Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.
In this session we will take a look how the Hyper-V platform provides a high level of resiliency for the virtualized workloads. We will take a look at clustering technologies and shared VHDX technology.
In preparation for the event, we recommend that you download the free, full-featured version of Microsoft Hyper-V Server 2012 R2 as well these other free evaluations available for download: