Avoiding the Data Center Migration ‘Security Trap’

Presented by

Javvad Malik, Senior Analyst, Enterprise Security Practice, 451 Research Group & Reuven Harrison, CTO & Co-Founder, Tufin

About this talk

Regardless of whether it’s in the cloud or on premise, consolidating or deploying a new data center is a daunting task. It becomes even harder when moving workload from the existing data center to a new one. Successful migrations require clear visibility of application connectivity and an understanding of how your applications’ data is inter-connected. You also need to consider how to segment the network in order to meet compliance and data protection needs. One false move can take down business-critical applications. So unless the process is properly managed, it can be a security trap waiting to happen. Join Javvad Malik, Senior Analyst, Enterprise Security Practice at 451 Research Group, and Reuven Harrison, Tufin's CTO & Co-Founder, for an insightful discussion around the challenges and market trends in data center migration and learn how you can mitigate risk through real life examples.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more