Microsegmentation: A Better Way to Protect Application Workloads & Secure Data
Date: Thursday, November 30, 2017
Time: 1:00 p.m. EST / 10:00 a.m. PST
Microsegmentation allows IT and developers a way to decouple security policies from the restraints of physical hardware. By embedding security policies directly into the virtualization layer -- within the hypervisor itself -- microsegmentation offers a much more efficient and practical way to secure workloads. Many enterprise applications still run on legacy machines and non-virtualized bare-metal servers, and sometimes contain the most sensitive data a company can have. Keeping these apps more segregated by limiting the amount of traffic traveling between apps can ensure that someone snooping on a network cannot access the data of an enterprise's most important legacy application. Ideally, customers want a single unified policy and enforcement mechanism that is extensible and portable, for their entire compute estate running on legacy systems, bare-metal servers, virtualized hosts and cloud workloads. Microsegmentation allows customers to achieve this goal and eliminates many of the most vulnerable spots in the application chain.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Malware targets Schneider Electric's Triconex safety instrumented system.
Companies think that they are much safer than their actual password practices would suggest.
Security firm Preempt issued an advisory that showed how to conceptually bypass the Enhanced Protection for Authentication that prevents attackers from performing a relay of NT Lan Manager messages to top-level security sessions.
Researchers found that 81% of consumers still favor passwords for making payments online due to concerns about the security of new biometric options.
Everyone be cool, this is one heckuva robbery!
Levers of Human Deception: The Science and Methodology Behind Social Engineering
Tuesday, June 18, 2019Considerations in Selecting the Right SD-WAN Solution - The role of service providers and future planning
1:00 p.m New York
Thursday, June 20, 2019Making an Intelligence-led Defense a Reality
1:00 pm New York / 6:00 pm London
Wednesday, June 26, 2019
1:00 p.m New York
ARCHIVED | August 31, 2017, 3pm EDT
An interview with Steve Grobman, CTO of McAfee
Tweets by Security_Now_
like us on facebook