Quantcast
Channel: Network and Security Virtualization
Browsing latest articles
Browse All 481 View Live

Image may be NSFW.
Clik here to view.

VMware NSX Bare Metal Edge Performance

Every cloud environment is rooted in virtualization and is defined by three pillars: network virtualization, server virtualization, and storage virtualization. The VMware NSX Edge Node plays an...

View Article


Image may be NSFW.
Clik here to view.

NSX V2T Layer 2 Bridging with NSX-T Projects

When it comes to migration from one infrastructure to another, there are always complexities and risks involved. Finding the most appropriate approach is key to successful delivery of desired outcomes,...

View Article


Image may be NSFW.
Clik here to view.

VPC: The Secure Bridge Between Application and Infrastructure Teams

The Cloud operating model is all about simplicity—bringing the agility of public clouds together with the security and control that enterprises have traditionally placed importance on. The fundamental...

View Article

Image may be NSFW.
Clik here to view.

Migration Coordinator – Selecting the migration mode

Migration Coordinator is a fully supported free tool, that is built into NSX Data Center, that is designed to help customers migrating from NSX for vSphere to NSX (aka NSX-T).  NSX-T 2.4, was the first...

View Article

Image may be NSFW.
Clik here to view.

Generative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC

With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the...

View Article


Image may be NSFW.
Clik here to view.

Optimizing NSX Performance Based on Workload and ROI

Optimizing NSX Performance Based on Workload Overview Performance tuning, in general, requires a holistic view of the application traffic profiles, features leveraged and the criteria for performance...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity, Cloud and AI: Top-of-mind themes heading into 2024

Recently I had the opportunity to host a group of forward-thinking CISOs, CIOs and other executive decision makers drawn from several enterprise organizations in the United States. The goal was to...

View Article

Image may be NSFW.
Clik here to view.

Next-Level Lateral Security for Your Private Cloud

Cyber attacks are growing in frequency and complexity. And at an average cost of $4.35M1, data breaches are no joke. With Generative AI, this threat will grow even further—equipping even an...

View Article


Image may be NSFW.
Clik here to view.

Tackling the 5Cs of Enterprise Security with the Advent of AI – Spotlight on...

For the traditional enterprise, the last decade has been an ongoing saga in the journey to cloud. This either moving workloads into the public cloud or embracing a cloud-operating model within their...

View Article


Image may be NSFW.
Clik here to view.

Lateral Security for the Private Cloud – Leveraging the Power of Seamless...

Because modern threats are distributed and multi-varied, protecting against them cannot be accomplished through a series of point security solutions. Recently, there are discussions happening in the...

View Article
Browsing latest articles
Browse All 481 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>