Clearing the Path to Software-Defined Segmentation

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Also known as micro-segmentation, there are many misnomers on what software-defined segmentation entails, it’s broad spectrum of use cases and what features are essential when selecting a software-defined segmentation solution.

In this webinar, we will dive into the concept of software-defined segmentation and the challenges it brings about, along with outlining the essential components and steps that should be on your list when embarking on a segmentation project to guarantee an improved security posture.

Key takeaways:

  • The challenges of software-defined segmentation
  • Software-Defined Segmentation use cases
  • Learn key software segmentation roll-out steps
  • Understand the solution requirements for software segmentation
  • How to carry out software segmentation correctly, quickly and easily

Speakers

Photo of Anne Hardy

Anne Hardy

Chief Security Officer, Join Digital

Photo of Tricia  Howard

Tricia Howard

Marketing Manager at HolistiCyber and Cyber Evangelist

Photo of Dave Klein

Dave Klein

Senior Director of Engineering & Architecture, Guardicore

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.