Presentation Transcript: Integrating Virtual-Aware Security Technologies

Presentation Transcript: Integrating Virtual-Aware Security Technologies


There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This presentation transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. Key areas of emphasis include:

  • How virtualization technology is affecting security, and virtualization vendors' responses
  • Considerations for virtual firewalls and network segmentation
  • Tactics for using IDS/IPS with virtualization
  • Strengths and weaknesses of virtual vulnerability management


Dave Shackleford Founder, Principal Consultant, Voodoo Security

Dave Shackleford is the founder and principal consultant with Voodoo Security, as well as a SANS analyst, instructor, and course author and GIAC technical director. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. He is a VMware vExpert and has extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft, CTO for the Center for Internet Security, and as a security architect, analyst, and manager for several Fortune 500 companies. Dave is the co-author of Hands-On Information Security from Course Technology as well as the "Managing Incident Response" chapter in the Course Technology book Readings and Cases in the Management of Information Security. Recently, Dave co-authored the first published course on virtualization security for the SANS Institute. Dave currently serves on the board of directors at the Technology Association of Georgia's Information Security Society and the SANS Technology Institute.

24 Aug 2011
24 Aug 2011
9 Page(s)
Presentation Transcript
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.