1. Moscone West | 2004

Architectural issues with perimeter protections will be shown to create exploitable vulnerabilities for enterprise security teams. A design approach leading toward distributed, virtualized support for cloud workloads with hyper-resiliency and flexible security policy support is shown. Provocative commentary on how such a security architecture applies to large networks such as the US Department of State is included.

Download pptx
Download pdf
Participants: