Watch on YouTube
Watch on Vimeo
Now that we know what to do and what we want to secure our applications, where do we start? Do you know how your applications are dependent and communicating in your environment? How can you identify all the logical boundaries and connectivity to define & implement your segmentation & security policy? Even if you did figure that out, how do you keep them current and where do you enforce them?
Come join us in this section to learn how Tetration discovers the policy automatically, in your dynamic environment. How can it help keep your policies current & up to date, how does it ‘follow’ your application workload.
Once we discover the policy, we will also walk through where and how to enforce it in your environment to keep all your workloads secure, everywhere.
Personnel: Tim Garner
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!