Converged for Security. The differences between legacy and converged infrastructure.

Cyber activities, creation of controls and policies, and ultimately securing the environment is greatly simplified when you reduce the number of variables within the environment. The images on the left side of the illustration (A) represent a legacy environment. In contrast, the images on the right side of the diagram (B) represent a converged (CI) / hyper-converged (HCI) environment. The locks represent the complexity of developing cyber controls, policies, and baselines to maintain a healthy cyber posture. (see the video at:

One of the challenges in the legacy environment, as illustrated (A), is that the virtualization, server, and storage vendors are all different. As a result, they must use "connectivity" (APIs, DLLs) to communicate with one another, which creates additional performance, compatibility, configuration, and security challenges. The objective of a healthy cyber posture is to reduce the number of variables and threat vectors.

The reason why many organizations are moving away from legacy infrastructure to converged infrastructure is to reduce the complexity and security vulnerabilities inherent in legacy infrastructure. Converged infrastructure is most potent when the same vendor provides all of the resources, to include virtualization, compute, and storage.