Available On Demand
All registrants will automatically receive two special reports from ITPro Today: "Your Quick Guide to Containerization" and the "2017 IT Salary Report".
The way we deliver content today has fundamentally changed. New solutions are pushing applications, desktops and services into an even more distributed architecture. Consider this, the latest State of the Data Center Industry report indicated that four in ten respondents have either deployed or planned to deploy edge compute capacity.
More so, organizations are actively looking into cloud, hybrid, and even more at distributed IT. All of this has resulted in rapidly changing requirements around the data center and your applications. With the addition of cloud-native applications, multi-tenancy, and connections to public clouds, the complexity of virtualization and network security has grown exponentially.
However, there is some good news. With advancements in virtualization, hyperconvergence, and perimeter security – administrators can do some pretty amazing things around application delivery and control.
Microsegmentation can be a crucial tool in the security architectures of the modern data center. Administrators can leverage it to get granular at the application level, in addition to gaining visibility into application interactions that are not possible using a traditional perimeter security model.
In this webinar, we’ll cover some of the latest developments in cloud adoption and edge computing design. From there, we’ll explore how new advancements in virtualization and software-defined networking can be applied to application security. We’ll review the technology behind microsegmentation, highlight common use cases, and dig into the unique implementation.
Specifically, we’ll cover:
- Growth around edge and cloud solutions
- Increased density of the modern data center
- How virtualization enables distributed IT and supports modern applications
- Working with new solutions like microsegmentation and how this can be applied to application delivery and security
- Final thoughts, how to get started, and some best practices
If you have already registered, click here to access
Bill Kleyman is an enthusiastic technologist with experience in data center design, management, and deployment. His architecture work includes large virtualization and cloud deployments as well as business network design and implementation. As Chief Technology Officer at MTM Technologies, he interacts with enterprise organizations and helps align IT strategies with direct business goals. He also publishes freelance whitepapers, articles, podcasts, and blogs around data center, cloud, security, and infrastructure management topics.
Mike Wronski is the Principal Product Marketing Manager for Nutanix and has more than 20 years of experience in technology, including networking, security, and virtualization, both in Fortune 50 and start-up environments. Mike is a thought leader and frequent speaker and contributor to trade publications and events in the data center and virtualization space. His specialties include SDDC, Virtualization, Private Cloud, Networking, Management, & Security; and CISSP - Network Security Certification. Mike is also a Certified Ethical Hacker and has earned HIPAA - Medical Device Compliance in Patient Privacy.