Five Critical Requirements for Internal Firewalling in the Data Center

Preventing hackers from hiding inside large volumes of east-west network traffic has now become critical to security professionals. Organizations need new tools and techniques to fight back. In this paper, you will learn:
· The differences between protecting north-south network traffic and east-west network traffic
· The challenges in using traditional perimeter firewalls to secure east-west network traffic
· The characteristics that make internal firewalls suitable for network security in the data center

Tags: gf_row