Automating Security Workflows: The SDDC Approach

  • Thursday, April 23, 2015 | 11:30 AM – 12:20 PM | North | Room: 130

View all Sessions

Security in the data center today involves mapping policies to the network topology. This results in imperfect security, which is slow to deploy and change. What if you knew deep information about every element in the data center and could take advantage of this "total inventory," to create better security policies that adapt automatically to changing conditions? This session will show you how.


This document was retrieved from on Sat, 25 May 2019 23:04:16 -0400.