Podcasts about data center security

  • 27PODCASTS
  • 57EPISODES
  • 29mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 16, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about data center security

Latest podcast episodes about data center security

Crazy Wisdom
Episode #523: Space Computer: When Your Trusted Execution Environment Needs a Rocket

Crazy Wisdom

Play Episode Listen Later Jan 16, 2026 63:50


In this episode of the Crazy Wisdom podcast, host Stewart Alsop sits down with Daniel Bar, co-founder of Space Computer, a satellite-based secure compute protocol that creates a "root of trust in space" using tamper-resistant hardware for cryptographic applications. The conversation explores the fascinating intersection of space technology, blockchain infrastructure, and trusted execution environments (TEEs), touching on everything from cosmic radiation-powered random number generators to the future of space-based data centers and Daniel's journey from quantum computing research to building what they envision as the next evolution beyond Ethereum's "world computer" concept. For more information about Space Computer, visit spacecomputer.io, and check out their new podcast "Frontier Pod" on the Space Computer YouTube channel.Timestamps00:00 Introduction to Space Computer02:45 Understanding Layer 1 and Layer 2 in Space Computing06:04 Trusted Execution Environments in Space08:45 The Evolution of Trusted Execution Environments11:59 The Role of Blockchain in Space Computing14:54 Incentivizing Satellite Deployment17:48 The Future of Space Computing and Its Applications20:58 Radiation Hardening and Space Environment Challenges23:45 Kardashev Civilizations and the Future of Energy26:34 Quantum Computing and Its Implications29:49 The Intersection of Quantum and Crypto32:26 The Future of Space Computer and Its VisionKey Insights1. Space-based data centers solve the physical security problem for Trusted Execution Environments (TEEs). While TEEs provide secure compute through physical isolation, they remain vulnerable to attacks requiring physical access - like electron microscope forensics to extract secrets from chips. By placing TEEs in space, these attack vectors become practically impossible, creating the highest possible security guarantees for cryptographic applications.2. The space computer architecture uses a hybrid layer approach with space-based settlement and earth-based compute. The layer 1 blockchain operates in space as a settlement layer and smart contract platform, while layer 2 solutions on earth provide high-performance compute. This design leverages space's security advantages while compensating for the bandwidth and compute constraints of orbital infrastructure through terrestrial augmentation.3. True randomness generation becomes possible through cosmic radiation harvesting. Unlike pseudo-random number generators used in most blockchain applications today, space-based systems can harvest cosmic radiation as a genuinely stochastic process. This provides pure randomness critical for cryptographic applications like block producer selection, eliminating the predictability issues that compromise security in earth-based random number generation.4. Space compute migration is inevitable as humanity advances toward Kardashev Type 1 civilization. The progression toward planetary-scale energy control requires space-based infrastructure including solar collection, orbital cities, and distributed compute networks. This technological evolution makes space-based data centers not just viable but necessary for supporting the scale of computation required for advanced civilization development.5. The optimal use case for space compute is high-security applications rather than general data processing. While space-based data centers face significant constraints including 40kg of peripheral infrastructure per kg of compute, maintenance impossibility, and 5-year operational lifespans, these limitations become acceptable when the application requires maximum security guarantees that only space-based isolation can provide.6. Space computer will evolve from centralized early-stage operation to a decentralized satellite constellation. Similar to early Ethereum's foundation-operated nodes, space computer currently runs trusted operations but aims to enable public participation through satellite ownership stakes. Future participants could fractionally own satellites providing secure compute services, creating economic incentives similar to Bitcoin mining pools or Ethereum staking.7. Blockchain represents a unique compute platform that meshes hardware, software, and free market activity. Unlike traditional computers with discrete inputs and outputs, blockchain creates an organism where market participants provide inputs through trading, lending, and other economic activities, while the distributed network processes and returns value through the same market mechanisms, creating a cyborg-like integration of technology and economics.

JSA Podcasts for Telecom and Data Centers
Axis Communications' Sienna Cacan on Elevating Data Center Security w/ AI & Intelligent Surveillance

JSA Podcasts for Telecom and Data Centers

Play Episode Listen Later Sep 29, 2025 7:22


The Data Center Frontier Show
DCIM (Data Center Infrastructure Management) and its Role in Data Center Security

The Data Center Frontier Show

Play Episode Listen Later Jun 10, 2025 17:25


Explore the critical intersection of Data Center Infrastructure Management (DCIM), Common Data Center Security issues and Zero Trust Architecture (ZTA) with a special focus on how our innovative OpenData solution can help. As data centers face increasing security threats and regulatory pressures, understanding how to effectively integrate DCIM into a Zero Trust framework is essential for safeguarding operations and ensuring compliance.

The Connectivity Podcast
EP56: Data center security, heat recovery, understanding network architecture

The Connectivity Podcast

Play Episode Listen Later Jan 20, 2025 17:40


Eric Löwgren, Head of Network at data center provider GleSYS, is back on the podcast. This time, he and Mattias Fridström discuss physical and cyber security in data centers, optimizing sustainability through measures such as heat recovery (and getting customers to pay a premium for sustainability), increasing the understanding of network architecture among customers, and what the future data center will look like. 

Padepokan Budi Rahardjo
Keamanan Pusat Data (Data Center Security)

Padepokan Budi Rahardjo

Play Episode Listen Later Jul 16, 2024 17:20


Sedikit pengantar mengenai Pusat Data (Data Center). Sebetulnya ingin menjelaskan security-nya juga tapi sudah kepanjangan. Security (keamanan) akan dibahas pada video selanjutnya ya.

CarahCast: Podcasts on Technology in the Public Sector
Establishing Boundaries in Today's Data Centers with Juniper Networks and Dell Technologies

CarahCast: Podcasts on Technology in the Public Sector

Play Episode Listen Later Dec 8, 2023 40:36


Watch the Juniper Networks and Dell Technologies podcast to learn how your organization can meet Zero Trust requirements by establishing and managing user access to critical data centers and IT infrastructures. Learn about Juniper's Apstra solution to establish a holistic approach to Zero Trust networking.

Risk & Repeat
Risk & Repeat: Inside the 3CX supply chain attack

Risk & Repeat

Play Episode Listen Later Apr 4, 2023


This podcast episode discusses the 3CX supply chain attack, where it may have started, who was behind it and how the unified communications vendor has responded to the incident.

Risk & Repeat
Biden administration raises software liability questions

Risk & Repeat

Play Episode Listen Later Mar 7, 2023


This Risk & Repeat podcast episode discusses the White House's National Cybersecurity Strategy and its proposal to hold technology companies liable for insecure software.

Risk & Repeat
ESXiArgs ransomware campaign raises concerns, questions

Risk & Repeat

Play Episode Listen Later Feb 8, 2023


This Risk & Repeat podcast looks at the widespread ESXiArgs ransomware attacks and the questions they've raised about the threat landscape, vulnerability patching and more.

Risk & Repeat
Risk & Repeat: Breaking down Rackspace ransomware attack

Risk & Repeat

Play Episode Listen Later Dec 8, 2022


This Risk & Repeat podcast episode discusses the recent ransomware attack against cloud provider Rackspace, as well as the major service outage affecting its customers.

Agent of Influence
Episode 49 - Exploring Edge Data Center Security Challenges, Trends, and More - Todd Cushing

Agent of Influence

Play Episode Listen Later Nov 30, 2022 23:56


Exploring Edge Data Center Security Challenges, Trends, and MoreIn this episode of Agent of Influence, Nabil and Todd Cushing, President at 1623 Farnam, discuss the importance of edge data centers. Plus, they explore data center security challenges, third-party risk management, and advice for organizations migrating to edge data centers.  

NetEvents Podcasts
Network & Data Center Security

NetEvents Podcasts

Play Episode Listen Later Oct 29, 2021 61:38


Analyst Chair: Mauricio Sanchez, Research Director, Network Security & Data Center Appliance, SASE Market Research, Dell'Oro Group Panelists: Gail Coury, Senior Vice President and Chief Information Security Officer, F5 Networks. Jordan LaRose, Director of Consulting and Incident Response, F-Secure. Dr. Ronald Layton, Vice President, Converged Security Operations, Sallie Mae Bank. Vivek Bhandari, Sr. Director of … Continue reading Network & Data Center Security →

datacenterHawk
Cybersecurity in the Data Center Services Industry

datacenterHawk

Play Episode Listen Later Sep 22, 2021 19:55


Interested in Hyperscale data centers? Sign up for our free hyperscale data center course: https://lp.datacenterhawk.com/hyperscale-business-development-fundamentals Or get a quick 15 minute demo of our platform: https://lp.datacenterhawk.com/request-a-demo?utm_source=youtube&utm_medium=youtube&utm_campaign=demo ––––– Josh Bosquez CTO of Armor Cloud Security got to talk about the state of data center cybersecurity in a recent HawkTalk conducted by David Liggitt from datacenterHawk. This article is a general overview of the state of security in the industry, as well as the predictions that David and Josh talked about during the interview. Data Center Security in the Distant and Recent Past Josh is in a unique position to talk about cybersecurity for data centers. He cut his teeth in the Dallas telco industry in the late 1990s. Back then, the scene was all about the monitoring and empowering of data centers and creating new kinds of infrastructure automation. Later Josh and his team moved into the realm of compliance testing and automation. When the Cloud started to flourish, the focus became providing cybersecurity that could scale on demand. This is how he came to work with so many security oriented managed service providers (MSPs) in recent years. Josh noted that back in the old days, security planning and the protection of physical space like a data center was relatively easy. You could see the cables and the hardware, and you knew how everything stacked. But in the Cloud, things are abstracted. Everything is hands off. New techniques needed to be learned in this virtual terrain. As more and more companies moved to full or hybrid Cloud, the security strategy became far more complicated. Technician training and certification needed to be ramped up, and some companies needed to entirely rewrite their cybersecurity playbook. Data Center Security in 2021 Josh noted that as far as the most common things companies can do to protect themselves in 2021, there's no one silver bullet. But the most important thing is user education. If they don't know about ransomware, and phishing attempts, and what links are unsafe or unwise to click, about how IT support will actually contact them, and what questions they're allowed to ask... the user is a security liability. After education, the priorities are anti-virus, anti-spyware, and the like. But user education is number one in any case. With remote work becoming a top priority, trying to protect users at home is a big challenge in some companies. They had set up a safe environment in the office, and then suddenly everyone was a telecommuter. The protection they set up in the past has to rapidly shift in order to cover this new paradigm. He was asked to address what strategies companies providing data center services are using to protect themselves and their current customers. He said that these days, Armor standardizes around ways to gain full visibility into an environment. Every layer of the OSI model needs to be accounted for in some way, from physical data center access to network security, to access control, to hosts, and everything in between. To do this, a cybersecurity team needs to be able to see every asset out there, whether it's real or virtual. And the monitoring tools and reporting methods need to be understandable by experienced CISMs and relative laymen alike since you never know who you're going to need to explain a security situation to get buy-in for critical systems. A lot of organizations are leaning on security MSPs, simply because the budget for internal security has not changed over the years, while the complexity of the cybersecurity landscape has ramped up tremendously. So, they leverage the expertise of MSPs in the security compliance space even as they continue to build their own internal capabilities. Then they can use the monitoring, reporting, and automation tools that are provided by firms like Armor.

Chill Chill Security
EP416: Security Article - Google Data Center Security - 6 Layers Deep

Chill Chill Security

Play Episode Listen Later Sep 19, 2020 8:25


Sponsor by SEC Playground Music by https://www.bensound.com/ --- Support this podcast: https://anchor.fm/chillchillsecurity/support

Datacenter Technical Deep Dives
NSX-T Data Center Security and Distributed Firewall with Britton Johnson

Datacenter Technical Deep Dives

Play Episode Listen Later Apr 16, 2020 65:47


Britton Johnson (https://twitter.com/vcixnv) continues our series on NSX-T Data Center with a look at Security and Distributed Firewall. Britton dives deeper into the security features of the platform and shows us how security rules are evaluated. We also got a peek at vRealize Network Insight (vRNI) #NSX #VMware #Education Resources: https://www.vmware.com/resources/compatibility/search.php?deviceCategory=nsxt https://labs.hol.vmware.com/ HOL-2026-91-NET - VMware NSX-T Distributed Firewall Lightning Lab

Test and Release
Heed these core Scrum values to see measurable change

Test and Release

Play Episode Listen Later Feb 28, 2020


Why isn't Scrum paying off in faster software development and better user satisfaction with the product? Perhaps you adopted the framework without the values, says Ryan Ripley.

Test and Release
Heed these core Scrum values to see measurable change

Test and Release

Play Episode Listen Later Feb 27, 2020


Why isn't Scrum paying off in faster software development and better user satisfaction with the product? Perhaps you adopted the framework without the values, says Ryan Ripley.

Intel Chip Chat - Archive
Data Center Security Growth with Intel SGX – Intel Chip Chat – Episode 675

Intel Chip Chat - Archive

Play Episode Listen Later Nov 1, 2019


In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel Xeon E processors and Intel Software Guard Extensions (Intel SGX). Jim talks about how Intel delivers the […]

Inside the Datacenter - Connected Social Media
Data Center Security Growth with Intel SGX – Intel Chip Chat – Episode 675

Inside the Datacenter - Connected Social Media

Play Episode Listen Later Nov 1, 2019


In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel Xeon E processors and Intel Software Guard Extensions (Intel SGX). Jim talks about how Intel delivers the […]

Intel Chip Chat
Data Center Security Growth with Intel SGX - Intel® Chip Chat episode 675

Intel Chip Chat

Play Episode Listen Later Oct 31, 2019 10:09


In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel® Xeon E processors and Intel® Software Guard Extensions (Intel® SGX). Jim talks about how Intel delivers the building blocks for security to CSPs, ISVs and other ecosystem partners that enable them to improve the security capabilities they offer to their customers, both in hardware and software. Intel now has general availability of the new Intel® Xeon E-2200 processors for server with double the Intel SGX enclave size – now 256MB. Take a listen to learn how this is leading to even more possibilities for new security use cases and developer innovation in HW based security. To learn more about developing solutions with Intel SGX, visit https://software.intel.com/sgx.

datacenterHawk
HAWKTALK 27 - JHOAN CHECO, SR VP OF DP FACILITIES, NORTHERN VIRGINIA & DATA CENTER SECURITY

datacenterHawk

Play Episode Listen Later Oct 9, 2019 21:47


In episode 27 of Hawktalk, Jhoan Checo sits down to discuss the Northern Virginia market and how DP Facilities has focused on security. ------ Thank you for watching this video. I am appreciative of your thoughts and comments - and thankful for the opportunity to serve the industry through datacenterHawk. ------ Learn more about the data center industry at www.datacenterhawk.com ------ Subscribe to our YouTube Channel at: https://www.youtube.com/c/datacenterHawk?sub_confirmation=1 ------ Follow us online here: Instagram: https://www.instagram.com/datacenterhawk_/ LinkedIN: https://www.linkedin.com/in/davidliggitt/ LinkedIN: https://www.linkedin.com/company/9488532/admin/ Twitter: https://twitter.com/d_liggitt Twitter: https://twitter.com/datacenterhawk Facebook: https://www.facebook.com/datacenterhawk/ SoundCloud: https://soundcloud.com/datacenterhawk #DP Facilities

Risk & Repeat
Risk & Repeat: NRCC breach stokes election security fears

Risk & Repeat

Play Episode Listen Later Dec 13, 2018


This week's Risk & Repeat podcast looks at the recently disclosed cyberattack on the National Republican Congressional Committee and the questions that remain about it.

Risk & Repeat
Risk & Repeat: NRCC breach stokes election security fears

Risk & Repeat

Play Episode Listen Later Dec 13, 2018


This week's Risk & Repeat podcast looks at the recently disclosed cyberattack on the National Republican Congressional Committee and the questions that remain about it.

Schooled in AI
IBM manager: Cyber-resilience strategy part of business continuity

Schooled in AI

Play Episode Listen Later Oct 31, 2018


Cyber resilience is increasingly a must for company executives. IBM's Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.

I Love Data Centers
Episode 030 - Mark Houpt - All Things Data and Data Center Security

I Love Data Centers

Play Episode Listen Later Oct 26, 2018 106:41


This week on the I Love Data Centers podcast: All Things Data and Data Center Security, I interview the Chief Information Security Officer of Databank, Mark Houpt. Whereas security has typically been an afterthought for most companies in the past, it has quickly become the most talked about topic in the industry these days with high profile data breaches happening on a regular basis. I wanted to do an interview that addressed the most common conversations data center and hosting providers are having with their clients so you can hear and understand the roles both parties have in protecting and securing corporate and client data. This conversation does just that and proved to be extremely enlightening. Truly, by listening to and digesting the content within this episode you will be well equipped to have this conversation, regardless of which side of the fence you sit on. Show Notes: 1:12 Interview starts 2:34 Mark’s credentials and certifications 7:09 Mark’s upbringing 9:28 How Mark got involved in tech 11:46 Mark’s Navy experience 16:40 Mark’s transition into tech 23:34 How does hacking and coding play together? 32:01 Precautionary steps companies can take to protect their data from hackers 37:43 Balancing between the corporate world and the data center world 47:28 What makes manage services different? 55:54 Other security traps that companies can fall into 59:58 What should companies that don’t need or can’t afford someone in a chief security officer role do? 1:04:05 What is a penetration test? 1:11:25 What is the B.A.A? 1:16:28 What about data centers that don’t need to be compliant to the B.A.A? 1:20:24 How to deal with the federal government agencies 1:23:17 Where does Data Banks responsibility start and stop with their clients? 1:28:59 Do our countries regulations put us in any danger? 1:41:36 What is something you’ve learned recently that blew your mind? 1:44:42 How to contact Mark Links mentioned: www.databank.com Contact Info: compliance@databank.com LinkedIn: https://www.linkedin.com/in/mark-houpt/

Risk & Repeat
Risk & Repeat: Facebook breach raises regulatory questions

Risk & Repeat

Play Episode Listen Later Oct 25, 2018


This week's Risk & Repeat podcast discusses new developments regarding Facebook's recent data breach, as well as the social networking giant's response to the incident.

Risk & Repeat
Risk & Repeat: Facebook breach raises regulatory questions

Risk & Repeat

Play Episode Listen Later Oct 25, 2018


This week's Risk & Repeat podcast discusses new developments regarding Facebook's recent data breach, as well as the social networking giant's response to the incident.

Risk & Repeat
Risk & Repeat: Business email compromise on the rise

Risk & Repeat

Play Episode Listen Later May 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the rise in business email compromise activity based on new data from the FBI's 2017 Internet Crime Report.

Risk & Repeat
Risk & Repeat: Business email compromise on the rise

Risk & Repeat

Play Episode Listen Later May 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the rise in business email compromise activity based on new data from the FBI's 2017 Internet Crime Report.

Risk & Repeat
Risk & Repeat: Breaking down the Verizon DBIR 2018

Risk & Repeat

Play Episode Listen Later Apr 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the '2018 Verizon Data Breach Investigations Report' and its findings about ransomware, phishing and more.

Risk & Repeat
Risk & Repeat: Breaking down the Verizon DBIR 2018

Risk & Repeat

Play Episode Listen Later Apr 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the '2018 Verizon Data Breach Investigations Report' and its findings about ransomware, phishing and more.

Risk & Repeat
Risk & Repeat: Uber data breach has implications for infosec

Risk & Repeat

Play Episode Listen Later Nov 30, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Uber data breach, which was concealed by company officials, and the ethics of data breach disclosure.

Risk & Repeat
Risk & Repeat: Uber data breach has implications for infosec

Risk & Repeat

Play Episode Listen Later Nov 30, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Uber data breach, which was concealed by company officials, and the ethics of data breach disclosure.

Risk & Repeat
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?

Risk & Repeat

Play Episode Listen Later Jul 28, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.

Risk & Repeat
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?

Risk & Repeat

Play Episode Listen Later Jul 28, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.

Risk & Repeat
Risk & Repeat: Does the Amazon S3 outage raise security flags?

Risk & Repeat

Play Episode Listen Later Mar 9, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Amazon Simple Storage Service outage and why the incident may have security implications.

Risk & Repeat
Risk & Repeat: Cloudflare bug poses incident response challenges

Risk & Repeat

Play Episode Listen Later Mar 3, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Cloudflare bug that leaked an undetermined amount of customer data over several months.

Risk & Repeat
Risk & Repeat: Corero on DDoS defense in the IoT era

Risk & Repeat

Play Episode Listen Later Jan 6, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, Dave Larson of Corero Network Security discusses how DDoS defense has shifted to deal with IoT threats.

Risk & Repeat
Risk & Repeat: Corero on DDoS defense in the IoT era

Risk & Repeat

Play Episode Listen Later Jan 6, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, Dave Larson of Corero Network Security discusses how DDoS defense has shifted to deal with IoT threats.

Risk & Repeat
Risk & Repeat: Yahoo data breach details emerge

Risk & Repeat

Play Episode Listen Later Nov 16, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss new information on the Yahoo data breach, including how counterfeit cookies may have been used by attackers.

Risk & Repeat
Risk & Repeat: Yahoo data breach details emerge

Risk & Repeat

Play Episode Listen Later Nov 16, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss new information on the Yahoo data breach, including how counterfeit cookies may have been used by attackers.

Risk & Repeat
Risk & Repeat: How bad is the httpoxy vulnerability?

Risk & Repeat

Play Episode Listen Later Jul 28, 2016


In this Risk & Repeat podcast, SearchSecurity editors analyze the httpoxy vulnerability and discuss why it took so long to uncover and address a 15-year-old security flaw.

Risk & Repeat
Risk & Repeat: How bad is the httpoxy vulnerability?

Risk & Repeat

Play Episode Listen Later Jul 28, 2016


In this Risk & Repeat podcast, SearchSecurity editors analyze the httpoxy vulnerability and discuss why it took so long to uncover and address a 15-year-old security flaw.

Risk & Repeat
Risk & Repeat: Can the Symantec-Blue Coat deal succeed?

Risk & Repeat

Play Episode Listen Later Jun 24, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss Symantec's big move to acquire Blue Coat Systems and what it means for both security vendors.

Risk & Repeat
Risk & Repeat: Can the Symantec-Blue Coat deal succeed?

Risk & Repeat

Play Episode Listen Later Jun 24, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss Symantec's big move to acquire Blue Coat Systems and what it means for both security vendors.

ITS Partner's Video Podcast
Data Center Security 6: Configuring Application Whitelisting, Data Center Security & Managed Services

ITS Partner's Video Podcast

Play Episode Listen Later Jul 8, 2015 9:26


Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.   Learn more at www.itsdelivers.com

ITS Partner's Video Podcast
Symantec Data Center Security: Keeping Legacy OS Protected

ITS Partner's Video Podcast

Play Episode Listen Later Jun 1, 2015 34:36


Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video! The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries: Finance: Protecting customer information and security intelligent alerting/auditing Manufacturing: Secure applications and business operations Retail: Securing consumer end devices   Health care: Patching legacy systems and protecting systems with consumer data Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced

Intel Chip Chat
Increased Data Center Security, Efficiency and Reliability with IBM – Intel® Chip Chat episode 342

Intel Chip Chat

Play Episode Listen Later Sep 5, 2014 10:28


Brian Connors, the VP of Global Product Development and Lab Services at IBM, stops by to talk about the launch of the company’s new M5 line of towers, racks and NeXtScale systems based on the Intel® Xeon® processor E5 v3. The systems have been designed for increased security (Trusted Platform Assurance and Enterprise Data Protection), efficiency and reliability and offer dramatic performance improvements over previous generations. For more information, visit www.ibm.com.

The Security Podcasts
Virtualization and Data Center Security: What You Need to Know for 2014

The Security Podcasts

Play Episode Listen Later Oct 21, 2013 10:00


Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint. However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

The Security Podcasts
Virtualization and Data Center Security: What You Need to Know for 2014

The Security Podcasts

Play Episode Listen Later Oct 21, 2013 10:00