sponsored by SearchNetworking.com
Posted:  17 Jun 2013
Premiered:  24 Jun 2013
Format:  Multimedia
Type:  Virtual Environment
Language:  English
ABSTRACT:

With virtualized data centers and the increasing use of multi-tenant clouds, the network is playing a growing role in IT security to protect enterprise applications. Increasing mobile access due to BYOD means network professionals need to implement identity-aware network security across a wide range of devices to manage corporate network access. 

To meet the challenge of securing the network for the data center, network engineers need to deploy high-performance solutions.

In this classroom, our experts will discuss how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.




Speaker

Henry Svendblad
Principal Research Analyst ,  Nemertes Research

Henry Svendblad is a Principal Research Analyst with Nemertes Research, where he conducts both primary benchmark research and custom research, advises vendor and enterprise clients, writes thought-leadership reports, and delivers strategic seminars. A seasoned senior-level IT executive, Henry leads research on advanced carrier services with an emphasis on emerging trends, vendor management, business continuity/disaster recovery, security, and cloud strategies.



BROWSE RELATED VIRTUAL ENVIRONMENTS
Endpoint Security | Network Forensics | Network Management | Network Monitoring | Network Performance | Network Security | Security | Security Management | Security Threats

View All Resources sponsored by SearchNetworking.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement