by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2015
PCI DSS, SOX, FIPS 140-2, Common Criteria and Suite B. The solution should provide security- driven analytics, with which security analysts can assess and prevent many infrastructure-related risks. Finally, the infrastructure should be self-healing. It should enable workloads to continue functioning uninterrupted even if some are found to be compromised. SECURITY IS EVERYONE’S BUSINESS The burden of securing our nation’s IT infrastructure is and must be shared. However, complex infrastructure legacy models place too much of the burden on agency IT teams. They’re often forced to cobble together a se- curity position around many different moving parts. When planning any IT investment, agencies must ensure the system not only satisfies basic criteria of each standard, but is certified up to the level required by the agency or department, such as Suite B Top Secret or FIPS 140-2 Level 2. Furthermore, choose application and infrastructure ven- dors that are responsibly hardening their own code and can prove they have done so. This puts a fair burden of security on the vendors instead of agency IT resources. “All vendors should be hardening their own code, and they should pub- lish and fully support their [security] baselines,” said Simon Mijolovic, senior security solutions architect at Nutanix. “Solutions should come with thorough documentation that shows how the product was hardened and gives you confidence that the vendor is also supporting that baseline.” Datacenter managers should also expect vendors to quickly react to identified vulnerabilities. That means vendors must take responsibility for identifying and patching vulner- abilities faster than ever. That’s more complicated than it might seem. It’s simpler if an application or product is fully COTS. More often than not though, datacenter applica- tions and appliances are likely a product of several inputs—vendor- written code, open source code, and components from other sources. That opens the datacenter to a greater extent of vulnerability from different attack vectors. Combatting this type of complexity requires a vendor that owns the problem—one that is committed to continually monitor the landscape and develop faster testing and remediation processes. THE RIGHT INFRASTRUCTURE FOR THE JOB Nutanix, a leader in the hypercon- verged infrastructure market, has designed its solutions with security as a primary focus. Besides the inherent security of its hyperconverged infra- structure offering, Nutanix builds ad- ditional security measures into every step of the development process. For example, Nutanix developed its own Security Technical Implementation Guide that incorporates DoD STIG guidelines. These empower enterprise security teams to drastically reduce the time it takes to test code and can re- duce the DIACAP/DIARMF accredi- tation process to less than an hour. To meet the high-level security requirements of federal agencies, Nutanix platforms comply with FIPS 140-2 Level, NSA Suite B support (to Top Secret), Common Criteria EAL2+ and NIST SP800-131A, among others. Nutanix’ hyperconverged infra- structure encrypts user and application data to a level of FIPS 140-2 Level 2 compliance. It lets security staff lock down access to clusters if a security breach is suspected or if threat lev- els rise. The solution employs strong two-factor authentication, including the use of client certificates, to prevent un- authorized administrator log-ins. It also provides data at rest encryption through self-encrypting drives, and meets the data-at-rest encryption requirements for HIPAA, PCI DSS and SOX standards. Finally, Nutanix’ hyperconverged infrastructure solutions provide agen- cies with security-driven analytics with which security staff can assess and mitigate a range of infrastructure security risks. The system continuously checks the health of virtual machines, nodes and disks in the cluster, and flags any potential issues. It also performs root cause analysis of flagged issues by visually navigating, grouping and filter- ing resources at the VM, host and disk levels. These capabilities help security staff proactively resolve issues before they become bigger issues. It’s clear the hyperconverged infrastructure is the answer to many challenges facing our Federal IT community today. Visit www.nutanix.com to learn more. THE BURDEN OF SECURING OUR NATION’S IT INFRASTRUCTURE IS AND MUST BE SHARED. GameChanger GAME CHANGING TECHNOLOGY TO MEET AGENCY MISSIONS SPONSORED CONTENT HYPERCONVERGED INFRASTRUCTURE 0815_GameChanger_Nutanix_FCW_final3.indd 4 8/21/15 3:10 PM
August 30, 2015
September 30, 2015