Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Next generation data centres and the realities of virtualisation security

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The consolidation of IT infrastructure and virtualisation is being driven by demands for reductions in IT budgets and increasing compliance demands.

This webinar reviews the challenges faced, particularly in data centres, and the role of ‘deep security’ in defending the new IT environment.

In a convergence of business drivers, organisations face the following challenges:

  • The need to save money
  • The pressure to ‘be green’
  • Increase capacity and flexibility whilst reacting to compliance requirements (which are imposing security standards for data and applications on servers). 

Faced with these pressures, there is a drive to consolidate IT infrastructure, replacing physical servers with virtual machines and the use of cloud computing.  This move to the next generation data centre, however, must consider the implications of IT security, which must enable business, not impede it.

This webinar considers the security and compliance challenges facing the next generation of dynamic data centres and looks at deep security, a server and application protection layer that delivers comprehensive security controls and which is now vital to a ‘defence in depth’ security strategy.

This webinar is for:  

  • IT security managers reviewing likely requirements for 2010
  • IT managers planning or already employing a virtual environment in the data centre
  • Risk or compliance professionals looking to meet compliance requirements


Raimund Genes

Raimund Genes CTO Malware & General Manager, Trend Micro

    Simon Perry

    Simon Perry Principal Associate Analyst, Quocirca