Five Critical Requirements for Internal Firewalling

Preventing hackers from hiding inside large volumes of east-west network traffic has now become critical to security professionals. Organizations need new tools and techniques to fight back.

In this paper, you will learn:

  • The differences between protecting north-south network traffic and east-west network traffic
  • The challenges in using traditional perimeter firewalls to secure east-west network traffic
  • The characteristics that make internal firewalls suitable for network security in the data center

For information on how VMware uses and protects your personal data, please see our Privacy Statement.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.