Gartner Blog Network


Moore’s Law Enables Virtualized Security

by Neil MacDonald  |  August 28, 2009  |  Comments Off on Moore’s Law Enables Virtualized Security

As security controls are virtualized (e.g. firewalls, IPS, web application firewalls and so on), one of the more significant concerns is performance and throughput.

I remember a demonstration about a year ago where an IPS running in a VM virtual appliance easily consumed 2 out of 8 cores in a multicore system. A 25% overhead for security controls didn’t make sense.

That was then. Hardware advances continue. Within the next year, 64 core systems will be common. Now 2 out of 64 cores is a different story. 3% overhead? That I’ll take.

The ever-increasing number of cores available along with advances like VMsafe and VMsafe’s “fast path” as well as improvements in i/o virtualization with next-generation processors will enable virtualized security controls to become mainstream, reducing the need for traditional proprietary hardware-based security inspection appliances and greatly lowering barriers to adoption.

Security shouldn’t have to be rationed.

Virtualization will radically change our approaches to information security over the next decade. I’ll be presenting my latest research on the topic at the upcoming Gartner US Symposium in Orlando. I hope to see you there!

Additional Resources

View Free, Relevant Gartner Research

Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence.

Read Free Gartner Research

Category: next-generation-data-center  next-generation-security-infrastructure  virtualization-security  

Tags: virtual-appliances  virtualization-security  vmsafe  

Neil MacDonald
VP & Gartner Fellow
15 years at Gartner
25 years IT industry

Neil MacDonald is a vice president, distinguished analyst and Gartner Fellow in Gartner Research. Mr. MacDonald is a member of Gartner's information security and privacy research team, focusing on operating system and application-level security strategies. Specific research areas include Windows security…Read Full Bio




Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.