I sometimes find myself talking about a topic and getting blank stares. Then a year or two later, everyone is suddenly talking about it. One such topic is security virtualization. Until now, those two words were seldom seen together. You would have to live in a cave not to have heard about server virtualization, and storage virtualization also is discussed widely in storage areas. Network virtualization applies to virtual LANs (VLAN) and MPLS, so lots of people discuss that. But security was never brought into the virtualization discussion. This is a shame, because security has a lot to gain from virtualization—and virtualization has a lot to lose if it has no security controls. So what do I mean by security virtualization? At the most basic level, it is security that has the physical layer abstracted. One easy example is the ability to take a single physical firewall and partition it into multiple virtual firewalls to serve different administrative domains or applications.But the real challenge, and the reason security and virtualization are discussed a lot today, is that server virtualization is moving beyond the development environment and into production. In a production setting, many of the ideas that seemed great in development are running into objections by the security team and auditors. “So, you took the three-tier architecture with firewalls and collapsed it into a single server pool? How are you controlling between the virtual machines?” And thus, the on-demand, virtual-moving dream of dynamic servers smacks hard into the static, inflexible reality of security-by-physical architecture.Which leads to the conundrum: Is security going to thwart your business agility and new computing paradigms? Or are you going to find a new, more dynamic way of doing security? Security virtualization is therefore more about making security infrastructure (hardware, software or both) flexible enough to co-exist and contribute to a virtualized data center environment. In a virtualized environment, some of the old concepts have to go: IP addresses do not identify servers because servers can be redeployed on the fly to a different subnet. So your “IP A.A.A.A can send packets to IP B.B.B.B” access control design is no longer relevant or helpful. What was at IP A.A.A.A has moved to a different subnet/data center/continent. Dynamically allocated virtual servers need dynamically allocated virtual security. Maybe it is software in the virtual machine in the hypervisor, as a virtual switch I/O path plug-in, or some combination of software and hardware. But it cannot be a ring of physical appliances surrounding the pool of servers and trying to make sense of three dozen VLAN segments. For virtualization companies, 2007 is going to be the year of security, either because they create an entirely new security market and paradigm, or they get stigmatized by a massive security problem. Or maybe I will get two more years of blank stares.-Andreas M. Antonopoulos, Network World Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe