GDT Webinar Series – How to Fail at Security? Reserve Your Spot

The Next Generation of Switching Architecture

data center network fabrics

While data center network fabrics have evolved over the past decade to address the volume and velocity of emerging application architectures, security and services architectures have not kept pace.

Centralized security appliances weren’t designed to inspect and protect application traffic that is moving east-west within the data center. It’s not operationally or economically practical to deploy a suite of security appliances in every server rack.

Recognizing the need and urgency to address these new realities, Aruba has partnered with Pensando Systems to create a new category of network switch named the Aruba Distributed Services Switch.

The Aruba CX 10000 Series Switch with Pensando represents the next evolution of data switching architecture, one that combines best-of-breed Aruba data center L2/3 switching with the industry’s only fully programmable data processing unit (DPU) from Pensando. The Aruba CX 10000 delivers stateful software-defined services inline, at scale, with wire-rate performance and orders of magnitude scale and performance improvements over traditional data center L2/3 switches at a fraction of their TCO.

The Aruba CX 10000 allows advanced network and security services to be deployed as close as possible to where applications are processed rather than at the perimeter as in a traditional data center network architecture. With firewall, encryption, tunneling, and other services running on a distributed services switch, organizations can scale new service capabilities faster.

Author

Share this article

You might also like:

The Cisco True Forward: How to avoid surprise costs

It started with an invoice they didn’t expect—$280,000 in unbudgeted costs tied to licenses they didn’t even know they were overusing. That was the moment this healthcare provider realized how important Cisco True Forward visibility really is. And they’re not alone.  For organizations that rely on Cisco to power critical

Salt Typhoon cyberattack

In a January 2025 advisory, CISA’s then-director, Jen Easterly, stated that “China’s sophisticated and well-resourced cyber program represents the most serious and significant cyber threat to our nation, and in particular, U.S. critical infrastructure.” Whether they aim to spy, disrupt, or destroy, safeguarding infrastructure against Salt Typhoon cyberattacks and other

How weak data governance, security, & identity management thwart AI transformation

AI has the potential to bring significant changes to business. However, AI initiatives are often hindered by issues related to AI data governance, security, and identity management. While data concerns and identity management are not the only things slowing down AI initiatives, they are among the largest roadblocks to an