Introduction to Operational Transformation with NSX Network Virtualization and S

Presented by

Mark Schweighardt and Venky Deshpande

About this talk

NSX network virtualization represents a major advancement in helping organizations realize the benefits of speed, agility, and security. Enterprises are using VMware NSX to achieve game-changing operational advantages. In this webinar we will cover the NSX Operations Maturity Model that spans across people, process, and tooling – including general operational guidance and best practices based on real world implementations. This unique webinar is ideal for IT executives and managers who want to understand what it takes to operationalize NSX. It is also useful for networking and security professionals in architecture, engineering, and admin/ops who will participate in operationalizing NSX for their organization. In this webcast, you will: - Gain a basic understanding of the NSX Operations Maturity Model and what it takes to successfully operationalize NSX across people, process, and tooling. - Learn about the real-life best practices customers are using to operationalize NSX, as well as the resources and services VMware offers to help you on this journey. - Learn how to approach your transformational journey gradually, by starting small and taking incremental steps towards a more mature end state.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (9631)
Are you interested in transforming security and learning how to secure the interactions between users, applications and data, in an environment that is changing and becoming increasingly dynamic? Join this channel for weekly webcasts and become an expert in 3 IT initiatives: 1. Secure application infrastructure 2. Secure identity and endpoints 3. Streamline compliance VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.