• Sponsor Resources
  • Related Resources
  • Classrooms
      <
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls
    • Data Protection
    • Vulnerability Management

Lesson 1:


In this webcast, we will review the security-related factors enterprises should consider when planning and establishing a green-field IaaS environment. We’ll outline the top reasons why enterprises choose private or hybrid IaaS over a “public” provider’s offering, and the ways in which an organization can customize its security design.

Planning And Implementing Secure Private Cloud IaaS

Lesson 2:


This tip will outline the virtualization security management considerations that an enterprise must know and manage itself in private, self-managed IaaS cloud implementations where there’s no provider to manage it. We’ll look at steps for securely creating instances, managing them by implementing strong controls and tight administrative access, and best practices in recycling instances regularly.

The Virtualization Security Lifecycle: Managing It Yourself

Lesson 3:


Take Our Quiz!.

Cloud Security Quiz


Cloud Security

Learn strategies for how to positively influence the security of cloud computing projects in your organization.

TOP

Dave Shackleford
Owner and Principal Consultant, Voodoo Security

Dave Shackleford is the owner and principal consultant of Voodoo Security, Lead Faculty at IANS, and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures.

TOP


Sponsor Resources

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Everyone on the team learns right away that their role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected. There are no short cuts. And “good enough” service is never enough. Simply put, we want customers to rave about their experience with us.

Learn More
  • Six Steps to a Better Security Strategy

  • Are You a Security-First Organization?

  • HIPAA Compliance & Risk Management

  • I Have Multiple Clouds… Now What?

  • 10 Reasons You’re Ready for a Managed Cloud


TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Infrastructure as a Service security 101: Public IaaS security issues

  • Assessing IaaS, PaaS and SaaS security issues and risks

  • Testing IaaS security

  • IaaS on a budget: Working with low-cost virtual asset inventory tools

  • Cloud stack security: Understanding cloud VM risk scenarios



TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111