Be the first to like this
As enterprises embrace virtualization, they need to be able to see what’s happening throughout their environment and then apply effective security mechanisms. This session describes the kind of information that enterprises should collect from physical and virtual infrastructures, the kind of analysis to perform and the ways tools like encryption can be applied in securing the virtualized enterprise.
Objective 1: Describe what information an enterprise needs to collect to effectively manage and secure their physical and virtual environments.
After this session you will be able to:
Objective 2: Understand the kinds of analysis that needs to be done on collected information in order to make effective security decisions.
Objective 3: Identity ways in which security capabilities can be applied in securing the virtualized enterprise.
Watch more on http://www.brainshark.com/emcworld/vu?pi=zHJzQJGhyzB8sLz0
Clipping is a handy way to collect important slides you want to go back to later.