Hybrid Data Center Security
Across
- 4. There are two different types of traffic, each of which is secured in a different manner.
- 8. Focus of traditional data security solutions limits their ability to see all traffic on all ports.
- 10. Consolidating servers ______________trust levels.
Down
- 1. Provides clear delineation of application functions and allows a security team to easily implement security policies.
- 2. Traffic is secured by one or more physical form factor perimeter edge firewalls.
- 3. In traditional data center security solutions requires a corresponding security policy often using multiple management tools.
- 5. An attacker has multiple options to steal data from the _______
- 6. Traffic is protected by a local, virtualized firewall instantiated on each hypervisor.
- 7. _____________ network security virtualization.
- 9. ___________ lateral threat movement when a front-end workload has been compromised.