Protect the Data Inside the Center

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

If protecting the perimeter is no longer enough, then what about protecting what exists inside your data center? With the new EU data protection rules now looking likely to become law in the next two years, there could be more of a move to better secure your IT environment. Whether or not it’s inside or outside your perimeter, you need to ensure that your data is secure and available even when moving it between private and public data centers and vice versa. 

Most companies focus their security on their data center perimeter, but all it takes is one weak link to cause serious headaches as traffic behind the perimeter is not secured as well. 

Join us on this webinar looking at the next big evolution in data center and cloud mobility security, sponsored by VMware, to look at the benefits of automation, protecting the traffic within your data center and choosing freely which data remains in the data center and which data you entrust to the cloud in 2016.

Discussion topics include:

  • Why is perimeter security no longer enough?
  • How can you protect the traffic behind your perimeter in the most efficient and effective way?
  • Does automation offer a better solution to manual processes?
  • The pros and cons of visualized networking and security.


Alex Ayers

Co-founder and Consulting Director, Turnkey Consulting

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      Jeremy Van Doorn

      Director of Pre-Sales, EMEA Network & Security Division, VMware

        Steve Wallage

        Managing Director, Broadgroup Consulting

          Brought to You by

          Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.