SlideShare a Scribd company logo
1 of 47
Download to read offline
Chris Van den Abbeele
Kelly McBrair
SAI3313BUS
#VMworld #SAI3313BUS
Automated Security for
the Real-Time Enterprise
with VMware NSX and
Trend Micro Deep
Security
Copyright	2017	Trend	Micro	Inc.2
Welcome	to:
AUTOMATED	SECURITY	FOR	THE	REAL-TIME	ENTERPRISE	WITH	VMWARE	NSX
AND	TREND	MICRO	DEEP	SECURITY	[SAI3313BUS]
Presenter:	Chris	Van	den	Abbeele,	Global	Solutions	Architect,	Trend	Micro
Presenter:	Kelly	McBrair,	IT	Infrastructure	Architect,	Plexus	Corp
Join	us	Wednesday	at	11	am	for:
SKIP	THE	SECURITY	SLOW	LANE	WITH	VMWARE	ON	AWS	[SAI3316BUS]
Presenter:	Bryan	Webster,	Principal	Architect,	Trend	Micro
Presenter:	Dharmesh Chovatia,	Lead	Architect,	Global	CTO	Office,	Capgemini	US
Visit	the	VMware	Solution	Exchange	for	a	30	Day	Trial	of	Trend	Micro™	Deep	Security
https://www.trendmicro.com/product_trials/download/index/us/123
Visit	trendmicro.com/vmware
Follow	us	@trendmicro
Automated	Security	for	the	Real-time	Enterprise
with	VMware	NSX	and	Trend	Micro	Deep	Security
Kelly	McBrair,	IT	Infrastructure	Architect,	Plexus	Corp.
Chris	Van	Den	Abbeele,	Global	Solution	Architect,	Trend	Micro
Copyright	2017	Trend	Micro	Inc.4
Customer	
Perspective
Plexus	Market	Sectors
Exclusively	focused	in	market	sectors	that	require	mid-to-
low	volume	higher	complexity	value	stream	solutions
Communications Healthcare/	
Life	Sciences
Industrial/
Commercial
Defense/Security/
Aerospace
Copyright	2017	Trend	Micro	Inc.6
Trend	Micro
§ 28	years	focused	on	security	software
§ Headquartered	in	Japan,	Tokyo	Exchange	Nikkei	Index (4704)
§ Annual	sales	over	$1B	US
§ Customers	include	45	of	top	50	global	corporations
§ 5500+	employees in	over	50	countries
500k	commercial	customers	&
155M endpoints	protected
Small	
Business
Midsize	
Business
Enterprise
Consume
r
Consumers
Copyright	2017	Trend	Micro	Inc.7
Agenda
• Introductions	
• Automated	security:	From	“bolted	on”		to		“part	of	the	fabric”
• The	Business	Case	for	Automated	Virtual	Patching
• Solve	new	problems
• Integration	with	vRealize	Operations
• Deployment	lessons	learned
Copyright	2017	Trend	Micro	Inc.8
Integrated	security:	
From	“bolted	on”
to	“part	of	the	fabric”
Copyright	2017	Trend	Micro	Inc.9
Visibility
Risk	
assessment
Protect MoneyMaintainContextVisibility
Copyright	2017	Trend	Micro	Inc.10
What’s	the	problem	with	“bolted	on”	security	?
• With	the	introduction	of	virtualization,	we	made	a	quantum	leap	in	Operations.		
The	same	is	happening	with	NW	virtualization.		But	in	many	cases,	Security,	
remained		stuck	in	the	Dark	Ages.		Security	is	still	something	that	is	applied	
afterwards.
• We	need	to	“shift	left”	security	and	integrate	it	in	the	automation
• In	today’s	real-time	enterprise,	the	Operations	team	has	to	do	more	with	less,	
every	day.		They	create	more	new	workloads	than	ever	before.		
• Manually	adding	the	security	controls,	takes	a	lot	of	time	and	it	is	often	
postponed	(and/or	finally...	“forgotten”)
• Many	Security	Dashboards	only	show	workloads	which	had	been	brought	
under	the	control	of	the	Security	Solution	(and	have	a	security	agent	installed	
on	them).
• Shadow	IT	can	remain	completely	under	the	RADAR
Copyright	2017	Trend	Micro	Inc.11
Copyright	2017	Trend	Micro	Inc.12
Context	of	new	systems
1
Risk	
assessment
Protect MoneyMaintainVisibility Context
Copyright	2017	Trend	Micro	Inc.13
Event-based	tasks	to	profile	new	systems
Copyright	2017	Trend	Micro	Inc.14
Estimate	the	Risk
Protect MoneyMaintainContextVisibility
Risk	
assessment
Copyright	2017	Trend	Micro	Inc.15
Some	High	Risk	Vulnerabilities
Copyright	2017	Trend	Micro	Inc.16
1
Copyright	2017	Trend	Micro	Inc.17
Copyright	2017	Trend	Micro	Inc.18
Risk	
assessment
Protecting	new	systems
1
MoneyMaintainContextVisibility Protect
Copyright	2017	Trend	Micro	Inc.19
The	Same	Exploits...
now	Protected	by	Deep	Security
Copyright	2017	Trend	Micro	Inc.20
Copyright	2017	Trend	Micro	Inc.21
8	layers	of	security:
- Anti-Malware
- Web	Reputation
- Firewall
- Intrusion	Prevention
- Integrity	Monitoring
- Log	Inspection
- Application	Control
- Protection	for	SAP	
systems	(NW-VSI)
Full,	multi-layered	security
Copyright	2017	Trend	Micro	Inc.22
Protect
Risk	
assessment
Maintain	consistency
2
MoneyContextVisibility Maintain
Copyright	2017	Trend	Micro	Inc.23
Integrity	Monitoring
Monitor	sensitive	files	
and	sensitive	registry	
keys	for	changes
Application	Control:
“Freezes”	the	server	
and	blocks	new	
executables	and	scripts	
from	running
Protect	against	drift:
Copyright	2017	Trend	Micro	Inc.24
Protect	against	the	latest	vulnerabilities:
Scheduled	“Vulnerability”	Scans
Copyright	2017	Trend	Micro	Inc.25
Reduce	deployment	complexity
Rich	API	set	to	integrate	
with	virtually	any	
orchestration	and	
automation	tools
PowerShell
Copyright	2017	Trend	Micro	Inc.26
The	Business	Case	For	Automated	Virtual	
Patching
Copyright	2017	Trend	Micro	Inc.27
Typical	patch	cycle	without	virtual	patching
Typical	patch	cycle	without	Virtual	Patching
Monthly	Security	Patching Half-yearly	Full	Patching
12	x	
patching	
/year
Copyright	2017	Trend	Micro	Inc.28
High-impact	zero	days	require	immediate	attention
2
– Are	we	vulnerable?	(risk?)
– Who can	provide	a	patch?
– When	can	we	have	the	patch?
– When	can	we	test	it?
– Who	can	test	it	(team?)
– Where	can	we	test	it	?	(test	
environment)
– When	can	we	have	a	maintenance	
window	to	Patch	and	Reboot	our	
servers?
Copyright	2017	Trend	Micro	Inc.29
Typical	patch	cycle	with	virtual	patching
Typical	patch	cycle	with Virtual	Patching
Half-yearly	Full	Patching
2	x	
patching	
/year	
Automated	Ongoing	Security	
Patching
Copyright	2017	Trend	Micro	Inc.30
Win-Win:	increases	security	+	reduces	cost
Copyright	2017	Trend	Micro	Inc.31
5	days	after	ShellShock:	766	attacks	blocked
(Customer	example)
766	attacks	blocked	by	Deep	Security	Automated	Virtual	Patching	on	
Sept	30th,	at	a	customer	managing	100+	instances
If	Emergency	(physical)	Patching	takes	5	days...
Copyright	2017	Trend	Micro	Inc.32
Solve	New	Problems
Why	VMware	with	NSX	and	
Trend	Micro	Deep	Security?
Table	Stakes
• Performance
• Security
• Cost
Next	Play
• Integration	and	Choice
• Flexibility	and	Innovation
NIST	Cybersecurity Framework
Identify Protect Detect Respond Recover
• Asset	Management
• Business	
Environment
• Governance
• Risk	Assessment
• Risk	Management	
Strategy
• Access	Control
• Awareness	and	
Training
• Data	Security
• Information	
Protection	Processes	
and	Procedures
• Maintenance
• Protective	
Technology
• Anomalies	and	
Events
• Security	Continuous	
Monitoring
• Detection	Processes
• Response	Planning
• Communications
• Analysis
• Mitigation
• Improvements
• Recovery	Planning
• Improvements
• Communications
Security	
Dashboard
Firewall
Antivirus
IPS
Vulnerability	
Scanning
IDS
SIEM
Monitoring
Data	
Recovery
Disaster	
Recovery
Disconnection	
Management
Security	
Incident	
Response
• Leverage	Syslog,	SNMP,	Email	and/or	vRealize Suite	for	Better	Integration	with	
Existing	Monitoring/Alerting	Tools
• Isolate	VM	Tagged	by	Deep	Security	with	Native	NSX	Firewalling
• Behavior-based	firewalling,	block	internet	phone	home,	prevent	RGE
• Take	Action	on	VM	Tagged	by	Deep	Security	with	VMware	Orchestrator
• Snapshots	and	clones,	prepare	restores,	perform	additional	scanning
Example	video	of	automated	VM	snapshot	and	Wireshark tap	(with	code):	
http://www.storagegumbo.com/2014/09/automation-multi-action-security.html
• See	the	Trend	Threat	Encyclopedia	for	examples
of	High,	Medium	and	Low	threats:
http://trendmicro.com/vinfo
• Find	sample	code	at	Trend’s	DS	Github repo:
https://github.com/deep-security
Automated	Response	to	Improve	Protection
Copyright	2017	Trend	Micro	Inc.36
Integration	with	vRealize	Operations
Copyright	2017	Trend	Micro	Inc.37
User	call	- VM	
slow	to	respond	…	
or
…	Administrator	
receives	a	security	
alert
Log	Ticket
Log	Ticket
Admin	logs	in	to	
vRealize
Operations
Admin	logs	in	to	
Deep	Security	
Manager
• Attempt	to	
vMotion
• Reboot	the	VM
• Recycle	the	VM
• Change	rules	to	
block	specific	
ports
• Quarantine	and	
scan	
Root	Cause
Analysis
Root	Cause
Analysis
Close	
Ticket
Close	
Ticket
Virtual	Infrastructure	Administrator
Security	Administrator
Isolated	worlds...
Copyright	2017	Trend	Micro	Inc.38
Single	pane	of	glass
For	Trend	Micro	events	and	VMware	events
Copyright	2017	Trend	Micro	Inc.39
Correlate	vRops	Events	
with
Security	Events
Copyright	2017	Trend	Micro	Inc.40
Deployment	Lessons	Learned
Read	Trend’s	Best	Practices	Guide	(Note	sizing,	testing,	recommendations)	:
https://help.deepsecurity.trendmicro.com/best-practice-guide.html
Consider	Additional	Distribution	Points	and/or	Managers	over	WAN
Troubleshoot	Deep	Security	Virtual	Appliances	as	Cattle
Plan	Your	Rules:	Firewall,	Affinity,	Restart,	etc.
Agents	are	still	needed	(today)	for:
• Server	2016	and	*nix	VMs
• Some	advanced	features
• (recommendation)	Windows-based	VMware	Components	and	Supporting	
Systems	that	may	start	up	before	Trend	Deep	Security	Manager	(i.e.	its	DB)
Tips	and	Things	You	Should	Know
Guest	Introspection	Drivers	and	Troubleshooting:	
https://kb.vmware.com/kb/2094261
VMware	Tools	Versions	and	Upgrades
https://packages.vmware.com/tools/index.html (Beware	of	v10.0.0-10.0.7)
https://kb.vmware.com/kb/1014508 (Correlate	versions	file	to	ESXi Build)
Automate	the	Upgrade	with:
/v	“/qn ADDLOCAL=ALL	REMOVE=Hgfs,NetworkIntrospection”
Note:	NetworkIntrospection removal	optional
Add	REBOOT=ReallySuppress to	prevent	any	reboots
Get	to	Know	VMware	Tools
Copyright	2017	Trend	Micro	Inc.43
Summary
Hopefully	this	presentation	has	provided	a	few	insights	and	practical	examples	
on	how	to	bring	your	Hybrid	Cloud	Security	into	the	21st century.
By	automating	and	integrating	security	in	the	operations	stack,	you	can	
greatly	improve	your	security	posture	and	reduce	operational	costs
Do	the	same	setup	and	demo	yourself	in	the	VMworld Hands	on	Labs
LAB	HOL-1841
Summary
Copyright	2017	Trend	Micro	Inc.45
Join	us	Wednesday	at	11	am	for:
SKIP	THE	SECURITY	SLOW	LANE	WITH	VMWARE	ON	AWS	
[SAI3316BUS]
Presenter:	Bryan	Webster,	Principal	Architect,	Trend	Micro
Presenter:	Dharmesh Chovatia,	Lead	Architect,	Global	CTO	Office,	
Capgemini	US
Visit	the	VMware	Solution	Exchange	for	a	30	Day	Trial	of	Trend	
Micro™	Deep	Security
https://www.trendmicro.com/product_trials/download/index/us/123
Visit	trendmicro.com/vmware
Follow	us	@trendmicro
Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security
Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security

More Related Content

What's hot

secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...www.securitysystems.best
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceVignesh Ganesan I Microsoft MVP
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 

What's hot (20)

secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 

Viewers also liked

Strategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersStrategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersInfinera
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Interoute
 
Increase Fulfillment Speed Decrease Labor Costs
Increase Fulfillment Speed Decrease Labor CostsIncrease Fulfillment Speed Decrease Labor Costs
Increase Fulfillment Speed Decrease Labor CostsPAC Worldwide
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Acrodex
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation DayAcrodex
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 

Viewers also liked (20)

Strategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersStrategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centers
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
 
Increase Fulfillment Speed Decrease Labor Costs
Increase Fulfillment Speed Decrease Labor CostsIncrease Fulfillment Speed Decrease Labor Costs
Increase Fulfillment Speed Decrease Labor Costs
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 

Similar to Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security

Are you ready? Introduction to Cloud Computing and Windows Azure
Are you ready? Introduction to Cloud Computing and Windows AzureAre you ready? Introduction to Cloud Computing and Windows Azure
Are you ready? Introduction to Cloud Computing and Windows AzureThomas Robbins
 
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...Kai Wähner
 
Event Driven Architecture with Quarkus,Kafka and Kubernetes
Event Driven Architecture with Quarkus,Kafka and KubernetesEvent Driven Architecture with Quarkus,Kafka and Kubernetes
Event Driven Architecture with Quarkus,Kafka and KubernetesJeremy Davis
 
KCD Munich 2022: Hijack a Kubernetes Cluster - a Walkthrough
KCD Munich 2022: Hijack a Kubernetes Cluster - a WalkthroughKCD Munich 2022: Hijack a Kubernetes Cluster - a Walkthrough
KCD Munich 2022: Hijack a Kubernetes Cluster - a WalkthroughNico Meisenzahl
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
dinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud Inc.
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021Marius Sandbu
 
Managing Micro Services with Windows Container Service
Managing Micro Services with Windows Container ServiceManaging Micro Services with Windows Container Service
Managing Micro Services with Windows Container ServicePedro Sousa
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...LibbySchulze
 
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...VMworld
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Digital Transformation EXPO Event Series
 
Welcome to Love Cloud IE
Welcome to Love Cloud IE Welcome to Love Cloud IE
Welcome to Love Cloud IE Vuzion
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloudcsharney
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020VMware Tanzu
 
Windsor AWS UG - Introduction
Windsor AWS UG - IntroductionWindsor AWS UG - Introduction
Windsor AWS UG - IntroductionGoran Karmisevic
 
Bulletproof & Xero Presentation - AWS Summit Auckland
Bulletproof  & Xero Presentation - AWS Summit AucklandBulletproof  & Xero Presentation - AWS Summit Auckland
Bulletproof & Xero Presentation - AWS Summit AucklandBulletproof
 

Similar to Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security (20)

Are you ready? Introduction to Cloud Computing and Windows Azure
Are you ready? Introduction to Cloud Computing and Windows AzureAre you ready? Introduction to Cloud Computing and Windows Azure
Are you ready? Introduction to Cloud Computing and Windows Azure
 
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...
TIBCO BWCE and Netflix' Hystrix Circuit Breaker for Cloud Native Middleware M...
 
Event Driven Architecture with Quarkus,Kafka and Kubernetes
Event Driven Architecture with Quarkus,Kafka and KubernetesEvent Driven Architecture with Quarkus,Kafka and Kubernetes
Event Driven Architecture with Quarkus,Kafka and Kubernetes
 
KCD Munich 2022: Hijack a Kubernetes Cluster - a Walkthrough
KCD Munich 2022: Hijack a Kubernetes Cluster - a WalkthroughKCD Munich 2022: Hijack a Kubernetes Cluster - a Walkthrough
KCD Munich 2022: Hijack a Kubernetes Cluster - a Walkthrough
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
dinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud q2 pr highlights
dinCloud q2 pr highlights
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Managing Micro Services with Windows Container Service
Managing Micro Services with Windows Container ServiceManaging Micro Services with Windows Container Service
Managing Micro Services with Windows Container Service
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...Armo webinar rethinking your cloud security in the shadow of the solar winds ...
Armo webinar rethinking your cloud security in the shadow of the solar winds ...
 
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...
VMworld 2013: Everything You Want to Know About vCloud Hybrid Service - But W...
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
Welcome to Love Cloud IE
Welcome to Love Cloud IE Welcome to Love Cloud IE
Welcome to Love Cloud IE
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
Windsor AWS UG - Introduction
Windsor AWS UG - IntroductionWindsor AWS UG - Introduction
Windsor AWS UG - Introduction
 
Bulletproof & Xero Presentation - AWS Summit Auckland
Bulletproof  & Xero Presentation - AWS Summit AucklandBulletproof  & Xero Presentation - AWS Summit Auckland
Bulletproof & Xero Presentation - AWS Summit Auckland
 

More from Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromiseTrend Micro
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsTrend Micro
 
The Heart of KOOBFACE
The Heart of KOOBFACEThe Heart of KOOBFACE
The Heart of KOOBFACETrend Micro
 
The Real Face Of KOOBFACE
The Real Face Of KOOBFACEThe Real Face Of KOOBFACE
The Real Face Of KOOBFACETrend Micro
 
Show me the Money -- The Monetization of KOOBFACE
Show me the Money -- The Monetization of KOOBFACEShow me the Money -- The Monetization of KOOBFACE
Show me the Money -- The Monetization of KOOBFACETrend Micro
 

More from Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
FIFA Spam Targets Football Fanatics
FIFA Spam Targets Football FanaticsFIFA Spam Targets Football Fanatics
FIFA Spam Targets Football Fanatics
 
The Heart of KOOBFACE
The Heart of KOOBFACEThe Heart of KOOBFACE
The Heart of KOOBFACE
 
The Real Face Of KOOBFACE
The Real Face Of KOOBFACEThe Real Face Of KOOBFACE
The Real Face Of KOOBFACE
 
Show me the Money -- The Monetization of KOOBFACE
Show me the Money -- The Monetization of KOOBFACEShow me the Money -- The Monetization of KOOBFACE
Show me the Money -- The Monetization of KOOBFACE
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security