Lightboard Series: Micro-segmentation Planning – What You Need to Know

Presented by

Sean O’Dell, Systems Engineer, Network & Security Business Unit, VMware

About this talk

Series Title: Illustrating the Value of Network Virtualization Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives. Webcast 1/3 Title: Micro-segmentation Planning – What You Need to Know Abstract: Are you interested in deploying micro-segmentation but not sure where to start? One of the challenges is acquiring a complete picture of what’s going on within the datacenter and understanding your network flows. We’ll show you how to collect and analyze network flows in real time with vRealize Network Insight, providing vital context into the virtual machines and the applications they are originating from or terminating to. Once you understand who is talking to whom and which flows need to be allowed or blocked, you can use that intel to effectively model security groups and firewall rules, making micro-segmentation easier to deploy. In this webcast, we will discuss: •The key steps you need to know to prepare for micro-segmentation •How to collect network flow data to build a picture of your application environment •Using network flow information to model security groups and firewall rules

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (9635)
Are you interested in transforming security and learning how to secure the interactions between users, applications and data, in an environment that is changing and becoming increasingly dynamic? Join this channel for weekly webcasts and become an expert in 3 IT initiatives: 1. Secure application infrastructure 2. Secure identity and endpoints 3. Streamline compliance VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.