Hi [[ session.user.profile.firstName ]]

Transform Security with VMware

  • Date
  • Rating
  • Views
  • Why VMware NSX, AirWatch & vSphere will redefine your Approach to Cyber Security
    Why VMware NSX, AirWatch & vSphere will redefine your Approach to Cyber Security Christopher Campbell, Director of Solution Marketing | Security & Tim Davis, Sr. Systems Engineer, NSX Enterprise, VMware Recorded: Oct 6 2017 68 mins
    Data breaches, cyber-attacks, security lapses and new regulations have made IT security more challenging than ever now that every organization has gone digital. IT teams are struggling with points solutions, as the traditional security approach no longer works. Explore how VMware makes cyber security intrinsic with a footprint throughout IT organizations with a security solution that includes products such as Workspace ONE, AirWatch, Horizon, NSX, AppDefense, vSphere, vSAN and vRNI that simplifies and consolidates IT security. Also, learn about what’s new with NSX and our newest security solution AppDefense.

    Technical Demo’s will include looks into the Horizon with NSX solution, and how it interacts with 3rd party solutions such as Trend Micro’s Deep Security to automate security processes. You will also get a look into the vRealize Network Insight tool, and how it is helping our customers operationalize these new security models, maintain operational visibility into the network, and ensure best practices and health of the networking and security services.
  • Transform Security - Data Security and VMware
    Transform Security - Data Security and VMware Christopher Campbell, Director of Solution Marketing | Security & Tim Davis, Sr. Systems Engineer, NSX Enterprise, VMware Recorded: Sep 20 2017 50 mins
    VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.
  • Extend Security From Mobile Device Into The Datacenter w/ VMware Airwatch & NSX
    Extend Security From Mobile Device Into The Datacenter w/ VMware Airwatch & NSX Sachin Sharma, Sr. Product Line Marketing Manager, VMware Recorded: Sep 14 2017 25 mins
    Mobility is a key driver in the consumerization of IT, leading to high expectations for IT to securely manage the influx of mobile devices and apps across networks. Cybersecurity threats are on the rise as the surface area of attack has expanded to mobile devices. Organizations need a solution in place to help accelerate mobile app delivery and automation while reducing the mobile access footprint and attack surface within the datacenter. VMware AirWatch and NSX integration provides that solution to help organizations extend security from the mobile device into the datacenter.
    Learn more about how your organization can use mobile workflows to raise productivity, while reducing cybersecurity threats using AirWatch and NSX. In this session, you’ll learn:
    •How business workflows have changed to support mobility
    •How AirWatch and NSX integrate to create intelligent networking with dynamic policies, per-app VPN and micro-segmentation
    •Key benefits of the AirWatch and NSX integration
  • Deploying Enterprise Secure Desktops And Applications With VMware Horizon & NSX
    Deploying Enterprise Secure Desktops And Applications With VMware Horizon & NSX Sheldon DPaiva, Director of Product Marketing, VMware & Matt De Vincentis, Group Product Marketing Manager, VMware Recorded: Aug 31 2017 31 mins
    Many organizations implement desktop and application virtualization to improve security and deliver greater employee mobility. Centralizing desktops and applications protects data at rest, prevents unauthorized application access, and provides a more efficient way to patch, maintain and upgrade images. However, with desktop and application virtualization, new security concerns can arise behind the data center firewall—where hundreds or even thousands of desktops reside. These desktops sit in close proximity to other users and mission-critical workloads, requiring protection from attacks. These attacks can move from desktop to server, exposing a large attack surface within the data center. VMware NSX for Horizon effectively secures east-west traffic within the data center, while ensuring that IT can quickly and easily administer networking and security policy that dynamically follows end users’ virtual desktops and apps across infrastructure, devices, and locations.
    In this webcast, you will learn:
    •The benefits of centrally deploying virtual desktops and apps
    •How centrally delivering desktops and apps boosts security
    •The benefits of micro-segmentation
    •How micro-segmentation provides end-to-end security for virtual desktops and applications
  • 5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time
    5 Key Benefits of Micro-Segmentation - Battling Cybercrime in Real-Time Alex Berger, Product Marketing Manager, VMware Recorded: Aug 3 2017 28 mins
    Cybercrime is growing fast—and traditional security solutions aren’t up to the task of slowing it down. Organizations are pouring huge amounts of time and money into perimeter-centric security, but that’s not adequate on its own anymore. It’s time for a new solution—one that starts with network virtualization and extends to enabling micro-segmentation for data center protection that can handle modern threats.

    In the webcast, you’ll learn:
    - Just how fast cybercrime is growing
    - Why a secure application infrastructure is the answer to today’s security challenges
    - What micro-segmentation is, and how it enables new levels of security
    - How micro-segmentation reduces costs, enables business agility, and supports simplicity
  • A Closer Look at Micro-Segmentation & Secure Application Infrastructures
    A Closer Look at Micro-Segmentation & Secure Application Infrastructures Geoff Wilmington, Sr. Systems Engineer, NSX Healthcare, VMware Recorded: Jul 27 2017 57 mins
    In today’s complicated security landscape, perimeter firewalls don’t provide adequate protection for agile applications, diverse environments, and rapidly multiplying users. To defend against sophisticated and costly attacks, IT needs to take a transformative approach to security. Micro-segmentation enabled by network virtualization provides the persistence, ubiquity, and extensibility needed to build a strong defense.

    In the webcast, we’ll discuss:
    - The top security challenges IT is facing today
    - Why a secure application infrastructure is an absolute must
    - The definition of micro-segmentation
    - How micro-segmentation keeps apps and users safe
  • Next-Gen Application Security at the Speed of Modern Business
    Next-Gen Application Security at the Speed of Modern Business Christopher Campbell, Director, Solutions Product Marketing, Security, VMware Recorded: Jul 19 2017 27 mins
    Applications drive modern business—and keeping them safe is a big priority for organizations across every industry. But as the digital economy continues to change the way applications are run and managed, IT teams must juggle traditional, virtual, and next-gen apps on a variety of platforms and environments. Perimeter-centric security simply can’t keep up with the diverse demands and threats. It’s time for a transformation that enables granular security that follows applications whether they’re on- or off-premises.

    In the webcast, we’ll explore:
    - How digital transformation is putting pressure on IT
    - Why abstraction is the solution
    - How abstraction delivers many benefits
  • NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center
    NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center Geoff Shukin & Ron Fuller Recorded: Jul 13 2017 55 mins
    You are probably using NSX for its micro-segmentation and network virtualization features, but did you know that NSX also includes an extremely robust and flexible load balancer that’s perfect for use in your software-defined data center (SDDC)? In this master class, we will review load balancing and provide demonstrations and ideas to help you get started with the NSX Load Balancer.

    We will cover:
    - Use cases for load balancing
    - Layer 4 and Layer 7
    - Encryption
    - Management and operations of the NSX Load Balancer
    - How NSX Load Balancer fits into the larger ecosystem of partners

    Demonstrations include:
    - Setting up Layer 4 or network load balancing
    - Setting up Layer 7 or application load balancing
    - Dealing with encryption
  • NSX Master Class: Networking from Physical to Virtual and Back Again!
    NSX Master Class: Networking from Physical to Virtual and Back Again! Neil Moore & Ron Fuller Recorded: Jun 27 2017 55 mins
    In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.

    This session will include:
    - A deep dive into setting up the physical and virtual network infrastructure.
    - Demos you can follow to get NSX quickly running in your environment.
  • NSX Master Class: Security
    NSX Master Class: Security Jimmy Ray Purser & Ron Fuller Recorded: Jun 15 2017 59 mins
    The best actors don’t film an entire movie in a single day. The same is true for ‘bad actors’ in your data center: they don’t attack the whole data center at once, but start small and branch out rapidly. With this approach, they can make traditional segmentation methods ineffective. The key to cyber security is to always expect a counter move. You need to make your data center operate dynamically, just as your threats do, yet remain flexible to support your applications.

    In this session, we will look at methods to operationalize east-west security in ways that ensure scaling and flexibility don’t become an increased burden on your IT staff.

    You'll learn:
    - Best practices from government recommendations
    - Automation for security with Service Composer
    - Security resource planning using Splunk and NSX

Embed in website or blog