GDT Webinar Series – How to Fail at Security? Reserve Your Spot

The Next Generation of Switching Architecture

data center network fabrics

While data center network fabrics have evolved over the past decade to address the volume and velocity of emerging application architectures, security and services architectures have not kept pace.

Centralized security appliances weren’t designed to inspect and protect application traffic that is moving east-west within the data center. It’s not operationally or economically practical to deploy a suite of security appliances in every server rack.

Recognizing the need and urgency to address these new realities, Aruba has partnered with Pensando Systems to create a new category of network switch named the Aruba Distributed Services Switch.

The Aruba CX 10000 Series Switch with Pensando represents the next evolution of data switching architecture, one that combines best-of-breed Aruba data center L2/3 switching with the industry’s only fully programmable data processing unit (DPU) from Pensando. The Aruba CX 10000 delivers stateful software-defined services inline, at scale, with wire-rate performance and orders of magnitude scale and performance improvements over traditional data center L2/3 switches at a fraction of their TCO.

The Aruba CX 10000 allows advanced network and security services to be deployed as close as possible to where applications are processed rather than at the perimeter as in a traditional data center network architecture. With firewall, encryption, tunneling, and other services running on a distributed services switch, organizations can scale new service capabilities faster.

Author

Share this article

You might also like:

AI modernization in the contact center & beyond: A Q&A with GDT experts

Chances are, your organization is actively exploring AI modernization opportunities across your infrastructure, especially in the contact center and data center. In fact, you’ve likely already started your AI journey. Approximately one-third of organizations are investing in data center network upgrades over the next 12 months to meet the demands

Why you need to address Shadow AI—and how to get started

What is Shadow AI? Many organizations are seeking to benefit from the productivity and innovation that AI can provide. However, the use of AI elevates risk to data security, compliance, and corporate reputation. Organizations are discovering that some employees are using publicly available models or applications without IT oversight, adding

Zero Trust and hybrid work: Securing a perimeter-less world

In a world where bad actors employ increasingly sophisticated technologies to wreak havoc, organizations are looking beyond traditional perimeter approaches in favor of a Zero Trust strategy. Remote and hybrid work, increased reliance on managed services and third parties, and a rapidly evolving threat landscape comprise just some of the