The Time for Intent-Based Security is Here

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In the world of cloud, microsegmentation and DevOps, firewall rules quickly become obsolete and unwieldly. 

The time for intent-based network security (IBNS) is here. The key to IBNS is defining a desired security state and leveraging automation to turn security intent into actual security enforcement across distributed, fragmented environments without ever having to write a rule yourself. 

In this session, we will explore strategies for defining security intent and reveal how to take IBNS from a great idea on paper to a great idea in practice.

Learning Outcomes:

  • Learn the keys to intent-based networking security
  • Learn strategies for defining security intent 
  • Challenge the notion of firewall rules in the new networking rules 
  • Understand the required technology for enforcing security intent


Photo of Mike Gillespie

Mike Gillespie

Managing Director & Co-Founder, Advent IM Ltd

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Matt White

Matt White

Freelance Senior Information Security Consultant

Photo of Tim Woods

Tim Woods

Vice President of Technology Alliances, FireMon

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for FireMon here: Please see Infosecurity Magazine’s privacy policy for more information.