Modernizing the Security Perimeter for Hybrid and Multi Cloud – DH2i Briefing Note

Hybrid and multi cloud infrastructures represent today’s “new norm” for IT infrastructure. Heterogeneity is required for IT shops to simultaneously meet stringent cost and growing service level agreement (SLA) requirements on an application-specific basis.

These architectures are powerful tools for IT to balance tradeoffs in areas such as capital and operating expense costs, latency and scalability – but, they materially disrupt the traditional security perimeter. Where previously applications and data were contained to on-premises physical and virtual machines, today they must be able to move across a complex web of on-premises infrastructure and private clouds, as well as third-party delivered cloud resources. This approach substantially increases the number of potential security risks while expanding the attack surface.

Remote access virtual private networks (VPNs) historically used for perimeter security are a particular vulnerability in the hybrid and multi cloud model, with a key risk factor being that they further expand the network attack surface.

DH2i – DxOdyssey

DH2i has launched its DxOdyssey software to help IT departments modernize their legacy perimeter approaches as they integrate off-premises cloud services into their infrastructure and security paradigm.

Per DH2i, it is building from a core competency of facilitating workload portability on premises with its Smart Availability software, DxEnterprise, which decouples databases and containers from the infrastructure itself. DH2i asserts that it helps its customers to reduce planned and unplanned recovery time objectives (RTOs) to less than 60 seconds, to consolidate the number of operating system instances deployed, and to reduce other software and infrastructure costs by 50%-70%.

DH2i’s newer DxOdyssey platform extends the core value proposition of enabling applications to run on their best execution venues into the cloud era by facilitating a more dynamic network security perimeter that can be deployed dynamically wherever it is needed.

The software enables administrators to create micro-tunnels that can be orchestrated to change in tandem with application requirements, and that also have automatic fault detection and failover. These micro-tunnels are segmented by application, which helps to contain the potential damage in the event of a security incident. Furthermore, network administration is simplified as there are no network access control lists or firewall rules to manage.

DxOdyssey provides server cloaking and randomly generated UDP ports for what DH2i describes as “discrete invisibility;” so that even with the use of port scanners, there is no way to intercept or disrupt the data transmission. The software can be deployed on any host – thus avoiding infrastructure-level vendor lock in.

StorageSwiss Take

A flexible, infrastructure agnostic security perimeter can serve as a fundamental approach for IT organizations to avoid data breaches. DH2i’s DxOdyssey effectively facilitates application-level micro-tunnels that are scalable across cloud environments, and that can be easily integrated into existing infrastructure without reconfiguring the network or purchasing, deploying and managing net new infrastructure. This agility, simplicity and cost efficiency is a compelling value proposition for network administrators seeking service isolation and fine-grained user access against a backdrop of infrastructure sprawl and pressure to free up as much time as possible from day-to-day management tasks to more strategically supporting business initiatives.

Sign up for our Newsletter. Get updates on our latest articles and webinars, plus EXCLUSIVE subscriber only content.

Senior Analyst, Krista Macomber produces analyst commentary and contributes to a range of client deliverables including white papers, webinars and videos for Storage Switzerland. She has a decade of experience covering all things storage, data center and cloud infrastructure, including: technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her previous experience includes leading the IT infrastructure practice of analyst firm Technology Business Research, and leading market intelligence initiatives for media company TechTarget.

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 25,542 other subscribers
Blog Stats
%d bloggers like this: