Information Security

What is Information Security?
In modern society, Data Centers house increasingly sensitive data containing everything from national security information to social security numbers—all of which needs to be protected. Information Security is the process of protecting the availability, privacy, and integrity of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users.

How Can Information Security be Maintained in a Cloud and Virtualized Environment?
Virtualization and Cloud computing technologies greatly enhance the utility achieved per dollar invested in IT infrastructure and services. But while they offer numerous benefits, significant privacy and security considerations must be accounted for before collecting, processing, sharing, or storing institutional or personal data in the cloud. Consequently, you should conduct careful risk assessment prior to adoption of any cloud computing technology or service. Specific risks and challenges to consider include:

  • Vendor transparency and inadequate or unclear service level agreement
  • Privacy and confidentiality of personal, sensitive, or regulated data and information
  • Legal and regulatory compliance
  • Cyber security and support for incident forensics
  • Records preservation, access and management
  • Service availability and reliability
One way to take advantage of the cost benefits of Public Cloud services while maintaining security of your most sensitive data is to adopt a Hybrid Cloud model. Here, part of the computing infrastructure resides in the Public Cloud, while your most sensitive data resides in an on-premises Private Cloud. In any case, Information Security represents a serious design requirement. NDS can help.



NDS and Security

At NDS, we are competent in all aspects of Information Security, including the implementation of STIGS (Security Technical Implementation Guides for standardized secure installation and maintenance of software and hardware), IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), CONS (Connection Oriented Network Service), APL (Address Prefix Lists), VPN (Virtual Private Networks), Patch Management, Configuration Management, Anti-Virus, ATO (Authority to Operate), Firewalls, Organizational Segregation, Identity Management, and Authentication.

Information Security must be the foundation upon which your environment is designed and developed—with the amount of sensitive data hosted in Data Centers, Security cannot be an afterthought. Which is why NDS begins any virtualized infrastructure deployment by first understanding your Information Security requirements.