Host Identity Protocol tag
1 result(s) displayed for Host Identity Protocol (1 - 1 of 1):
By: David Amzallag - Alcatel-Lucent Vice President, Virtual Telecommunications and CloudBand CTO
While network functions virtualization (NFV) introduces new challenges to security, it also presents unique opportunities for addressing security problems due to the unprecedented scale, flexibility, and central control it affords. Compute, storage, and network resources can be optimally allocated and stitched together as required by the security policy. Our approach to address NFV security is based on a recursive, divide-and-conquer methodology, which involves securing the Alcatel-Lucent CloudBand™ NFV Platform, cloud nodes, and the network that interconnects them. CloudBand uses policy-based placement capabilities enabled by the CloudBand Management System to install virtualized functions in their appropriate security zones, and re-uses the security services provided by NFV applications.
I thought it would be a good idea to describe the journey to this approach together with its "making of" episodes.