Tip

Making SSL decryption and other networking choices in cloud deployments

Businesses eager to offload resources to third-party cloud hosting services often overlook the effect on network infrastructure and management.

Enterprises conserve resources at the local area network (LAN)

    Requires Free Membership to View

level when they adopt cloud computing. Most server administration can take place with the administrator and server in two different locations. And most server administration can be conducted on hardware that doesn't belong to the organization doing it. An organization's entire data center network infrastructure could exist in the cloud, freeing up local network resources that otherwise would have supported operational tasks.

Companies offloading much of their existing server infrastructure to Rackspace, Amazon Web Services and their competitors see a cost benefit in this scenario. But amid all of this cost-cutting, they rarely ask about what type of changes are needed locally, with respect to personnel and network infrastructure, or how transparent server workload handling will be once it's offloaded to a third-party cloud infrastructure.

Consider a Secure Sockets Layer (SSL) decryption scenario, one example of network use in a typical business. About 25% to 35% of all inbound network traffic to an organization is SSL-encrypted, shows research conducted by NSS Labs, an information security research and advisory company based in Austin, Texas. Companies deploy SSL decryption to read end-user encrypted traffic. SSL decryption devices mimic the behavior of a legitimate certificate authority.

SSL decryption is not a simple bolt-on device that enterprises set up and forget about. Skilled personnel are required to use and maintain the devices. SSL decryption can create bottlenecks due to its robust processing needs, so the IT team might need to boost throughput. Furthermore, routing and firewall infrastructure must be configured to account for decryption. The data center might need a special virtual LAN to successfully execute SSL decryption. Companies can't simply add these network-connected devices without widespread consequences and changes throughout the data center. This is true of many networking choices.

Third-party hosting providers often offer SSL decryption and other advanced cloud networking options at an added cost. Gone is the need to hire specialized personnel to implement and maintain the deployment. Depending on what portion of the infrastructure the third-party cloud provider operates and maintains, there is no need for routing and switching experts. The business' server administrators may simply use a workstation to Secure Shell log in to servers off-site.

There are clear advantages to cloud computing, with a streamlined IT department and network fingerprint. However, before rushing to offload every function to a third-party data center solution, organizations should consider the benefits of on-site networking and security expertise. Hypothetical situations that may arise for your enterprise will help determine which option best addresses your needs.

This was first published in December 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Expert Discussion

Are cloud computing providers responsive to enterprises' networking needs?

Brad Casey
What's your opinion?
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.