{"id":3595,"date":"2013-06-26T10:32:32","date_gmt":"2013-06-26T17:32:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3595"},"modified":"2013-07-01T08:58:56","modified_gmt":"2013-07-01T15:58:56","slug":"the-next-big-thing-in-network-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/06\/the-next-big-thing-in-network-security\/","title":{"rendered":"The Next Big Thing in Network Security"},"content":{"rendered":"<p>The next big thing for network security is automation and orchestration. It will become the key enabler to truly realize the vision of your next-generation data center. Here\u2019s an excerpt from my latest <a href=\"http:\/\/www.securityweek.com\/next-big-thing-network-security-automation-and-orchestration\" rel=\"nofollow,noopener\" >Security Week<\/a> article:<\/p>\n<p><i>\u201cIn a private cloud environment, applications and desktops are increasingly being virtualized at an unprecedented rate and scale. As the number of virtual machines (VMs) increases, automation and orchestration is no longer a \u201cnice to have.\u201d It has not only become increasingly complex to configure and manage multiple security devices, but also extremely inefficient and prone to error.<\/i><\/p>\n<p><i>The ability to translate complex business and organization goals into a set of automated data center workflows is critical to not slowing down the application delivery process. It is also an essential part of making compliance and security requirements a lot easier to manage in a very dynamic environment. To fully realize the promise of private clouds, the traditional IT infrastructure -- in particular network security -- needs to transform into agile and adaptive end-to-end automated processes.\u201d<\/i><\/p>\n<p>If you\u2019re interested in understanding how Palo Alto Networks interoperates in an SDN network with automation and orchestration systems, check out the following upcoming events with our technology partner Arista Networks. In both these events, we will demonstrate a specific use case of high-performance firewalling deployment using SDN:<\/p>\n<ul>\n<li>June 27 <a href=\"http:\/\/www.aristanetworks.com\/en\/june-27-2013-webinar\" rel=\"nofollow,noopener\" >Webinar<\/a> \u2013 demonstrates implementation of a high-performance, large scale Palo Alto Networks next-generation firewall deployment using Arista DirectFlow (controller-less OpenFlow)<\/li>\n<li>July 12<a href=\"http:\/\/www.sdncentral.com\/events\/arista-paloalto-splunk-sdn-demofriday\/\" rel=\"nofollow,noopener\" > SDN Central DemoFriday<\/a> \u2013 Arista Networks, Palo Alto Networks and Splunk demo of a high-performance, large scale\u00a0 next-generation firewall deployment featuring SDN, OpenStack and VXLAN.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The next big thing for network security is automation and orchestration. It will become the key enabler to truly realize the vision of your next-generation data center. Here\u2019s an excerpt from my &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[161,110],"coauthors":[771],"class_list":["post-3595","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-automation","tag-orchestration"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3595"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3595\/revisions"}],"predecessor-version":[{"id":3621,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3595\/revisions\/3621"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3595"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}