vmworld

NSX Going Wild at This Year’s VMworld

posted

Get ready! NSX is hosting a major swag giveaway at VMworld as part of a celebration for everything our customers have accomplished in 2017! At various times throughout the conference, we’ll be on the prowl, looking for folks sporting NSX gear. If you’re spotted “in the wild” adorned with anything “NSX”, you could win some Read more...
AppDefense

VMware NSX Day 1 Guide Library

posted

Our VMware NSX Guides are authored and technically reviewed by VMware subject-matter experts and cover networking and security essentials. Below you will find a description of the current books in our library along with a downloadable PDF link. If you are interested in purchasing a hardcopy, you can do so at our online store.   Read more...
Figure 2: VDI with NSX-V Providing for Enhanced Security Services

VMware NSX-V: Security for VxRAIL Hyper-Converged Solutions

posted

Check-out the new white paper on leveraging NSX-V for security within the VxRAIL hyper-converged platform. The paper outlines how VxRAIL hyper-converged solutions leveraging NSX-V for security solves many of the security challenges with traditional silo-based architectures. A brief outline is provided below. Make sure to checkout the white paper for additional details.  Read more...

Transforming IT Security in Three Key Steps

posted

Several years ago, the CEO of a Fortune 100 company remarked: “If you went to bed last night as an industrial company, you’re going to wake up this morning as a software and analytics company.” Today, these words are more true than ever—but so is the reality that the digital transformation in business has also Read more...

Networking Challenges in OpenStack Clouds

posted

Did you decided that it is time to implement OpenStack to build your Cloud? Have you tested in the lab? Evaluated many distributions available and hired specialized OpenStack resources? However, when the environment goes into production, Neutron is not integrating with the physical network? If the above story closely resembles what you have faced, this Read more...

VMware NSX and Check Point vSEC

posted

One of the current challenges of data center security is the East-West traffic that has become so pervasive as modern applications communicate a great deal between their different components.  Conventional perimeter security is poorly placed to secure these lateral flows, to promote a zero-trust model in order to prevent threats moving within each application layer. Read more...

Progressive Dutch Municipality Protects Citizen Data and Meets Compliance with VMware NSX

posted

Summary: Municipality of Zoetermeer implements Zero-Trust model with VMware NSX-enabled micro-segmentation for advanced security inside data centers. Zoetermeer follows the Dutch BIG (Baseline Information Security Dutch Municipalities) regulations Zoetermeer is a modern, fast-growing municipality in the province of South Holland. It provides local services such as water supply, sewage and garbage disposal to around 125,000 Read more...
wannacry

Use a Zero Trust Approach to Protect Against WannaCry

posted

Micro-segmentation with VMware NSX compartmentalizes the data center to contain the lateral spread of ransomware attacks such as WannaCry On May 12 2017, reports began to appear of the WannaCry malware attacking organizations worldwide in one of the largest ransomware cyber incidents to date. The European Union Agency for Law Enforcement Cooperation (Europol) has reported more than 200,000 attacks Read more...
End-to-End Segmentation with NSX SD-WAN and NSX Data Center

Enabling the Software-Defined Branch with NSX

posted

Reimagining the edge While the importance of the cloud is obvious to anyone, the increasing importance of the edge is often overlooked.  As digitization and the Internet of Things are  leading to an exponential growth in the number of devices, the amount of data that is being generated by sensors in devices such as self-driving-cars, mobile endpoints Read more...

VMware Evolve Transform Security is Coming to A City Near You!

posted

Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than Read more...