Automating Security Workflows: The SDDC Approach
Security in the data center today involves mapping policies to the network topology. This results in imperfect security, which is slow to deploy and change. What if you knew deep information about every element in the data center and could take advantage of this "total inventory," to create better security policies that adapt automatically to changing conditions? This session will show you how.