{"id":321,"date":"2018-03-11T17:00:07","date_gmt":"2018-03-11T17:00:07","guid":{"rendered":"https:\/\/os-br.com\/?page_id=321"},"modified":"2020-01-10T09:07:21","modified_gmt":"2020-01-10T09:07:21","slug":"nsx-readiness-assessment","status":"publish","type":"page","link":"https:\/\/os-br.com\/pt\/nsx-readiness-assessment\/","title":{"rendered":"Prontid\u00e3o do NSX"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.0.9&#8243; background_color=&#8221;#ededed&#8221; background_image=&#8221;https:\/\/os-br.com\/wp-content\/uploads\/2020\/01\/NSX-Readiness.jpeg&#8221; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;100px||100px|&#8221; z_index_tablet=&#8221;500&#8243; hover_enabled=&#8221;0&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.0.9&#8243; text_text_color=&#8221;#1f1f1f&#8221; header_font_size=&#8221;60px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221;]<\/p>\n<h2 class=\"hh\" style=\"font-size: 50px; color: ##1f1f1f;\"><\/h2>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.0.9&#8243; custom_padding=&#8221;20px||20px||false|false&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.0.9&#8243; custom_padding=&#8221;20px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; background_enable_color=&#8221;off&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221;]<\/p>\n<h2>Network Readiness Check<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.0.9&#8243; hover_enabled=&#8221;0&#8243; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;||0px|&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221;]<\/p>\n<p>Data security is becoming the number one issue challenging IT management. Over the past several years, there has been a significant increase in security breaches and hijacks. As a result, Seamless is proud to offer your company a Readiness Assessment to analyze network traffic patterns within your data center.<\/p>\n<p>The objective of this Readiness Assessment is to collaboratively work with clients to discuss plans and readiness for an implementation of VMware NSX for vSphere. At the conclusion of the Readiness Assessment, we will present you with a Summary Report including recommendations and next steps.<\/p>\n<p><strong>The data from the Assessment can be used to identify:<\/strong><\/p>\n<ul>\n<li>Network performance issues.<\/li>\n<li>Gaps in application security.<\/li>\n<li>Operational deficiencies.<\/li>\n<li>Cost saving by identifying over lapping technologies.<\/li>\n<li>Common pitfalls that hinder a deployment of VMware NSX.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221;]<\/p>\n<p><strong>Seamless enables our Clients to address:<\/strong><\/p>\n<ul>\n<li>Containing, isolating and remediating network breaches in their data center.<\/li>\n<li>Protecting the increase of East-West data center traffic.<\/li>\n<li>Enablement requirements of IT staff.<\/li>\n<li>Integrating security solutions to ensure there are no gaps in visibility or enforcement.<\/li>\n<li>Managing the increasing number of firewall rules and network segments.<\/li>\n<\/ul>\n<p><strong>And to deliver:<\/strong><\/p>\n<ul>\n<li>Better security \u2013 automate the delivery of next-generation security features, policies and profiles.<\/li>\n<li>Operational flexibility \u2013 next-generation security configurations are automatically deployed.<\/li>\n<li>Accelerated deployments of business-critical applications \u2013 provision security services faster and utilize capacity of cloud infrastructures.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Readiness Check Data security is becoming the number one issue challenging IT management. Over the past several years, there has been a significant increase in security breaches and hijacks. As a result, Seamless is proud to offer your company a Readiness Assessment to analyze network traffic patterns within your data center.The objective of this [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-321","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":17,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/321\/revisions"}],"predecessor-version":[{"id":1602,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/321\/revisions\/1602"}],"wp:attachment":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/media?parent=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}