|
Dhruv Jain Presented at Security Field Day |
This Presentation date is March 25, 2021 at 14:00-15:30.
Presenters: Brian Heili, Chad Skipper, Dhruv Jain, Stijn Vanveerdeghem
Follow on Twitter using the following hashtags or usernames: #XFD5
VMware Operationalizing East – West Security at Scale with NSX Firewall
Watch on YouTube
Watch on Vimeo
VMware’s software-defined firewalling approach allows enterprises to easily operationalizing East-West security at scale and ensure threats are not able to spread laterally through the network. Enterprises can now buy and deploy VMware NSX Firewall as a standalone security product. No longer do you need to be an existing NSX customer to take advantage of our innovative software-based approach. There are no more excuses for why you can’t modernize your security strategy today.
Personnel: Dhruv Jain
VMware Segmentation Made Easy: A Practical Demo
Watch on YouTube
Watch on Vimeo
This session will walk you through a real-world example of how you can secure VMware vSphere workloads with NSX Firewall. This allows you to implement segmentation in your network with just a few simple steps, in a matter of minutes, and without making any changes to your existing environment. Don’t believe us? Watch the demo and finally achieve your goal of segmenting applications and prevent lateral movement within the data center.
Personnel: Brian Heili
VMware Level Up Threat Prevention Inside the Data Center
Watch on YouTube
Watch on Vimeo
With the acquisition of Lastline, VMware further extended its capabilities for NSX Firewall to deliver VMware NSX Advanced Threat Prevention (ATP). This solution includes capabilities consisting of VMware NSX Distributed IDS/IPS and Network Sandboxing and Network Traffic Analysis (NTA/NDR). NSX Advanced Threat Prevention allows security teams to stop the spread of attacks that breach the perimeter. The IDS/IPS can detect network threats by combining industry-leading signature sets and protocol decoders, the network sandbox provides complete malware analysis of artifacts traversing your data center and network traffic analysis detects lateral threats and anomalies in the traffic flow between hops.
Personnel: Chad Skipper, Stijn Vanveerdeghem