This resource is no longer available

Cover Image

There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This presentation transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. Key areas of emphasis include:

  • How virtualization technology is affecting security, and virtualization vendors' responses
  • Considerations for virtual firewalls and network segmentation
  • Tactics for using IDS/IPS with virtualization
  • Strengths and weaknesses of virtual vulnerability management
Vendor:
Intel
Posted:
Feb 8, 2021
Published:
Aug 24, 2011
Format:
PDF
Type:
Presentation Transcript

This resource is no longer available.