Getting More Out Of NSX Webcast Series

Getting More Out Of NSX Webcast Series

This post was originally published on this site ---

 

Each episode in this Getting More Out of NSX webcast series has its own topic, so there is no need to watch each episode to understand the next one. The episodes cover a variety of NSX features and explain in detail how NSX is the solution to key challenges faced by IT professionals. With the use of product demos, our NSX experts will show you how NSX allows granular control on an application by application basis to achieve the dream of universal security across the network. You will learn about:

  • NSX optimization for performance – how NSX eliminates the need for agent management and overprovisioning, thus reducing costs
  • NSX automated ubiquitous deployment & enforcement
  • NSX simplified policy management & automation across services

 

Now Available On-Demand

Episode 1: Deep Dive into NSX Service Composer, covered the mapping of applications, adding context to your Security Policy, and the NSX Service Composer and Application Rule Manager. Episode 2: Micro-segmentation Preparation and Planning with vRNI, covered how to perform Plan Security around Applications, build rulesets from Recommendations from vRNI, and verify rules compliance.

There is no need to watch Episodes 1 and 2 to understand Episodes 3 and 4 as each episode has its own topic. Episodes 1 and 2 can be accessed here.

 

Upcoming

Episode 3: NSX Micro-segmentation PCI using vRNI

Webcast Date:

January 11th, 2018 11am PST

Presenter:

Mason Ferratt, Sr. Systems Engineer, Network & Security Business Unit, VMware

Do you have a hard time visualizing PCI compliance of your datacenter? Are you using NSX for micro-segmentation? In this session, we will focus on VMware NSX as a framework protecting PCI assets in your VMware environment. Then we use vRealize Network Insight (vRNI) to provide the visualization and monitoring of those assets to validate compliance to specific PCI objectives.

In this installment of the Getting More Out Of NSX series, we will focus on how we can use vRNI to assess compliance for an NSX environment. You will learn:

  • How to use the PCI dashboard to identify PCI objective compliance relating to networking and security
  • How to ascertain the status of VMs, NSX security group associations, and firewall rules as well as relevant flows
  • How to save PCI specific searches and pin them

Do you have a hard time visualizing PCI compliance of your datacenter? Are you using NSX for micro-segmentation? In this session, we will focus on VMware NSX as a framework protecting PCI assets in your VMware environment. Then we use vRealize Network Insight (vRNI) to provide the visualization and monitoring of those assets to validate compliance to specific PCI objectives.

In this installment of the Getting More Out Of NSX series, we will focus on how we can use vRNI to assess compliance for an NSX environment. You will learn:

  • How to use the PCI dashboard to identify PCI objective compliance relating to networking and security
  • How to ascertain the status of VMs, NSX security group associations, and firewall rules as well as relevant flows
  • How to save PCI specific searches and pin them

Register now for this webcast series

 

 

Episode 4: Application Rule Manager (ARM) – Fastest Security Groups & Firewall Rules Creation

Webcast Date:

January 18th, 2018 11am PST

Presenter:

Kevin Fletcher, Sr. Systems Engineer, VMware

Enforcing a whitelisted application policy, where zero trust architecture is the default, is the goal for most of us. However, getting even a single workflow identified and a ruleset created for it can be a real challenge. How do you get started? In this session, we will look at the built-in tool that VMware NSX provides to help simplify the process of micro-segmentation workflows by evaluating current applications and creating a whitelisted rule base for you to enforce. It is the easy button! The tool is called Application Rule Manager (ARM) and was introduced in VMware NSX version 6.3. ARM correlates specific user-defined and real-time flow information between a workload, so a security model can be built around it without making compromises or adding complexity in defining the actual communication. This quick targeted modeling of an application significantly reduced time to value and enables you to begin enforcing a whitelist policy in your data centers.

In this instalment of the Getting More Out Of NSX series, we will explore the ease of use to provide targeted modeling of an application based on live flows and the ability to apply specific rules to enable micro-segmentation. You will learn:

  • How to quickly identify real-time granular application flows
  • How to use flow tables to create security groups, IP sets, services and firewall rules
  • How to add context to your security policies

Register now for this webcast series

 

The post Getting More Out Of NSX Webcast Series appeared first on Network Virtualization.

Leave a Reply

Your email address will not be published. Required fields are marked *