• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

White Paper

Financial Services Use Case: Apply Network Segmentation in Virtualized Data Centers

Jul 18, 2017
asset thumbnail

To address growing competitive and cost pressures, financial institutions have been moving toward private cloud computing, which provides flexible and scalable IT resources on demand, based on the pooling of resources within private data centers. Yet cloud security can be a significant challenge if the controls in place cannot keep pace with dynamic environments such as VMware NSX. Many of the principles that make cloud computing attractive run counter to network security best practices, such as separation and segmentation. Replicating the essentially flat, open network found in a legacy data center would be a mistake for financial institutions. Cyberattacks have been successful in such open environments, where much of the lucrative data and systems are readily accessible. As examples, across the multiple SWIFT member attacks and in ATM malware attacks (Ripper and Cobalt gang), the malicious actors moved laterally in search of items of value after gaining an initial foothold within those targeted organizations.

Attacks and intentional – or even accidental – compromises in a virtualized environment are amplified because the workloads (some with varied trust levels) and associated data are centralized and lack any security barriers to keep them segmented. If the virtual environment is compromised without being appropriately secured and segmented, the attacker has access to everything. In addition, requisite updates to traditional security policies cannot keep pace with the rapid speed of workload changes in these dynamic environments. Thus, cybersecurity remains a significant challenge when embracing even private cloud computing.

Download our use case "Apply Network Segmentation in Virtualized Data Centers" to read about the benefits that Palo Alto Networks can bring to this environment, and learn about the approach one anonymous financial institution took to protect their private cloud from a data breach.

For more information on cybersecurity for the financial sector, visit our Financial Services industry page at  https://www.paloaltonetworks.com/products/security-for/industry/financial-services.html

Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, customer stories, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved