Over the past few years, arguably no vendor has been more disruptive in the networking industry than Arista Networks. The company has an excellent track record of executing on its vision of differentiation through software. Its operating system, EOS and CloudVision software have enabled Arista to create a high-performance, open network fabric for businesses with cloud-scale requirements in their data centers and, more recently, the campus.Arista jumps into the security market Now Arista has set its sights on the security market. For all of its strengths in networking,\u00a0Arista has never established itself as a security vendor. It has provided some data that network operations might use for basic security, but the appeal to security operations has been light. That\u2019s about to change. The move is well-timed, since trends such as IoT, cloud and mobility are shifting security to the network. Trying to apply protection at the endpoint doesn\u2019t work if IT doesn\u2019t control it. What IT does control is the network, and it sees all.Places in the network evolve into places in the cloud Arista\u2019s thesis is that, as the cloud has become more prevalent, the network has had to evolve, and now security needs to as well. For decades, security practitioners have thought about protection being applied at various places in the network, or PINs, as they're more commonly called. The rise of the cloud will inevitably lead to businesses adopting hybrid, multi-cloud approaches, effectively scattering data and applications everywhere. This means the PIN approach needs to evolve into \u201cplaces in the cloud,\u201d or PICs. Arista is aiming to help business move to PIC-based security while simplifying their architecture.Segmentation sprawl is creating security complexity The most commonly used tool to secure the various PICs has been segmentation, since it enables organizations to completely isolate workloads and content. As the use of segmentation grows, a new problem arises: segmentation sprawl. Businesses are using segmentation in the campus, the cloud and the data center. In fact, in data centers it\u2019s common to have multiple segmentation schemes. One of the biggest areas of complexity is keeping policies aligned. For example, a business may use Vendor A in the campus, Vendor B in the data center and Vendor C in the cloud. A security professional might be able to keep the policies consistent at time of deployment. but as the environment changes, keeping policies aligned becomes exponentially more challenging.Some SDN vendors have tried to jump into the segmentation space, but they can often add more complexity, since it\u2019s another policy framework to manage. This is where Arista\u2019s approach is different. It doesn\u2019t want to be the policy engine. Instead, through its open interfaces, it will interoperate with leading security vendors so customers can take a best-of-breed approach and then use Arista as the enforcement mechanism.Arista partners with security vendors to simplify architecture Arista has partnered with red-hot security vendor Zscaler to secure the cloud. With the cloud, network segmentation requires consistency of architecture so that it does not need to be redesigned for each cloud. Zone segmentation security (ZSS) is a new feature in Arista\u2019s vEOS router that segments inter- and intra-cloud traffic. Arista also has added a Zscaler Private Access (ZPA) agent that runs within a container in vEOS, enabling complete security of cloud traffic. An easy way to think about the combination of the two is that Arista\u2019s ZSS secures east-west traffic, and Zscaler takes care of north-south application traffic, ensuring that cloud to cloud and cloud to user are both secure. This also obviates the need to use the cloud provider's own security services, since those are typically tied to the specific cloud provider. \u00a0 Arista NetworksArista has also expanded its long-standing relationship with VMware to extend segmentation across all workload types. The two companies have partnered to integrate CloudVision and VMware\u2019s NSX product so NSX policies can be natively enforced on Arista switches across a multi-cloud environment and spanning virtual and physical workloads.In addition to VMware and Zscaler, Arista has partnerships with many of the mainstream security vendors, such as Palo Alto Networks, Check Point and Fortinet, where its recently announced Macro-Segmentation Service allow for the enforcement of firewall policies on the network. The combination of VMware and the firewall vendors enables customers to secure the end-to-end network with a combination of coarse and fine-grained segmentation.New hardware brings encryption Also, as part of this launch, Arista has added high-performance encryption options to secure data as it is being transmitted between locations. This required the following new switches:Enterprise WAN: Arista 7020SRG \u2013 24 x 10 Gig-E + 2 x 100 Gig-E with integrated hardware based IPSec VPNsData center interconnect: 7280CR2M-30 \u2013 30 x 100 Gig-E, 7280SRAM-48C6 \u2013 48x10 Gig-E with 6 x 100 Gig-E, 7280SRM-40CX2 \u2013 40 x 10 Gig-E and 2 x 200-G Coherent interfaces for metro and long haul links.\u00a0 The first two offer point-to-point MACsec encryption and the third MACsec and CoherentLastly, Arista has created a compliance dashboard to become part of CloudVision. The portal provides alerts and reporting when configuration or software versions do not meet the company standard. Also, CloudVision can see new security vulnerabilities as they happen and then provide the operator the ability to implement hitless patching using automation.It\u2019s fair to say that Arista is late to the network security party, but it had to establish itself as a mainstream network vendor first. Unlike many of the SDN vendors that disrupt the status quo, Arista\u2019s partner-friendly approach enables it to enforce security policies while simplifying the management of segmentation sprawl that\u2019s currently under way in many organizations.