Interop Las Vegas 2016

Build Your Conference Agenda

Use this free scheduler to get an overview of all of the sessions available or to find specific sessions, speakers and special events for this year's conference.

By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule for Interop Las Vegas 2016. This personalized schedule will be synced with the official Interop Mobile App.

Please note: Registration accounts are separate from Session Scheduler. Even if you've registered, you will need to create a Scheduler account.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • A Software-Defined Security Approach to Protecting Agile Datacenters and Clouds

    Warren Wu  |  Sr Director, Products, Data Center, Fortinet
    Location:  Lagoon K
    Session Type: Conference Session
    Track: Security
    Pass type: 3-Day Pass, 5-Day Pass - Get your pass now!
    Vault Recording: TBD

    Data centers have been undergoing a profound transformation with the adoption of x86 virtualization, cloud computing and now software-defined networking (SDN) and network virtualization. These increasingly agile environments can accelerate business initiatives and deliver applications more responsively to end-users, but also create a more abstract and logical network that creates challenges for network visibility and control, especially for traditional security appliances that sit at static chokepoints in the physical network.

    This session introduces a three-part framework for how security needs to comprehensively evolve across all layers of the network architecture, from the data plane to the control plane to the management plane. In essence, security must itself be viewed as another layer of the data center infrastructure as fundamental as compute, storage, or networking, that must itself become agile and elastic, i.e. "software-defined," as well as integrate tightly with other platform layers in a converged infrastructure model. Further framework considerations are explored for service providers or IT teams looking to further enable protection and compliance with a "security-as-a-service" delivery model.