Lightboard Series: Episode 2 - Security at the Speed of Business

Presented by

Julie Starr, Security Strategist, VMware | Hadar Freehling, Staff Security Strategist, VMware

About this talk

Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX. While there are many benefits of a SDDC approach including NSX, micro-segmentation has become the foundation for a dramatic improvement in data center security for many organizations. Join us to learn: - Why there is no other solution in market that can achieve micro-segmentation in an operationally feasible manner - How Service Composer, distributed firewall, and service chaining work in concert to bring considerable benefits, implementing micro-segmentation to stop lateral movement in your data center - The ability to insert third party network and security services to respond to changing conditions in the data center Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (9637)
Are you interested in transforming security and learning how to secure the interactions between users, applications and data, in an environment that is changing and becoming increasingly dynamic? Join this channel for weekly webcasts and become an expert in 3 IT initiatives: 1. Secure application infrastructure 2. Secure identity and endpoints 3. Streamline compliance VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.