Don't Leave Network Virtualization to Server Admins

Network and security engineers will be sidelined if they don't understand where network virtualization is going, and why they need to go with it.

Michele Chubirka

October 21, 2013

2 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Network virtualization is great for server admins. Even if they don't fully realize what the impact of a product like NSX means for them, they soon will. It means their traffic can be completely contained and controlled in their virtual world.

The release of NSX and other network virtualization platforms is the culmination of a trend that will, from the perspective of server admins, commoditize networking and change how they use the infrastructure. Network virtualization liberates their workflow from the organizational silos in an enterprise, particularly the networking and security silos. Server admins can finally compete with the public cloud that developers seem to be using more frequently.

It also puts network teams on notice. Server admins can now say to network teams, "Be nimble or be gone, because all we need is fire in that wire." The server team can take care of the segregation, security and compliance itself. No more begging, no more waiting, no more wading through service request processes so cumbersome it makes the federal government seem agile.

Meanwhile, the network teams are still trying to understand what VXLAN and software-defined networking is, failing to realize that they are about to be as extinct as the Dodo bird.

[Get a visual overview of competing SDN models in the slideshow 10 Software-Defined Networking Architectures.”]

As for security teams, most of them barely understand any network overlay technologies, much less the impact of VXLAN and SDN. In many cases, they see server virtualization as an annoyance, something they only use for malware sandboxes. It's an inconvenience when attempting to perform digital forensics or trying to gain insight into the virtual switching environment. They're still trying to figure out how to gain visibility and often demand for the traffic to be tromboned out to some security appliance.

Does this bode ill for virtualization and software-defined networking? Not at all. Sure the neo-Luddites will try to obstruct and block shifts in technology, even though it's better for the business. They'll do it because it means change--and humans hate that.

But if the business sees benefits--faster response to developer requirements, more projects up and running more quickly, less money spent on physical network and security hardware--the business will push obstructionists aside.

Network and security teams don't have to be pushed aside. But they do need to be proactive. Learn to talk outside your comfortable little silo. Grab hands and sing Kumbaya with the server folks. Bring value to the table, not roadblocks.

These inevitable changes in data center technology will grind down obstructionists. They'll be unemployed, but still trying to prove there's value to managing switches via CLI, or that good security comes from having a firewall and an IDS.

Read more about:

2013

About the Author

Michele Chubirka

Security Architect

Michele Chubirka, also known as Mrs. Y, is a recovering Unix engineer with a focus on network security. She likes long walks in hubsites, traveling to security conferences, and spending extended hours in the Bat Cave. She believes every problem can be solved with a "for" loop. She also hosts a podcast called Healthy Paranoia, a security feed of Packetpushers. You can find her blogs and podcasts at http://www.healthyparanoia.net or http://packetpushers.net/author/securityprincess. When not blogging or podcasting, she can be found using up her 15 minutes in the Twittersphere or Google+ as @MrsYisWhy.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights