Latest Posts

Expanded Integration between VMware NSX and AirWatch Advances Device-to-Datacenter Security

posted

The latest AirWatch update expands VMware NSX integration, uniting two great technologies to create the foundation of next-generation security. You may already have heard of VMware Workspace ONE, the revamped new end-user computing solution we launched last month. Workspace ONE delivers a digital workspace that integrates device management, application delivery and identity management technologies into Read more...

Introducing VMware NSX Fundamentals LiveLesson from VMware Press

posted

We are pleased to announce the first official video learning opportunity for VMware NSX technology – VMware NSX Fundamentals LiveLesson from VMware Press. This video course will provide viewers the information needed to understand NSX concepts, components and deployment options. As an added benefit, this course used the most recently version (VMware NSX 6.2) at Read more...

And So…

posted

I’d like to share some personal news with you, industry watchers and fans of VMware’s network virtualization offering. As network virtualization starts to mature, and it has, I have thought hard about how best to participate in the broader movement of infrastructure to software and services that I believe so strongly in. Having spent the Read more...

Cross Continental vMotion with VMware NSX and IBM SoftLayer Cloud

posted

Ten years ago, using VMware vMotion to migrate a Virtual Machine from one server to another, even in the same rack without interruption, was considered black magic, prompting raised eyebrows and a flurry of questions.  Today, it takes quite a bit more than just a standard host-to-host vMotion to solicit a similar response.Recently however, we Read more...

“Split and smear” your security policies: Static Unidimensional vs. Dynamic Multi-Dimensional Policies

posted

In my previous post I explained why current security architectures aiming at inspecting all inline traffic via hardware appliances are failing to provide proper segmentation and scale in modern day data centers.  As I described, this has nothing to do with the type of security technology being deployed but rather with engineering security services that Read more...