Network World - When it comes to sampling innovative technology, Schwan Foods, a multibillion-dollar frozen food producer, digs right in.
The Marshall, Minn., company became an early adopter of VMware ESX Server technology, beginning beta tests in 2001 and launching its formal virtualization project in 2002.
Schwan went on to become one of VMware's first enterprise licensees and by 2008 had virtualized two-thirds of its servers, says Cory Miller, the company's senior IT operations manager.
Schwan's virtual server infrastructure today comprises 55 ESX hosts running between 700 and 800 virtual machines. In addition, 44% of the company's 18,000 desktops are virtual, Miller says.
No wonder Schwan began hankering for virtualization-layer security years ago.
When Schwan began its virtualization implementation, it decided to run VMware's ESX on bare-metal hardware rather than selecting a hypervisor that would sit atop a Windows or Linux operating system.
That was a way to avoid having to worry about operating system patches or security flaws affecting the hypervisor, Miller says. "Still, initially, we used our virtualization for a lot of transactional data but not for credit-card processing or other sensitive data," he adds.
By 2005, Schwan felt comfortable moving sensitive data into the virtual environment. It used traditional physical firewalls to mask, protect and segregate user environments across the development, staging, quality assurance and production networks, Miller says.
But it didn't take long before problems appeared.
"I could put different kinds of sensitive data – credit card or HIPAA, say – on the same systems and lock them down because we followed the same processes, auditing and compliance for them. But I didn't want to put a SharePoint server on the same host that was processing credit cards," he says. "I could track the data going host to host, but I didn't have the control, monitoring or capabilities to see what was going on within a host."
Addressing that situation meant carving hosts out of the resource pool and creating lockbox environments for sensitive data. And that, in turn, meant Schwan wasn't getting enough throughput or efficiency out of its hosts, Miller says.
So Schwan immediately began looking for a virtual firewall that could sit at the virtualization layer and do the segregation. It selected vTrust Security from Reflex System, at the time one of the only companies offering a virtual firewall, Miller says.
Schwan can still segment sensitive environments, but now Miller does so out of the entire host pool rather than carving off sections of it, he explains. The virtual firewall inspects traffic on a host and blocks its movement from one guest machine to another.
- An Insightful Approach to Optimizing Mainframe MLC Spend This paper discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into...
- Meeting the Exploding Demand for New IT Services In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus...
- Hybrid IT-A Low-Risk Path from On-Premise to ITaaS This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to...
- Paving the Windows XP Migration Path to Success Support for Windows XP has ended, leaving organizations with three choices: Windows 8, Windows 7 or a combination. With the right planning and...
- Increase Your Data Center IQ Discover how to improve network efficiency, lower IT costs and more proactively manage your physical, virtual and cloud environments.
- Optimize Data Center Resources and Plan for the Future Eliminate over-provisioning and capacity shortfalls with pro-active capacity optimization. Join us in the evolution from capacity monitoring to capacity optimization in your data... All Hardware White Papers | Webcasts