sponsored by Intel
Posted:  24 Aug 2011
Published:  24 Aug 2011
Format:  PDF
Length:  9  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This presentation transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. Key areas of emphasis include:

  • How virtualization technology is affecting security, and virtualization vendors' responses
  • Considerations for virtual firewalls and network segmentation
  • Tactics for using IDS/IPS with virtualization
  • Strengths and weaknesses of virtual vulnerability management



Author

Dave Shackleford
Founder, Principal Consultant, Voodoo Security

Dave Shackleford is the founder and principal consultant with Voodoo Security, as well as a SANS analyst, instructor, and course author and GIAC technical director. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. He is a VMware vExpert and has extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft, CTO for the Center for Internet Security, and as a security architect, analyst, and manager for several Fortune 500 companies. Dave is the co-author of Hands-On Information Security from Course Technology as well as the "Managing Incident Response" chapter in the Course Technology book Readings and Cases in the Management of Information Security. Recently, Dave co-authored the first published course on virtualization security for the SANS Institute. Dave currently serves on the board of directors at the Technology Association of Georgia's Information Security Society and the SANS Technology Institute.



BROWSE RELATED RESOURCES
Firewall Appliances | Intrusion Detection Systems | Intrusion Prevention Systems | Security Management | Virtualization Security | Vulnerability Management

View All Resources sponsored by Intel

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement