NSX Micro-segmentation Questions Answered

posted

Our monthly webcasts always generate excellent questions from the audience. A few weeks ago, John Krueger the Principal Instructor for VMware Network and Virtualization training courses delivered Introduction to Micro-segmentation with VMware NSX and the questions were, as always, great. We pulled a few of them below, but you can read the entire list and watch the recording at your Read more...

VCDXs Around the World: Where’s your nearest VMware Certified Design Expert?

posted

  VMware Certified Design Expert (VCDX) represents the highest level of certification offered by VMware. With four possible areas of certification, including Data Center Virtualization, Cloud Management and Automation, Desktop and Mobility, and Network Virtualization, this elite group is in charge of solving some of the most important cloud and virtualization challenges facing companies today. Read more...

Free NSX Webcast Series Starts Soon!

posted

Security, automation, and networking remain top priorities (and top challenges) for IT professionals. How can IT continue to provide for the needs of the business while ensuring that end users and sensitive company data remain secure? The answer: VMware NSX®.   And starting February 1, our resident NSX experts are kicking off the first session Read more...

Upgrade Your NSX Skills with these 3 New Courses

posted

Now that you’ve upgraded your NSX, it’s time to upgrade your skills. These three new courses take you from the basics of installation and configuration, to post deployment troubleshooting, as well as a deep dive on micro-segmentation focused on security. VMware NSX: Micro-Segmentation [V6.3] This intensive three-day course explores the security-focused features of VMware NSX Read more...

Automated Secure Desktop Solution

posted

TAI RATCLIFF Senior Solutions Architect Many security breaches occur in the desktop environments. In some cases, admins and users make unauthorized changes in order to “get their jobs done”. It is easy enough to lock down a desktop so that end-users only have minimal access rights but the more you lock down the desktop the Read more...