Edgewise Networks, a security startup that's taking on industry giants VMware and Cisco with its microsegmentation technology, has a simple plan to win market share. "As far as the microsegmentation space is concerned, it has been viewed as very complex," said CEO Peter Smith. "Really, the drive behind our pursuit of these patents is bringing extreme simplicity, extreme automation to the problem of microsegmentation and zero trust." Microsegmentation enables fine-grained security policies to be assigned to cloud and data center applications. The approach improves network security by integrating it directly into a virtualized workload without requiring a hardware-based firewall.
The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing. A few years ago, the concepts of microsegmentation and microperimeters for Zero Trust were championed by former Forrester analyst John Kindervag. He showed us how those concepts and their technologies could enable a more secure enterprise. Once those concepts and their associated best practices hit the street, organizations from VMware to Cisco Systems to Palo Alto Networks quickly jumped on board the train of using powerful networking technology -- next-generation firewalls (NGFWs) and microsegmentation technology -- to push the envelope and align with the benefits of Zero Trust.
A native of the Silicon Valley, Emily Aiken has always embraced the can-do attitude of the tech world believing that with enough energy and smarts, you can change the world. With FutureXO, Emily hopes to do just that, bringing information about the most exciting, world-changing technologies to non-technical people. Emily got her start in the entertainment industry, producing on staff for NBC, CBS and KABC. In 1992, she returned to Silicon Valley to study business and innovation through the groundbreaking Hecht & Associates curriculum. Two years later, Emily founded Edgewise, an advertising and promotion boutique specializing in TV and trade campaigns for valuable entertainment properties: Friends, Oprah, WB Television Network Launch, Access Hollywood, and Good Morning America.
We talk way too often about what a technology enables people to do. Its objective is to spread a very fast signal through the airwaves, using transmitters whose power curve is just under the threshold of requiring artificial cooling. It needs to be faster than what we have now, for enough customers and enough providers to invest in it, so that it may achieve that main objective. Assuming 5G deployment proceeds as planned, and the various vast political conspiracies, small and large, fail to derail the telecommunications providers' plans, it will reach the peak of its goals once it has achieved the virtualization of its packet core (which was begun with 4G LTE), its radio access networks (RAN), and the customer-facing functions of its data centers. But it's from atop the highest peak, as any Everest climber or any great John Denver song might tell you, that one obtains the best view of oneself, and one's own place in the world. The common presumption, when the topic of network functions virtualization (NFV) is brought up with respect to 5G, is that all this virtualization will take place on a single platform. Not only is this critical issue undecided, but there would appear to be a dispute over the decided or undecided nature of the issue itself.
Traditional cybersecurity measures focus on protecting data center infrastructure. But with changing application architectures, and the growth of the cloud, cybersecurity must increasingly shift focus to protecting applications and data, rather than just the infrastructure they run on. "Organizations traditionally focus most data center security controls and policies on servers and networks, but the priority should be to focus and align those controls on their critical applications and sensitive data rather than the infrastructure they run on," said Tom Corn, senior vice president of security product at VMware. As apps become the new focal point for security, new questions arise. Security teams must adjust to meet the new challenges they're likely to face, and organizations must revisit the prior choices they've made about technology and policies to ensure a strong defense.