IT InfraWhitepapers
Five Critical Requirements for Internal Firewalling in the Data Center
_210602073749-1.png)
Sponsored by: VMWARE
Preventing hackers from hiding inside large volumes of east-west network traffic has now become critical to security professionals. Organizations need new tools and techniques to fight back.
In this paper, you will learn:
![]() |
The differences between protecting north-south network traffic and east-west network traffic. |
![]() |
The challenges in using traditional perimeter firewalls to secure east-west network traffic. |
![]() |
The characteristics that make internal firewalls suitable for network security in the data center. |