Next-Gen Cloud Security Webinar: Is Your Business Impenetrable? It’s not a matter of if a breach will happen, but when.

Start Date:10/17/2017

Start Time:11:00 AM PDT

Duration:60 minutes


  • 62% of attacks target small to mid-sized businesses.
  • 2 data centers per day experience successful attacks.2
  • 80% of data center traffic is running without protection.3

Cyber-attacks come from all directions, with 99% of East-West data center threats originating from legitimate apps or riskware1. Every workload is vulnerable, no matter how strong the perimeter. Without the right security, once the data center is penetrated, it’s game over.

Join phoenixNAP, VMware, and Intel to get battle-ready, as our experts discuss how you can Use  “Zero Trust” security and compliance to get the freedom to put your workloads in the cloud.

Attend for a chance to Win a Kindle Paperwrite E-Reader
small reader


William Bell

Experienced IT Services Executive - Cloud Hosting Evangelist

Phoenix NAP

Cloud and Enterprise Services at phoenixNAP
Vice President of Product Development

A dynamic speaker and engaging executive who covers cloud, information security and IT infrastructure, William frequently provides his insights and expertise to industry audiences and publications such as the Wall Street Journal, CIO Magazine, and Information Security Magazine. Creating and implementing security strategies and controls as well as secure architectural design of virtualized environments that address the fluctuating needs of users worldwide are areas of deep focus.

Nic O’Donovan

VMware Cloud Provider Program
Solutions Architect and Cloud Specialist

Nic O’Donovan is a Solutions Architect and Cloud Specialist with the VMware Cloud Provider Program working with Cloud Service Providers. Nic is an active blogger and works with CSPs to build new offerings across infrastructure, security and disaster recovery solutions.

Next-Gen Cloud Security Webinar: Is Your Business Impenetrable? It’s not a matter of if a breach will happen, but when.
Registration Is Closed
1 LightCyber, “Cyber Weapons Report 2016”
2 Global survey by PriceWaterhouseCooper (Global State of Information Security Survey 2015, PriceWaterhouseCooper, 2014 )
3 VMware NSX research
4 Intel, Intel Xeon, and Intel Xeon Phi are trademarks of Intel Corporation in the U.S. and/or other countries.

© Copyright 2018 INXPO, Inc. All rights reserved.