Enviar búsqueda
Cargar
The Evolution of Virtual Mentality
•
Descargar como PPTX, PDF
•
0 recomendaciones
•
620 vistas
Juniper Networks
Seguir
Tecnología
Diseño
Denunciar
Compartir
Denunciar
Compartir
1 de 28
Descargar ahora
Recomendados
Whats the weather tomorrow
Whats the weather tomorrow
Learon Dalby
云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nicko
looneyren
Scop 11nov2011
Scop 11nov2011
Agora Group
La experiencia de la Colaboración
La experiencia de la Colaboración
José Carlos Martín Marco
Innovacion Abierta en Cisco
Innovacion Abierta en Cisco
José Carlos Martín Marco
Booting
Booting
Shehrevar Davierwala
Operating system kernal
Operating system kernal
Sumit Rajpal
Virtual machine subhash gupta
Virtual machine subhash gupta
Subhash Chandra Gupta
Recomendados
Whats the weather tomorrow
Whats the weather tomorrow
Learon Dalby
云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nicko
looneyren
Scop 11nov2011
Scop 11nov2011
Agora Group
La experiencia de la Colaboración
La experiencia de la Colaboración
José Carlos Martín Marco
Innovacion Abierta en Cisco
Innovacion Abierta en Cisco
José Carlos Martín Marco
Booting
Booting
Shehrevar Davierwala
Operating system kernal
Operating system kernal
Sumit Rajpal
Virtual machine subhash gupta
Virtual machine subhash gupta
Subhash Chandra Gupta
Virtual Machines
Virtual Machines
Joa Ebert
Virtual machine
Virtual machine
Nikunj Dhameliya
What is Kernel, basic idea of kernel
What is Kernel, basic idea of kernel
Neel Parikh
Characteristics of a network operating system
Characteristics of a network operating system
Ron McGary
Network Operating System
Network Operating System
isma ishak
System Booting Process overview
System Booting Process overview
RajKumar Rampelli
Network operating system
Network operating system
Muhammad Shahid
Booting of Computer System
Booting of Computer System
Arzath Areeff
Network operating system
Network operating system
John Carlo Catacutan
Kernel mode vs user mode in linux
Kernel mode vs user mode in linux
Siddique Ibrahim
Virtual machine
Virtual machine
IGZ Software house
SQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle Database
Jeff Smith
booting steps of a computer
booting steps of a computer
Anusha Babooa
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
Chris Simmonds
Shell structures- advanced building construction
Shell structures- advanced building construction
Shweta Modi
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper Networks
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Ixia
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
UNIT4 IT Solutions
What’s new in vShield 5
What’s new in vShield 5
Eric Sloof
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Dropbox
Más contenido relacionado
Destacado
Virtual Machines
Virtual Machines
Joa Ebert
Virtual machine
Virtual machine
Nikunj Dhameliya
What is Kernel, basic idea of kernel
What is Kernel, basic idea of kernel
Neel Parikh
Characteristics of a network operating system
Characteristics of a network operating system
Ron McGary
Network Operating System
Network Operating System
isma ishak
System Booting Process overview
System Booting Process overview
RajKumar Rampelli
Network operating system
Network operating system
Muhammad Shahid
Booting of Computer System
Booting of Computer System
Arzath Areeff
Network operating system
Network operating system
John Carlo Catacutan
Kernel mode vs user mode in linux
Kernel mode vs user mode in linux
Siddique Ibrahim
Virtual machine
Virtual machine
IGZ Software house
SQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle Database
Jeff Smith
booting steps of a computer
booting steps of a computer
Anusha Babooa
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
Chris Simmonds
Shell structures- advanced building construction
Shell structures- advanced building construction
Shweta Modi
Destacado
(15)
Virtual Machines
Virtual Machines
Virtual machine
Virtual machine
What is Kernel, basic idea of kernel
What is Kernel, basic idea of kernel
Characteristics of a network operating system
Characteristics of a network operating system
Network Operating System
Network Operating System
System Booting Process overview
System Booting Process overview
Network operating system
Network operating system
Booting of Computer System
Booting of Computer System
Network operating system
Network operating system
Kernel mode vs user mode in linux
Kernel mode vs user mode in linux
Virtual machine
Virtual machine
SQLcl overview - A new Command Line Interface for Oracle Database
SQLcl overview - A new Command Line Interface for Oracle Database
booting steps of a computer
booting steps of a computer
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
Shell structures- advanced building construction
Shell structures- advanced building construction
Similar a The Evolution of Virtual Mentality
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper Networks
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Ixia
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
UNIT4 IT Solutions
What’s new in vShield 5
What’s new in vShield 5
Eric Sloof
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Dropbox
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Chris Purrington
VMware vSphere5.1 Training
VMware vSphere5.1 Training
零壹科技股份有限公司
CloudPassage Overview
CloudPassage Overview
CloudPassage
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
Avi Networks
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Arrow ECS UK
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
ReadWrite
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
TriompheConsulting
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
MarketingArrowECS_CZ
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀
Wales Chen
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
karanamsaibabu
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010
Pablo Roesch
VMware Tanzu Introduction
VMware Tanzu Introduction
VMware Tanzu
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Amazon Web Services
Similar a The Evolution of Virtual Mentality
(20)
Juniper and VMware: Taking Data Centre Networks to the Next Level
Juniper and VMware: Taking Data Centre Networks to the Next Level
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
What’s new in vShield 5
What’s new in vShield 5
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
Onboarding For Public Private And Hybrid Clouds Aws 30.04.09
VMware vSphere5.1 Training
VMware vSphere5.1 Training
CloudPassage Overview
CloudPassage Overview
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
How Multi-Cloud Load Balancing Automates Application Delivery and Drives Oper...
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Transformace IT s technologiemi VMware
Transformace IT s technologiemi VMware
2021 二月份 Veeam 與解決方案概觀
2021 二月份 Veeam 與解決方案概觀
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010
VMware Tanzu Introduction
VMware Tanzu Introduction
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Transform Your Business with VMware Cloud on AWS, an Integrated Hybrid Approa...
Más de Juniper Networks
Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
Juniper Networks
Experience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
Juniper Networks
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
Juniper Networks
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
Juniper Networks
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
Juniper Networks
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
Juniper Networks
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
Juniper Networks
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
Juniper Networks
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Juniper Networks
What's Your IT Alter Ego?
What's Your IT Alter Ego?
Juniper Networks
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
Juniper Networks
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
Juniper Networks
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
Juniper Networks
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
Juniper Networks
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
Juniper Networks
Juniper SRX5800 Infographic
Juniper SRX5800 Infographic
Juniper Networks
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
Juniper Networks
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
Juniper Networks
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
Juniper Networks
Más de Juniper Networks
(20)
Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
Experience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
What's Your IT Alter Ego?
What's Your IT Alter Ego?
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
Juniper SRX5800 Infographic
Juniper SRX5800 Infographic
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
Último
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Último
(20)
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
The Evolution of Virtual Mentality
1.
THE EVOLUTION
OF VIRTUAL MENTALITY Darrell Hyde Director of Architecture, Hosting.com 1 © Hosting.com | This document is confidential and proprietary.
2.
2
© Hosting.com | This document is confidential and proprietary.
3.
Our Foundation
* ** * * * * 2012 * 2012 Deployments Deployments * 2013 Deployments 3 © Hosting.com | This document is confidential and proprietary.
4.
Cloud Enterprise Overview
Launched in 2009 Built on VMware vShpere 5 Powered by: Juniper MX / EX Routing and Switching EMC CX4 and VNX Storage Dell R-Series Servers Supporting over 2600 VMs across over 180 physical servers Distributed across 5 locations 4 © Hosting.com | This document is confidential and proprietary.
5.
VIRTUAL MENTALITY 1.0
VS. VIRTUAL MENTALITY 2.0 5 © Hosting.com | This document is confidential and proprietary.
6.
Virtual Mentality 1.0
Adapt old service delivery mechanisms to fit virtual infrastructure Treat virtual machines like physical machines Force customers to understand physical network topology 6 © Hosting.com | This document is confidential and proprietary.
7.
Service Delivery Goals
Complete service parity Firewall + IDS VPN Load Balancing Hybrid from the start Customers can spin up VMs in existing VLANs New VMs can live behind existing firewalls New VMs can live in existing SLB pools 7 © Hosting.com | This document is confidential and proprietary.
8.
How did we
get there? 8 © Hosting.com | This document is confidential and proprietary.
9.
How did we
get there? 9 © Hosting.com | This document is confidential and proprietary.
10.
How did we
get there? 10 © Hosting.com | This document is confidential and proprietary.
11.
What problems did
this create? Complicated layer 2 topology “You guys have a lot of VLANs.” Pain for customers who want to adopt in- line services Increased operational overhead Tight coupling of services with network topology High rate of change 11 © Hosting.com | This document is confidential and proprietary.
12.
Virtual Mentality 2.0
Leverage the hypervisor to offload services Less dependency on network topology Simpler provisioning experience for customers 12 © Hosting.com | This document is confidential and proprietary.
13.
Cloud Firewall
Security policy decoupled from network topology Customers can provision and manage the product independent of network topology Zero-impact install experience Self-service user interface 13 © Hosting.com | This document is confidential and proprietary.
14.
Best of Breed
Technology and Approach VLANs & Physical Traditional Purpose Built 1 Segmentation 2 Security Agents 3 Virtual Security VM1 VM2 VM3 VM1 VM2 VM3 VM1 VM2 VM3 ESX/ESXi Host ESX/ESXi Host ESX/ESXi Host VS VS Virtual Security Layer VS HYPERVISOR HYPERVISOR HYPERVISOR Regular Thick Agent for FW Complex VLAN networking; Lacks Tedious agent installation on each Seamless hypervisor integration; hypervisor visibility; High overhead VM; significant performance issues Optimized performance; Dynamic security 14 © Hosting.com | This document is confidential and proprietary.
15.
Shared Customer Pod 15
© Hosting.com | This document is confidential and proprietary.
16.
Shared Customer Pod 16
© Hosting.com | This document is confidential and proprietary.
17.
Shared Customer Pod 17
© Hosting.com | This document is confidential and proprietary.
18.
Shared Customer Pod 18
© Hosting.com | This document is confidential and proprietary.
19.
Easily Scales to
Support Growth 19 © Hosting.com | This document is confidential and proprietary.
20.
Provides Additional Security
at Layer 2 20 © Hosting.com | This document is confidential and proprietary.
21.
User Experience
1. Simple ordering process Less than 15 clicks from order to secure Ready to manage in less than 10 minutes 2. Group VMs based on role or application 3. Create policies 21 © Hosting.com | This document is confidential and proprietary.
22.
Step 1: Ordering 22
© Hosting.com | This document is confidential and proprietary.
23.
Step 2: Create
groups 23 © Hosting.com | This document is confidential and proprietary.
24.
Step 3: Create
policies 24 © Hosting.com | This document is confidential and proprietary.
25.
Step 3: Create
policies 25 © Hosting.com | This document is confidential and proprietary.
26.
Step 3: Create
policies 26 © Hosting.com | This document is confidential and proprietary.
27.
Conclusion
• Hypervisor isn’t just another endpoint on your network – it’s an extension of it • Customers think of security in terms of applications, not networks • Virtualization allows you to decouple services from the network 27 © Hosting.com | This document is confidential and proprietary.
28.
Thank you!
Questions? Darrell Hyde – darrell@hosting.com 28 © Hosting.com | This document is confidential and proprietary.
Descargar ahora