffic, load balance the network, or create Layer 2 and 3 VPN services.

Network defenses you can depend on

NSX is the ideal solution for getting you fighting fit, and for making security far more flexible than a traditional set-up. It can also grow autonomously, and support dynamic assignments versus workloads that can keep pace.

What’s more, with NSX you can dynamically assign security to workloads. The process is extremely simple: just start a new virtual machine, and watch as security is automatically added to the machine.

Third-party tools can take this automation further by instantly isolating any quarantined machine from the network (where the threat is removed before the machine is put back into service).

Ready to step into the virtualization ring?

Want to get started with a network virtualization project? Looking for a sparring partner you can start bouncing some ideas off? Whatever your requirements, COMPAREX can be on hand to help you introduce a fully functional NSX environment.

Interested in network virtualization?

Contact one of our dedicated experts and we will come by to analyze your network environment.

Stay Up-to-date

For regular updates and articles from us, click below to follow us:

 Follow us on LinkedIn

Related articles

3 methods to encrypt sensitive information and prevent data loss

GDPR offers a great opportunity for businesses to put in place the data encryption needed to secure their data. Our three suggestions help you consider every option. Read the full article ...

The security consultant game-plan in 3 stages

More and more companies rely on external security consultants to protect their data. But how do these consultants operate? And what can we learn from their tactics? Read the full article ...

Contact Us

Peter Verbeeck

Peter Verbeeck

Solution Advisor

Share this article