Securing the Virtualised Environment: Keeping the Dream Alive

Presented by

Neil Anderson, Principal Consultant, Dell SecureWorks

About this talk

Virtualisation has been one of the most exciting innovations to take off in the IT sphere of the last decade. Virtualising vast swathes of your infrastructure can deliver substantial savings in terms of hardware, power cooling and most importantly, valuable data centre space. Virtualisation has also led to to the rise of cloud computing as a viable proposition. But virtualisation can also cause massive headaches when trying to secure your newly virtualised environment. Suddenly, traditional designs for segmentation, endpoint defence, and traffic inspection no longer work. Traditional architectures have gaping security holes when applied to virtualised environments. In this Dell SecureWorks webcast, Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team, will discuss:where the problem exists when trying to secure the virtual environmental, common pitfalls for organisations and advice to combat these issues: -Roadblocks to securing the virtual environmental -Experience from the coalface: Common pitfalls -Expert advice on how to secure the virtual environment As a member of the infrastructure protection and mobility team, Neil Anderson provides consultancy and pre-sales support for network security projects across the UK. Neil is responsible for the design, specification, architecture and implementation of network security solutions across the range of services offered by the infrastructure protection and mobility team. As a qualified CLAS consultant, Neil also provides network security consultancy services for clients to achieve compliance with Government standards and industry best-practice

Related topics:

More from this channel

Upcoming talks (19)
On-demand talks (3501)
Subscribers (180263)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.