{"id":1387,"date":"2019-03-08T06:54:20","date_gmt":"2019-03-08T06:54:20","guid":{"rendered":"http:\/\/vpxd.dc5.cz\/?p=1387"},"modified":"2020-03-04T12:53:44","modified_gmt":"2020-03-04T12:53:44","slug":"demo-intrinsic-security-with-nsx-t-2-4","status":"publish","type":"post","link":"https:\/\/vpxd.dc5.cz\/index.php\/2019\/03\/08\/demo-intrinsic-security-with-nsx-t-2-4\/","title":{"rendered":"Demo: Intrinsic Security with NSX-T 2.4"},"content":{"rendered":"<p>Demo: Intrinsic Security with NSX-T 2.4<\/p>\n<p><a href='http:\/\/bit.ly\/2UosZOY' target='_blank' rel=\"noopener noreferrer\"><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/390db8f0-64ed-4359-984a-8c401fdf476c\/?size=Box320'><\/a><\/p>\n<h4><a href='http:\/\/bit.ly\/2UosZOY' style='text-decoration: none;' target='_blank' rel=\"noopener noreferrer\">Demo: Intrinsic Security with NSX-T 2.4<\/a><\/h4>\n<p>NSX-T 2.4 provides significant new security features and functionality such as Context-aware Micro-segmentation, Network (and security) Infrastructure as Code, E-W Service Insertion and Guest Introspection. Layer 7 Application Identity, FQDN \/URL Whitelisting and Identity Firewalling are key features that make NSX-T Context-aware. In this demo, we are covering how the new Context-aware capabilities can be leveraged to enable the zero-trust network security model.<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank' rel=\"noopener noreferrer\">VMware Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Demo: Intrinsic Security with NSX-T 2.4 Demo: Intrinsic Security with NSX-T 2.4 NSX-T 2.4 provides significant new security features and functionality such as Context-aware Micro-segmentation, Network (and security) Infrastructure as Code, E-W Service Insertion and Guest Introspection. Layer 7 Application Identity, FQDN \/URL Whitelisting and Identity Firewalling are key features that make NSX-T Context-aware. In &hellip; <a href=\"https:\/\/vpxd.dc5.cz\/index.php\/2019\/03\/08\/demo-intrinsic-security-with-nsx-t-2-4\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Demo: Intrinsic Security with NSX-T 2.4&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1387","post","type-post","status-publish","format-standard","hentry","category-vmware"],"_links":{"self":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/1387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/comments?post=1387"}],"version-history":[{"count":1,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/1387\/revisions"}],"predecessor-version":[{"id":1388,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/1387\/revisions\/1388"}],"wp:attachment":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/media?parent=1387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/categories?post=1387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/tags?post=1387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}