Synovus CISO Kevin Gowen and Arctic Wolf CTO Christopher Fielder discuss tactical and strategic actions to ensure security operations practices remain nimble.
Networking & Security
Here you will find Networking & Security related content
Nutanix and HPE have joined together to bring you the best integrated cloud solution for your hybrid world. HPE Greenlake with Nutanix equals one platform. Any app as a service. HPE GreenLake with Nutanix Era enables a pay-per-use model, dramatically improved deployment times and reduced need for niche technology specialists. Rapid access also helps reduce […]
365 Total Protection from Hornetsecurity offers comprehensive protection for Microsoft cloud services, and it is especially designed and developed for Microsoft 365. It offers a seamless integration to provide a comprehensive protection for Microsoft cloud services. In this blog post, we will run you thru how easy it is to setup and how user friendly the […]
In this short video, we take a sneak peek at Security Planning feature of Nutanix Security Central which allows us to easily plan microsegmentation policies. Flow Microsegmentation Security Planning from network and application visualization. Success with microsegmentation comes from creating granular VM-to-VM microsegmentation policies, application, or network segmentation policies. This can be very complex. The visualization provided by […]
Learn how to use Nutanix Flow microsegmentation to protect your critical infrastructure against the Log4j Log4Shell vulnerability. In this video you’ll see how to use Nutanix Flow to help implement a defense in depth strategy to stop attackers from exploiting attacks like CVE-2021-44228 (Log4j Log4Shell). Stop traffic to and from any vulnerable VM on AHV […]
Nutanix Flow enables customer to do Microsegmentation in minutes, rather than weeks, months or years :). You might think that introducing Microsegmentation into your existing Infrastructure would be hard, time consuming and requires very skilled professional services. That is not the case! In true Nutanix spirit, no new infrastructure is needed to setup and start […]
Learn how intra-tier blocking can stop the spread of malware in desktops in a Zero Trust VDI strategy, using east-west blocking that’s similar to PVLANs in physical networks. Protect your VDI solutions either it´s Frame or Citrix Virtual Desktops and even use AD group membership for zero trust dynamic security policies.
In the first part of this Flow Quick Start series learn how to enable Nutanix Flow to stop the spread of malware, secure desktops, and protect applications in your environment. Find out how easy it is to get started with Flow and Flow Security Central for security and monitoring of your virtual workloads.
Nutanix has announced additional ransomware protections in the company’s cloud platform. These include new threat monitoring and detection, as well as more granular data replication and robust access controls all natively built into the Nutanix stack. These new capabilities build on Nutanix’s rich data services for network security, files and objects storage, virtualization, and business continuity to […]