VMware Evolve Transform Security is Coming to A City Near You!

posted

Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than Read more...

VMware NSX Achieves Common Criteria EAL 2+ Certification

posted

VMware NSX 6.3 for vSphere has achieved Common Criteria certification at the Evaluation Assurance  Level (EAL) 2+ (view the certification report)(view the press release). This marks yet another milestone of our commitment to providing industry leading certified solutions for customers from federal departments and agencies, international governments and agencies, and other highly regulated industries and Read more...

Don’t Miss out on These 5 Spotlights on Security at vForum Online Summer 2017

posted

You’ve likely heard it before: “All businesses are now digital businesses.” But since the business has expanded into digital space, shouldn’t something as critical as business security digitally expand too? That’s where the VMware ubiquitous software layer comes into play — sitting across the application infrastructure and endpoints, no matter where they are. Now more Read more...

NSX Load Balancing – Accelerated Layer 4 Virtual Servers

posted

In the previous blog, we investigated the basic feature set of NSX Load Balancing, some of the business reasons to use it, and deployed an ESG (Edge Services Gateway), the NSX load balancing platform.  Today, we are going to setup our first virtual server.  When we look at load balancing, it operates at the Transport Read more...
Figure 3: Cross-VC NSX and F5 BIG-IP DNS Multi-site Deployment

Multi-site Active-Active Solutions with NSX-V and F5 BIG-IP DNS

posted

I’ve written several prior blogs on multi-site solutions with NSX-V discussing topics such as fundamentals, design options, multi-site security, and disaster recovery; see below links to review some of the prior material. In this post, I’ll discuss how VMware NSX-V and F5 BIG-IP DNS (prior known as F5 GTM) can be used together for Active/Active Read more...

Speed, Power, Performance: NSX & Memorial Day Motorsports

posted

With Memorial Day weekend coming up, for me, it’s all about hot dogs, hamburgers, and fast car racing. I am huge Formula 1 fanatic, but Memorial Day is a bonanza of racing from the F1 Monaco Grand Prix, to NASCAR’s Coke 600, and of course the Indianapolis 500 all on the same day! The raw speed and Read more...

401k, ROTH IRA, and NSX, Wait What?

posted

Today is “tax day” here in the United States where the deadline to file your personal income taxes is due and many of us are looking at our tax burden, investments, and how to deal with the 4 million words in the U.S. tax code. So why not take this day to compare the complexity Read more...

VMware NSX Unplugged: Networking Field Day (#NFD15)

posted

Being a product of the 90’s, one of my favorite past times was MTV’s “Unplugged” series. Whether it was Pearl Jam, or 10,000 Maniacs, or Eric Clapton, there was something about the acoustic, raw, uncut nature of the show that drew me in and made me look at my favorite bands in a new way. Read more...

Getting Started with NSX Load Balancing

posted

In my conversations with customers and peers, load balancing is becoming an increasingly popular discussion.  Why you may ask?  Simple, load balancing is a critical component for most enterprise applications to provide both availability and scalability to the system.  Over the last decade we have moved from bare metal servers to virtual servers and from Read more...

Micro-segmentation of Applications using Application Rule Manager

posted

“Micro-Segmentation provides a way to build a zero-trust network – where all networks, perimeters and application are inherently untrusted.” – declared Forrester Consulting in 2015 with their white paper Leveraging Micro-Segmentation to build zero-trust model.  The last mile in creating a truly zero-trust network implies not trusting each application and also tiers within an application (Figure 1). Read more...