Hybrid Data Center Security

12345678910
Across
  1. 4. There are two different types of traffic, each of which is secured in a different manner.
  2. 8. Focus of traditional data security solutions limits their ability to see all traffic on all ports.
  3. 10. Consolidating servers ______________trust levels.
Down
  1. 1. Provides clear delineation of application functions and allows a security team to easily implement security policies.
  2. 2. Traffic is secured by one or more physical form factor perimeter edge firewalls.
  3. 3. In traditional data center security solutions requires a corresponding security policy often using multiple management tools.
  4. 5. An attacker has multiple options to steal data from the _______
  5. 6. Traffic is protected by a local, virtualized firewall instantiated on each hypervisor.
  6. 7. _____________ network security virtualization.
  7. 9. ___________ lateral threat movement when a front-end workload has been compromised.