Menu Shape 3 copy 2Created with Avocode.
webinara overview
IT and Technology

Securing the Data Center: The Role of Micro Segmentation

webinar description

Server virtualization, the rise of the hypervisor and the emergence of the software-defined data center have birthed a new concept in security: micro segmentation. The days of a strong perimeter at the edge of the data center protecting trusted data and applications on the inside are over. Data center architects are using virtualization to create small trusted zones with their own security policies and enforcement. Building these micro segments and layering the proper security mechanisms on top of them requires fast, flexible and comprehensive visibility into traffic. This webinar describes how secure micro segmentation works and investigates the role of visibility in creating strong security solutions in the data center.

Who Should Attend
Service providers, data center operators and vendors interested in learning more about micro segmentation and its impact on security, the media and financial analysts.

Free Report
Everyone who registers for this webinar will receive a special report by Research Director Jeff Wilson. A download link will be sent to you and the report will also be available to download from the live webinar console.

Reasons to attend the webinar
  • Drivers for data centers moving to virtualization

  • How virtualization impacts data center architectures and the critical need for security mechanisms

  • Examples of micro segmentation and strategies for deploying security in the data center

Speakers:
IHS
Jeff Wilson, Research Director, Cybersecurity Technology
Qosmos
Jerome Tollet, CTO and Co-Founder
18

Nov

2015

11:00 - 12:00 PM
(GMT -4)

(Duration - 60 minutes)

ATTENDANCE FEE - FREE

WEBINAR HAS ENDED
Other webinars you may like
FREE
Jun 20, 12.00 PM (GMT -04:00)
Leveraging RPA, AI and Mobile Technology
Today’s customers expect unprecedented quality of service in an I-want-it-now economy. Amazon, Uber and other digital-native companies have created a customer demand for immediate, high quality, in-the-moment service from all providers in all industries. How traditional enterprises can meet this
IRPA AI
Speaker - Gregory North
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Jun 20, 12.00 PM (GMT -04:00)
Leveraging RPA, AI and Mobile Technology
Today’s customers expect unprecedented quality of service in an I-want-it-now economy. Amazon, Uber and other digital-native companies have created a customer demand for immediate, high quality, in-the-moment service from all providers in all industries. How traditional enterprises can meet this
IRPA AI
Speaker - Gregory North
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Duration: 30 Min
Business Data Onboarding Better By 10X With Large File Data Ingestion
Large volume of data is an old adversary of data integration and onboarding solutions. Enterprises relying on sub-par data exchange technology can barely handle files more than 1 GB, which is abominably low per today’s standards. Moreover, they consume a fair amount of money, time, and effort
Adeptia Inc.
Speaker - Raman Singh
More info
FREE
Duration: 60 Min
User Onboarding Emails that Drive Customer Success and Free-to-Paid Conversions
It’s time to dust off your user onboarding emails and make them your highest converting channel. Chameleon and Sendwithus are excited to host Alli Blum, a SaaS onboarding expert and conversion copywriter who will share her strategies for designing an onboarding email sequence that drives more
Chameleon
Speaker - Alli Blum
More info
FREE
Duration: 60 Min
Business Intelligence and Advanced Analytics
Why is your data important? Having an agile, modern Business Intelligence & Advanced Analytics platform enables fast & accurate access to critical insights across a range of analytics. Organizations in the global trade era must quickly and successfully navigate supply chains, converting data
nVision Global
Speaker - Luther Brown
More info
SHOW ALL WEBINARS
ARE YOU 100% SURE YOU WANT TO YOU WANT TO DISCONNECT ?

Yes No
ARE YOU 100% SURE YOU WANT TO REMOVE THIS SPEAKER ?

Yes No
THIS SPEAKER CANNOT BE REMOVED. YOU HAVE ALREADY SELECTED THIS SPEAKER ABOVE. SELECT ANOTHER SPEAKER ABOVE TO REMOVE IT.

OK
PLEASE TYPE A VALID KEYWORD IN THE SEARCH FIELD