{"id":3715,"date":"2013-08-12T11:27:15","date_gmt":"2013-08-12T18:27:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3715"},"modified":"2013-08-14T09:15:35","modified_gmt":"2013-08-14T16:15:35","slug":"unlocking-the-promise-of-cloud","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/08\/unlocking-the-promise-of-cloud\/","title":{"rendered":"Unlocking the Promise of Cloud"},"content":{"rendered":"<p><strong>Update:<\/strong>\u00a0The time of our breakout session has changed! Our breakout session, \u201cVMware NSX and Next-Generation Security from Palo Alto Networks\u201d is now on 8\/27 at 1 pm.<\/p>\n<p style=\"text-align: center;\">- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<\/p>\n<p style=\"text-align: left;\">VMworld 2013, one of the biggest virtualization conferences in the world, is quickly approaching at the end of August. This year\u2019s conference is very special, celebrating 15 years of virtualization innovation. What is most interesting is that out of 457 sessions at the conference, only 26 sessions are identified in the security and compliance track.<\/p>\n<p>Why is this an issue? Whether virtualization infrastructure (VI) admins and security IT admins realize it or not, their ability to meet goals in a virtualized world are intertwined. In fact, security is one of the key barriers to realizing the full potential of the dynamic, agile, flexible cloud. My latest <a href=\"http:\/\/www.securityweek.com\/unlocking-promise-cloud\" rel=\"nofollow,noopener\"  target=\"_blank\"><b>SecurityWeek<\/b><\/a> column looks at today\u2019s challenges from both the VI admin and IT admin perspectives, and discusses why there is no true cloud without security and there is no easy button for security without true integration with virtualization. Read more <a href=\"http:\/\/www.securityweek.com\/unlocking-promise-cloud\" rel=\"nofollow,noopener\"  target=\"_blank\">here.<\/a><\/p>\n<p>Are you attending <a href=\"http:\/\/www.paloaltonetworks.com\/vmworld2013\" target=\"_blank\">VMworld<\/a>? Join Palo Alto Networks at\u00a0Booth 2305 where we will discuss these challenges, and how next-generation firewalls can help. Also, you're invited to attend our <a href=\"https:\/\/vmworld2013.activeevents.com\/connect\/search.ww?q=%22Palo+Alto+Networks%22#loadSearch-searchPhrase=%22Palo+Alto+Networks%22&amp;searchType=session&amp;tc=0&amp;sortBy=titleSort&amp;p=\" rel=\"nofollow,noopener\"  target=\"_blank\">breakout session<\/a> (SEC 5755) \u2013 \u201cVMware NSX and Next-Generation Security from Palo Alto Networks\u201d on 8\/27 at 11 am.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update:\u00a0The time of our breakout session has changed! Our breakout session, \u201cVMware NSX and Next-Generation Security from Palo Alto Networks\u201d is now on 8\/27 at 1 pm. - - - - - &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,133],"tags":[103,169,168],"coauthors":[771],"class_list":["post-3715","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-events","tag-cloud-computing","tag-securityweek","tag-vmworld"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3715"}],"version-history":[{"count":15,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3715\/revisions"}],"predecessor-version":[{"id":3846,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3715\/revisions\/3846"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3715"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}