Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices

Presented by

Hadar Freehling, Staff Security Strategist, Networking & Security, VMware

About this talk

Series Title: Illustrating the Value of Network Virtualization Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives. Webcast 3/3 Title: Networking and Security for Virtual Desktops and Mobile Devices Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources. In this session, we will discuss: •Using intelligent networking and micro-segmentation to make VDI environments more secure •Minimizing your attack surface with rules and policies for dynamic virtual desktops Extending security from mobile devices and applications to the data center

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (53)
Subscribers (9631)
Are you interested in transforming security and learning how to secure the interactions between users, applications and data, in an environment that is changing and becoming increasingly dynamic? Join this channel for weekly webcasts and become an expert in 3 IT initiatives: 1. Secure application infrastructure 2. Secure identity and endpoints 3. Streamline compliance VMware transforms security by providing a ubiquitous software layer across application infrastructure and endpoints, maximizing visibility and context of the interaction between users and applications, aligning security controls and policies to the applications they are protecting, and enabling the insertion of third-party security services for additional intelligent protection.