Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.