Article submitted by: Neda Rosič | Publish date: 16. April, 2012
 

Gartner estimates that today only 5% of security controls in the Enterprise Datacenter are virtualized. It's time for network architectures to catch up to virtualization, and 2012 is the year.

2012 and beyond prediction: Networking Invades The Server


By the end of 2011 Gartner claimed virtualization is now at a tipping point with roughly 50% of all x86 workloads running as a virtual machine.  This is fundamentally altering the flow of network traffic, and forces much of the networking and security control to be conducted within the virtualized server itself.

 

Think about the tremendous amount of traffic flowing within the virtualized infrastructure.  As a rule of thumb each VM can generate 100Mb/s of traffic, and in many cases that VM is communicating with another VM in the same server.  Multiply this dynamic by the fact that servers have become so powerful that they can host a large number of VMs.  No wonder so much traffic is generated by virtualized environments.

 

However, Gartner estimates that today only 5% of security controls in the Enterprise Datacenter are virtualized.  Given that half of the x86 workloads are now VMs, security and networking naturally and necessarily will extend into the server infrastructure itself.


It's time for network architectures to catch up to virtualization, and 2012 is the year.  The adoption of network virtual machines will happen across the industry, and quickly:

  • Private Clouds will adopt network virtual machines to logically segment different BUs within shared infrastructure.
  • Public Clouds will enable network VMs so customers can resolve their greatest security fears, since the service provider will not change their fixed infrastructure for each customer.
  • Hybrid Clouds are simply a combination of the Public and Private dynamics, with the added adoption driver being the fact that by using network VMs the customer can have a common infrastructure type in all locations, and under their control.

At the end of the day it doesn't matter if it's a virtualized datacenter or full cloud architecture:  If the infrastructure has hundreds or thousands of VMs generating traffic there needs to be appropriate controls and policies in place.  The effective and efficient way to do that is with network virtual machines.


Contributed by Kelly Herrell, CEO, Vyatta



  

 

© 2011 All rights reserved. ITIPO d.o.o. Ljubljana, Slovenija, Tehnoloski park 18, Building C1 / 3rd floor, phone: +386 1 475 95 00, e-mail: info@itipo.net.