Blog

Get news about our products, which events we are attending plus industry insights and commentary

Securing Both North & South and East & West Datacentre Traffic

Written by Steve Patton on Tuesday, 23 October 2018. Posted in Cyber

Generally speaking, "East-West" (EW) traffic refers to server to server traffic within a datacentre and "North-South" (NS) to traffic that is routed either to or from anything outside the datacentre.  Depending on the function of a datacentre, EW traffic can be significantly higher than the NS (e.g in a computationally intensive environment), or NS may be the same as or greater than EW (if there are multiple access points) for a data I/O intensive application such as media streaming.

The dilemma is where to place cyber security tools. If NS traffic is lower than EW a lower cost solution is to place security measures at the access points, to detect and scrub all traffic as it enters a network. This assumes that everything beyond this is then trusted. But if there is a breach, how can we understand what affect it has on the internal operation of the datacentre?

The answer is to monitor both NS and EW traffic, meaning large scale capability, monitoring high bandwidth EW and NS traffic (which may be med or high bandwidth), scanning for known threats and anomalies, whilst storing meta-data for incident response and forensics.

Much cloud and hosting is a shared facility, where each tenant operates their own isolated security infrastructure and policies. But one advantage of cloud is that it facilitates a collaborative way of working to predict, prevent and remedy threats, by sharing intelligence through visibility of the entire cloud infrastructure. A total infrastructure view requires a large scale, multi-site, multi-tenant threat monitoring and alerting system. That’s what we do at Telesoft – This email address is being protected from spambots. You need JavaScript enabled to view it. to find out more.

About the Author

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.