Which technique best explains the use of the grained policies and network to enable security inside the data center?
A.
Micro-division
B.
Bifurcation
C.
Dissection
D.
Micro-segmentation
Explanation:
https://vmworldeurope2015.lanyonevents.com/connect/sessionDetail.ww?SESSION_ID=2157