Hi [[ session.user.profile.firstName ]]

Transform Security with VMware

  • Date
  • Rating
  • Views
  • 5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time
    5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time Alex Berger, Product Marketing Manager, VMware Recorded: Aug 3 2017 28 mins
    Cybercrime is growing fast—and traditional security solutions aren’t up to the task of slowing it down. Organizations are pouring huge amounts of time and money into perimeter-centric security, but that’s not adequate on its own anymore. It’s time for a new solution—one that starts with network virtualization and extends to enabling micro-segmentation for data center protection that can handle modern threats.

    In the webcast, you’ll learn:
    - Just how fast cybercrime is growing
    - Why a secure application infrastructure is the answer to today’s security challenges
    - What micro-segmentation is, and how it enables new levels of security
    - How micro-segmentation reduces costs, enables business agility, and supports simplicity
  • A Closer Look at Micro-Segmentation & Secure Application Infrastructures
    A Closer Look at Micro-Segmentation & Secure Application Infrastructures Geoff Wilmington, Sr. Systems Engineer, NSX Healthcare, VMware Recorded: Jul 27 2017 57 mins
    In today’s complicated security landscape, perimeter firewalls don’t provide adequate protection for agile applications, diverse environments, and rapidly multiplying users. To defend against sophisticated and costly attacks, IT needs to take a transformative approach to security. Micro-segmentation enabled by network virtualization provides the persistence, ubiquity, and extensibility needed to build a strong defense.

    In the webcast, we’ll discuss:
    - The top security challenges IT is facing today
    - Why a secure application infrastructure is an absolute must
    - The definition of micro-segmentation
    - How micro-segmentation keeps apps and users safe
  • Next-Gen Application Security at the Speed of Modern Business
    Next-Gen Application Security at the Speed of Modern Business Christopher Campbell, Director, Solutions Product Marketing, Security, VMware Recorded: Jul 19 2017 27 mins
    Applications drive modern business—and keeping them safe is a big priority for organizations across every industry. But as the digital economy continues to change the way applications are run and managed, IT teams must juggle traditional, virtual, and next-gen apps on a variety of platforms and environments. Perimeter-centric security simply can’t keep up with the diverse demands and threats. It’s time for a transformation that enables granular security that follows applications whether they’re on- or off-premises.

    In the webcast, we’ll explore:
    - How digital transformation is putting pressure on IT
    - Why abstraction is the solution
    - How abstraction delivers many benefits
  • NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center
    NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center Geoff Shukin & Ron Fuller Recorded: Jul 13 2017 55 mins
    You are probably using NSX for its micro-segmentation and network virtualization features, but did you know that NSX also includes an extremely robust and flexible load balancer that’s perfect for use in your software-defined data center (SDDC)? In this master class, we will review load balancing and provide demonstrations and ideas to help you get started with the NSX Load Balancer.

    We will cover:
    - Use cases for load balancing
    - Layer 4 and Layer 7
    - Encryption
    - Management and operations of the NSX Load Balancer
    - How NSX Load Balancer fits into the larger ecosystem of partners

    Demonstrations include:
    - Setting up Layer 4 or network load balancing
    - Setting up Layer 7 or application load balancing
    - Dealing with encryption
  • NSX Master Class: Networking from Physical to Virtual and Back Again!
    NSX Master Class: Networking from Physical to Virtual and Back Again! Neil Moore & Ron Fuller Recorded: Jun 27 2017 55 mins
    In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.

    This session will include:
    - A deep dive into setting up the physical and virtual network infrastructure.
    - Demos you can follow to get NSX quickly running in your environment.
  • NSX Master Class: Security
    NSX Master Class: Security Jimmy Ray Purser & Ron Fuller Recorded: Jun 15 2017 59 mins
    The best actors don’t film an entire movie in a single day. The same is true for ‘bad actors’ in your data center: they don’t attack the whole data center at once, but start small and branch out rapidly. With this approach, they can make traditional segmentation methods ineffective. The key to cyber security is to always expect a counter move. You need to make your data center operate dynamically, just as your threats do, yet remain flexible to support your applications.

    In this session, we will look at methods to operationalize east-west security in ways that ensure scaling and flexibility don’t become an increased burden on your IT staff.

    You'll learn:
    - Best practices from government recommendations
    - Automation for security with Service Composer
    - Security resource planning using Splunk and NSX
  • NSX and Security Operations
    NSX and Security Operations Sean O’Dell - Staff System Engineer, Networking and Security Business Unit, VMware Recorded: May 25 2017 18 mins
    Network and security operations traditionally have been handled by two different operations teams, although much of the same operations data is used, but differently on whether the operations team is troubleshooting a connectivity problem, or a security breach. Log data, traffic data, and API based data from the various different network devices are used by both Network and Security operations. vRealize Network Insight (vRNI) offers use cases for both teams, all from the same data collection sources.

    Learn how vRNI is helping organizations:
    •Deploy advanced security with micro-segmentation
    •Leverage 360 degree visibility
    •Improve operations and simplify management
  • Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices
    Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Recorded: Feb 23 2017 11 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: Networking and Security for Virtual Desktops and Mobile Devices
    Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources.

    In this session, we will discuss:
    •Using intelligent networking and micro-segmentation to make VDI environments more secure
    •Minimizing your attack surface with rules and policies for dynamic virtual desktops
    Extending security from mobile devices and applications to the data center
  • NSX Customer Success Story with Vallejo
    NSX Customer Success Story with Vallejo Jason Kaduk & Terry Chatman Recorded: Feb 23 2017 61 mins
    Moving to the next level of the SDDC - a Public Agency transforms security with VMware NSX, AirWatch Blue, and Palo Alto Networks integration

    Vallejo Sanitation and Flood Control District, located in California, has moved to the next level of virtualization with VMware NSX. Join us to see how they have ventured into network virtualization to transform their physical network into the logical realm with integration of VMware NSX, AirWatch, and Palo Alto Networks.

    “It was a journey to get where we are today and we will discuss our deployment, pain points and the overall success. With VMware NSX, AirWatch, and Palo Alto Networks integration, the sky is the limit for what can now be designed with less provisioning time and access to a suite of virtual core network services. See how VMware NSX, AirWatch and Palo Alto Networks has changed the way our organization thinks and gets the job done!” – Vallejo Sanitation and Flood Control District

    You will learn:
    Why you should move your network infrastructure into the Virtual World
    Process and integration of AirWatch and Palo Alto Networks VM series firewalls
    Deployment, pain points and overall success
  • Introduction to Operational Transformation with NSX Network Virtualization and S
    Introduction to Operational Transformation with NSX Network Virtualization and S Mark Schweighardt and Venky Deshpande Recorded: Feb 23 2017 67 mins
    NSX network virtualization represents a major advancement in helping organizations realize the benefits of speed, agility, and security. Enterprises are using VMware NSX to achieve game-changing operational advantages. In this webinar we will cover the NSX Operations Maturity Model that spans across people, process, and tooling – including general operational guidance and best practices based on real world implementations. This unique webinar is ideal for IT executives and managers who want to understand what it takes to operationalize NSX. It is also useful for networking and security professionals in architecture, engineering, and admin/ops who will participate in operationalizing NSX for their organization.

    In this webcast, you will:
    - Gain a basic understanding of the NSX Operations Maturity Model and what it takes to successfully operationalize NSX across people, process, and tooling.
    - Learn about the real-life best practices customers are using to operationalize NSX, as well as the resources and services VMware offers to help you on this journey.
    - Learn how to approach your transformational journey gradually, by starting small and taking incremental steps towards a more mature end state.

Embed in website or blog