Enviar pesquisa
Carregar
vSEC pro VMware NSX
•
2 gostaram
•
457 visualizações
MarketingArrowECS_CZ
Seguir
Virtualization Forum 2017 Praha, 1.11.2017
Leia menos
Leia mais
Tecnologia
Vista de apresentação de diapositivos
Denunciar
Compartilhar
Vista de apresentação de diapositivos
Denunciar
Compartilhar
1 de 48
Baixar agora
Baixar para ler offline
Recomendados
vSEC pro CISCO ACI
vSEC pro CISCO ACI
MarketingArrowECS_CZ
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
kimw001
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
NETSCOUT
Application Centric Infrastructure (ACI)
Application Centric Infrastructure (ACI)
Cisco IT
SDN/NFV Industry analysis
SDN/NFV Industry analysis
Yu (Robert) Dong
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Canada
Application Security with NGINX | APAC
Application Security with NGINX | APAC
NGINX, Inc.
Monitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo Logic
NGINX, Inc.
Recomendados
vSEC pro CISCO ACI
vSEC pro CISCO ACI
MarketingArrowECS_CZ
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
kimw001
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
NETSCOUT
Application Centric Infrastructure (ACI)
Application Centric Infrastructure (ACI)
Cisco IT
SDN/NFV Industry analysis
SDN/NFV Industry analysis
Yu (Robert) Dong
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Canada
Application Security with NGINX | APAC
Application Security with NGINX | APAC
NGINX, Inc.
Monitoring NGINX Deployments with Sumo Logic
Monitoring NGINX Deployments with Sumo Logic
NGINX, Inc.
Cisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
islam Salah
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
NGINX, Inc.
FactoryTalk® AssetCentre: Overview
FactoryTalk® AssetCentre: Overview
Rockwell Automation
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
NGINX, Inc.
What's New with NGINX Application Security Solutions
What's New with NGINX Application Security Solutions
NGINX, Inc.
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
NGINX, Inc.
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
Debra Jennings
The Evolution of the Data Centre
The Evolution of the Data Centre
Cisco Canada
Découvrez NGINX AppProtect
Découvrez NGINX AppProtect
NGINX, Inc.
Best Practices for DevOps-Friendly API Management
Best Practices for DevOps-Friendly API Management
NGINX, Inc.
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Canada
Production-Grade Kubernetes With NGINX Ingress Controller
Production-Grade Kubernetes With NGINX Ingress Controller
NGINX, Inc.
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
NGINX, Inc.
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
SDNRG ITB
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
NGINX, Inc.
Extend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server Databases
Red Gate Software
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURE
Cisco Russia
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
ldangelo0772
Aci presentation
Aci presentation
Joe Ryan
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Canada
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
MarketingArrowECS_CZ
Mais conteúdo relacionado
Mais procurados
Cisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
islam Salah
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
NGINX, Inc.
FactoryTalk® AssetCentre: Overview
FactoryTalk® AssetCentre: Overview
Rockwell Automation
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
NGINX, Inc.
What's New with NGINX Application Security Solutions
What's New with NGINX Application Security Solutions
NGINX, Inc.
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
NGINX, Inc.
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
Debra Jennings
The Evolution of the Data Centre
The Evolution of the Data Centre
Cisco Canada
Découvrez NGINX AppProtect
Découvrez NGINX AppProtect
NGINX, Inc.
Best Practices for DevOps-Friendly API Management
Best Practices for DevOps-Friendly API Management
NGINX, Inc.
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Canada
Production-Grade Kubernetes With NGINX Ingress Controller
Production-Grade Kubernetes With NGINX Ingress Controller
NGINX, Inc.
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
NGINX, Inc.
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
SDNRG ITB
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
NGINX, Inc.
Extend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server Databases
Red Gate Software
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURE
Cisco Russia
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
ldangelo0772
Aci presentation
Aci presentation
Joe Ryan
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Canada
Mais procurados
(20)
Cisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
Strengthen Security and Traffic Visibility on Amazon EKS with NGINX
FactoryTalk® AssetCentre: Overview
FactoryTalk® AssetCentre: Overview
Controller and Coffee: Deliver APIs in Real Time with API Management
Controller and Coffee: Deliver APIs in Real Time with API Management
What's New with NGINX Application Security Solutions
What's New with NGINX Application Security Solutions
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
Why CIOs Need Real-Time APIs to Drive Competitive Digital Businesses
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
The Evolution of the Data Centre
The Evolution of the Data Centre
Découvrez NGINX AppProtect
Découvrez NGINX AppProtect
Best Practices for DevOps-Friendly API Management
Best Practices for DevOps-Friendly API Management
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Production-Grade Kubernetes With NGINX Ingress Controller
Production-Grade Kubernetes With NGINX Ingress Controller
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
Deploy and Secure Your API Gateway with NGINX: From Zero to Hero – APCJ
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
F5 perspective of nfv+sdn (SDN NFV Day ITB 2016)
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Extend DevOps to Your SQL Server Databases
Extend DevOps to Your SQL Server Databases
APPLICATION CENTRIC INFRASTRUCTURE
APPLICATION CENTRIC INFRASTRUCTURE
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
Aci presentation
Aci presentation
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Semelhante a vSEC pro VMware NSX
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
MarketingArrowECS_CZ
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
LiveAction Next Generation Network Management Software
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
MarketingArrowECS_CZ
Checkpoint Overview
Checkpoint Overview
Leonardo Antichi
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
ControlCase
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
Puppet
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
PCM
VMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
Implementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices Infrastructure
DevSecOpsSg
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
VMworld
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
Abasse KPEGOUNI
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld
Business Agility and Security with VMware
Business Agility and Security with VMware
Angel Villar Garea
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Avi Networks
Semelhante a vSEC pro VMware NSX
(20)
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
Checkpoint Overview
Checkpoint Overview
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
VMware vShield - Overview
VMware vShield - Overview
Implementing Docker Load Balancing in Microservices Infrastructure
Implementing Docker Load Balancing in Microservices Infrastructure
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
Business Agility and Security with VMware
Business Agility and Security with VMware
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Mais de MarketingArrowECS_CZ
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
MarketingArrowECS_CZ
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
MarketingArrowECS_CZ
Chráníte správně svoje data?
Chráníte správně svoje data?
MarketingArrowECS_CZ
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
MarketingArrowECS_CZ
Infinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
Infinidat InfiniBox
Infinidat InfiniBox
MarketingArrowECS_CZ
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
MarketingArrowECS_CZ
Základy licencování Oracle software
Základy licencování Oracle software
MarketingArrowECS_CZ
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
MarketingArrowECS_CZ
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
MarketingArrowECS_CZ
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
MarketingArrowECS_CZ
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
MarketingArrowECS_CZ
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
MarketingArrowECS_CZ
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
MarketingArrowECS_CZ
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
MarketingArrowECS_CZ
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
MarketingArrowECS_CZ
Mais de MarketingArrowECS_CZ
(20)
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniGuard
Infinidat InfiniBox
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
Último
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Sujit Pal
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Último
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
vSEC pro VMware NSX
1.
©2015 Check Point
Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. Zabezpečení softwarově definovaných datových center prostřednictvím Check Point vSEC a VMware NSX Peter Kovalčík Security Engineer, Check Point Software Technologies
2.
©2015 Check Point
Software Technologies Ltd. 2 Hey, I can spin-up VMs in minutes. Why does it take a week to get network/firewall changes State of Virtualization vs. Networking
3.
©2015 Check Point
Software Technologies Ltd. 3 DATA CENTERS are rapidly evolving.
4.
©2015 Check Point
Software Technologies Ltd. 4 Virtual Datacenter DATA CENTER EVOLUTION • Server (compute) virtualization • Network operation is manual Software Defined Datacenter Private Cloud • Network are is also virtualized • Services can be dynamically inserted and orchestrated via automation
5.
©2015 Check Point
Software Technologies Ltd. 5 THE NEW ERA OF SOFTWARE-DEFINED DATACENTERS (SDDC) Allowing IT to deliver applications at a fraction of the cost and time in a more secure way!
6.
©2014 Check Point
Software Technologies Ltd. 6 SECURITY CHALLENGES IN THE CURRENT DATACENTER
7.
©2015 Check Point
Software Technologies Ltd. 7 WEST EAST SOUTH NORTH Perimeter (north-south) security is blind to 80% of the east-west data center traffic Challenge #1: Increasing Traffic Inside the Datacenter
8.
©2015 Check Point
Software Technologies Ltd. 8 • Lack of security control between VMs • Threat can easily traverse VLANs • Threats attack low-priority service and then move to critical systems Modern threats can spread laterally inside the data center, moving from one application to another Challenge #2: Lateral Threats Inside the Data Center
9.
©2015 Check Point
Software Technologies Ltd. 9 Traditional static controls fail to secure dynamic networks and highly mobile applications Challenge #3: Security Ignores Data Center Changes • New Virtual Machines • Virtual Machine movement • VM that change IP address • Dormant VMs that wakes up • VMs move between VLANs
10.
©2015 Check Point
Software Technologies Ltd. 10 How to define secure policy for catalog applications that have not been provisioned and still don’t have IP address? Lack of security automation impacts business agility in delivering services, results in security gaps Challenge #4: Security Inhibits Data Center Agility
11.
©2015 Check Point
Software Technologies Ltd. 11 Securing SDDC - goals Better SECURITY Better MANAGED Better PERFORMANCE
12.
©2015 Check Point
Software Technologies Ltd. 12 Securing SDDC - goals Increased visibility and control DEEP inspection, CLOSE to applications Security is natural part of modern SDDC design Improved security policy management avoid overhead by knowing CONTEXT FLEXIBLE for application deployments and changes Performance and scalability SCALABLE - growing with datacenter growth no choke point design
13.
©2015 Check Point
Software Technologies Ltd. 13 Building blocks • Automated security provisioning (new ESXi hosts deployed with security from beginning) • Transparent security insertion – configurable redirection to deep inspection engine • Cloud management systems integration into Security Management – consume objects and state of NSX/vCenter (using SDDC context) • Tagging VMs with security incidents • API and CLI for security automation and orchestration
14.
14©2013 Check Point
Software Technologies Ltd. Beyond L4 firewall… Users, applications, data, known and unknown threats GranularVisibility Identity Awareness DLP Mobile Access SmartEvent Application Control URLF IPS Anti-Bot Antivirus Threat Emulation HTTPSHTTPSHTTPS USERCHECKUCUC
15.
©2015 Check Point
Software Technologies Ltd. 15 WHAT IS NEEDED?
16.
©2015 Check Point
Software Technologies Ltd. 16 SECURITY REQUIREMENTS INSIDE THE DATA CENTER Automated insertion and deployment of advanced threat prevention to protect inside the data center3 Automated security provisioning to keep pace with dynamic data center changes2 Security visibility into traffic inside the data center1
17.
©2015 Check Point
Software Technologies Ltd. 18 CHECK POINT & VMWARE Automating Security inside the Data Center + Virtual Security with Advanced Threat Prevention Security Control & Visibility Next Generation Networking and security Lateral Threat Prevention Automated Security Provisioning
18.
©2015 Check Point
Software Technologies Ltd. 19 vSEC & NSX DATACENTER SECURITY 100% Software Based: Service, Network & Security s Segmented Data Center Micro-Segmentation with advanced threat prevention Security Orchestration between Virtual Machines Automation of Virtual Network & Security s Consistent security for N-S and E-W traffic Security Control for All Data Center Traffic
19.
©2015 Check Point
Software Technologies Ltd. 23 Check Point vSEC + VMware NSX How it works
20.
©2015 Check Point
Software Technologies Ltd. 24 CHECK POINT vSEC DEPLOYMENT NSX automatically provisions Check Point vSEC gateway on each host
21.
©2015 Check Point
Software Technologies Ltd. 25 NSX manager automatically deploys and provisions Check Point vSEC Gateway on each host CHECK POINT vSEC AUTO-DEPLOYMENT
22.
©2015 Check Point
Software Technologies Ltd. 26 Automatically & instantly scale vSEC to secure VMs on new host members CHECK POINT vSEC AUTO-DEPLOYMENT
23.
©2015 Check Point
Software Technologies Ltd. 27 Use NSX to segment Virtual Machines into different Security Groups using a flat network MICRO-SEGMENTATION Finance Legal Web Database Partners NSX Security Group
24.
©2015 Check Point
Software Technologies Ltd. 28 Use Check Point vSEC to control traffic access between Virtual Machines EAST-WEST SECURITY CONTROL NSX Service Chain Policy Traffic from Partner to Legal Security Group must go through Check Point vSEC Gateway
25.
©2015 Check Point
Software Technologies Ltd. 29 Use vSEC for Advanced Threat Prevention inside data center PREVENT LATERAL THREATS
26.
©2015 Check Point
Software Technologies Ltd. 30 APPLICATION-AWARE POLICY Check Point Access Policy Rule From To Service Action 3 WEB_VM (vCenter Object) Database (NSX SecGroup) SQL Allow Use Fine-grained security policies tied to NSX Security Groups and Virtual Machine identities Check Point dynamically fetches objects from NSX and vCenter
27.
©2015 Check Point
Software Technologies Ltd. 31 SHARED-CONTEXT POLICY NSX Policy From To Action Infected VM (Tagged by Check Point) Any Quarantine Shared security context between vSEC and NSX Manager to automatically quarantine and trigger remediation by other services Check Point tags infected Virtual Machines in NSX manager
28.
©2015 Check Point
Software Technologies Ltd. 32 UNIFIED MANAGEMENT Use Check Point unified management for consistent policy control and threat visibility across virtual and perimeter gateways
29.
©2015 Check Point
Software Technologies Ltd. 33 Use Check Point SmartEvent to monitor and investigate threats across north-south and east-west traffic THREAT VISIBILITY INSIDE THE DATACENTER 4800 12400 Infected Virtual Machines VM Identity Severity Date VM_Web_22 High 3:22:12 2/4/201 VM_DB_12 High 5:22:12 2/4/201 VM_AD_15 Medium 5:28:12 2/4/201 VM_SAP_34 Medium 7:28:12 2/4/201
30.
©2015 Check Point
Software Technologies Ltd. 35[Confidential] For designated groups and individuals Feature Check Point Policy Management Unified management for Virtual and physical Gateways Datacenter policy segmentation with sub policies* Fetch vCenter and NSX objects for use in Check Point policy Security Threat Prevention with multi-layered defenses for Virtual Data Center Tag infected VM and update NSX for automatic remediation Visibility & Forensics View VM objects in security logs Comprehensive Datacenter Threat Visibility Automation & Orchestration Granular privilege down to individual rule for trusted integrations* Check Point vSEC Key Features * Available in R80
31.
©2015 Check Point
Software Technologies Ltd. 36 LIVE DEMO
32.
©2015 Check Point
Software Technologies Ltd. 37 SUMMARY
33.
©2015 Check Point
Software Technologies Ltd. 38 vSEC & NSX DATACENTER SECURITY 100% Software Based: Service, Network & Security s SDDC Software Defined Datacenters Security Orchestration between Virtual Machines Automation of Virtual Network & Security s Consistent security for N-S and E-W traffic Security Control for All Data Center Traffic Software Defined Datacenter Private Cloud
34.
©2015 Check Point
Software Technologies Ltd. 40©2015 Check Point Software Technologies Ltd. THANK YOU!
35.
©2015 Check Point
Software Technologies Ltd. 41 Backup slides
36.
©2015 Check Point
Software Technologies Ltd. 42 NSX Security Group
37.
©2015 Check Point
Software Technologies Ltd. 43 NSX Security Group - definition
38.
©2015 Check Point
Software Technologies Ltd. 44 NSX and vCenter in Check Point
39.
©2015 Check Point
Software Technologies Ltd. 45 Data Center Objects Group
40.
©2015 Check Point
Software Technologies Ltd. 46 CP Network Introspection Service
41.
©2015 Check Point
Software Technologies Ltd. 47 Service Deployments
42.
©2015 Check Point
Software Technologies Ltd. 48 Running as Service VM (ESX Agent)
43.
©2015 Check Point
Software Technologies Ltd. 49 NSX DFW does redirection to CP
44.
©2015 Check Point
Software Technologies Ltd. 50 by Security Policy applied to Security Group
45.
©2015 Check Point
Software Technologies Ltd. 51 Granular CP policy
46.
©2015 Check Point
Software Technologies Ltd. 52 Data Center Object identity acquisition
47.
©2015 Check Point
Software Technologies Ltd. 53 Botnet incident
48.
©2015 Check Point
Software Technologies Ltd. 54 …is translated to VM Security Tag
Baixar agora