dcsimg

Juniper Networks Unveils Open Source Software to Microsegment Networks

Mike Vizard

Interest is rising in microsegmentation as a means for better securing network traffic moving east to west in a data center. The basic idea is that if any node in the data center gets compromised, the only other nodes that could be exposed to malware are the nodes that share the same microsegmented network connection.

To make it less costly for IT organizations to achieve that level of security, Juniper Networks today announced a Contrail Security offering that is available as open source software.

Pratik Roychowdhury, senior director of product management for Contrail at Juniper Networks, says Contrail Security is a complement to the Open Contrail network virtualization software that Juniper Networks has previously made available as an open source project.

Via Contrail Security software, Roychowdhury says, IT organizations will be able to more simply implement policies across a microsegmented network spanning multiple environments, including public clouds, virtual machines, clusters based on Kubernetes container orchestration software and the OpenStack cloud management framework.

Because Contrail Security includes visualization, analytics and orchestration tools, Roychowdhury says, Contrail Security makes it simpler to manage microsegmented networks than rival network virtualization platforms. Contrail Security can also be integrated with third-party virtual firewalls, says Roychowdhury.

“We’re reducing operational complexity,” says Roychowdhury.

ContrailSecurity

It’s still early days in terms of adoption of microsegmentation across virtual networks. But given the level of sophisticated security threats IT organizations now face, the need to contain the amount of damage that any malware can inflict is becoming a much higher priority.

 


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.