From Zero Visibility to Zero Trust in the Data Center

Logo
Presented by

David Holmes, Forrester | Tom Gillis, VMware & Swapnil Hendre, VMware

About this talk

3 Steps to Advanced East-West Protection While the fallout of the SolarWinds breach is still unfolding, we know that malicious attackers spent nine months making lateral movements once inside the perimeter defenses. The simple truth is you can’t prevent and detect what you can’t see. And with internal, east-west traffic accounting for 85 percent of all network traffic in the data center, you’re missing a lot. Yet security professionals remain paralyzed with the complexities of securing east-west traffic in today’s modern app architecture and software-defined data centers and instead continue to rely on traditional firewalls leading to choke points, hair-pinning, static policies and increasing costs. There’s an easier way.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (5)
Subscribers (1257)
The nature of work and the boundaries between office and home have changed. Networking and security must merge to support seamless, secure, reliable application access to cloud and SaaS for users at the branch, home, or away. Bring network and security architecture to the digital age with Virtual Cloud Network.