This resource is no longer available
There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This presentation transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. Key areas of emphasis include:
- How virtualization technology is affecting security, and virtualization vendors' responses
- Considerations for virtual firewalls and network segmentation
- Tactics for using IDS/IPS with virtualization
- Strengths and weaknesses of virtual vulnerability management