Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery

Presented by

John Whitman, Senior NSX Systems Engineer, VMware

About this talk

Series Title: Illustrating the Value of Network Virtualization Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives. Webcast 2/3 Title: NSX for Multi-site Deployments and Disaster Recovery Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO. In this session, we will discuss: •The many benefits of deploying NSX across multiple data centers •Capabilities and use cases for cross-data center connectivity and security •Using NSX to improve your disaster recovery plans and strengthen RTO

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (9631)
Are you interested in transforming security and learning how to secure the interactions between users, applications and data, in an environment that is changing and becoming increasingly dynamic? Join this channel for weekly webcasts and become an expert in 3 IT initiatives: 1. Secure application infrastructure 2. Secure identity and endpoints 3. Streamline compliance VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.