Threats

Data Center Security Enhanced

May 14, 2026 16:04 · 12 min read
Data Center Security Enhanced

Introduction to Data Center Security Challenges

Data center cybersecurity teams face a difficult equation: implementing robust security measures can consume CPU cycles, which are essential for high-performance computing. This trade-off has been a challenge for the industry, as increasing security often results in decreased performance, while prioritizing performance can lead to security blind spots.

A notable example of such a blind spot is the gap between a virtual machine (VM) and its physical host. In March 2025, Broadcom patched a series of VMware ESXi zero-day vulnerabilities that could escape the VM sandbox entirely. The ESXiArgs campaign in 2023 affected an estimated 3,800 servers globally, with a single compromise disabling or encrypting dozens of VMs simultaneously. Host-based agents were ineffective in these cases because the attacks occurred in the hypervisor.

Legacy Risks in Modern Data Centers

Data centers have always been challenging to secure, with physical servers hosting hypervisors, which in turn host VMs, and VMs hosting containers. Each layer introduces abstraction and potential blind spots, where assets may go unmanaged and vulnerabilities remain undetected. Misconfigurations can compound over time, and perimeter security may be ineffective in these environments.

AI data centers inherit these risks and accelerate them at an exponential rate. Transient network flows and just-in-time assets can materialize and vanish quickly, making it difficult for human operators or periodic scans to track. The use of host-based security agents can impact performance, leading some operators to disable security on critical compute nodes, hoping the perimeter holds.

A New Approach to Data Center Security

The solution to this challenge is not optimization, but rather reimagining the architecture by removing security from the host entirely. Data processing units (DPUs) installed on each server can provide this capability, executing security workloads on the DPU instead of the CPU. This approach frees the host CPU and GPU cycles for their intended operations and provides tamper-proof security, enforced at line speed, without negative performance impact.

A Blueprint for a Better Tomorrow

Shifting security from CPU-based agents to a DPU-based security architecture eliminates the security vs. productivity tradeoff. The DPU functions as an embedded sensor in each server, streaming telemetry data and monitoring network traffic without operational impact on the host. This approach enables continuous real-time monitoring, zero trust security at the hardware level, and comprehensive visibility across physical and virtual infrastructure.

The DPU-based architecture also provides deep packet inspection, analyzing traffic at the endpoint and eliminating bottlenecks to and from external appliances. Privacy protections are built into the design, with information extracted only from kernel-level structures and system metadata, not from user data or application-layer content.

Enabling Security and Performance

For two decades, data center security has been defined by an impossible equation: security or productivity. DPU-based security balances this equation, enabling security and performance to coexist without compromise. This approach is particularly important for AI data centers, where the stakes are high and performance constraints are tight.

By utilizing DPUs to execute security workloads, data centers can enhance security without sacrificing performance. This new approach to data center security provides a blueprint for a better tomorrow, where security and productivity are no longer a zero-sum game.


Source: SecurityWeek

Source: SecurityWeek

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free