Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Protect the Data Inside the Center

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

If protecting the perimeter is no longer enough, then what about protecting what exists inside your data center? With the new EU data protection rules now looking likely to become law in the next two years, there could be more of a move to better secure your IT environment. Whether or not it’s inside or outside your perimeter, you need to ensure that your data is secure and available even when moving it between private and public data centers and vice versa. 

Most companies focus their security on their data center perimeter, but all it takes is one weak link to cause serious headaches as traffic behind the perimeter is not secured as well. 

Join us on this webinar looking at the next big evolution in data center and cloud mobility security, sponsored by VMware, to look at the benefits of automation, protecting the traffic within your data center and choosing freely which data remains in the data center and which data you entrust to the cloud in 2016.

Discussion topics include:

  • Why is perimeter security no longer enough?
  • How can you protect the traffic behind your perimeter in the most efficient and effective way?
  • Does automation offer a better solution to manual processes?
  • The pros and cons of visualized networking and security.


Alex Ayers

Co-founder and Consulting Director, Turnkey Consulting

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      Jeremy Van Doorn

      Director of Pre-Sales, EMEA Network & Security Division, VMware

        Steve Wallage

        Managing Director, Broadgroup Consulting

          Brought to You by