Transforming IT Security in Three Key Steps

posted

Several years ago, the CEO of a Fortune 100 company remarked: “If you went to bed last night as an industrial company, you’re going to wake up this morning as a software and analytics company.” Today, these words are more true than ever—but so is the reality that the digital transformation in business has also Read more...

Networking Challenges in OpenStack Clouds

posted

Did you decided that it is time to implement OpenStack to build your Cloud? Have you tested in the lab? Evaluated many distributions available and hired specialized OpenStack resources? However, when the environment goes into production, Neutron is not integrating with the physical network? If the above story closely resembles what you have faced, this Read more...

Don’t Miss out on These 5 Spotlights on Security at vForum Online Summer 2017

posted

You’ve likely heard it before: “All businesses are now digital businesses.” But since the business has expanded into digital space, shouldn’t something as critical as business security digitally expand too? That’s where the VMware ubiquitous software layer comes into play — sitting across the application infrastructure and endpoints, no matter where they are. Now more Read more...

VMware Evolve Transform Security is Coming to A City Near You!

posted

Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than Read more...
light board

Hot Off The Press: NSX Light Board Videos

posted

At the start of 2016 we began a series of VMware NSX light board videos. The goal has been to highlight the use cases and capabilities driving the adoption of network virtualization today. Through the use of a light board, these NSX  experts quickly sketch out the technology and business drivers around network virtualization with NSX. At the end of Read more...

How VMware NSX Enables Enterprises to Deploy and Operationalize Containerized Applications at Scale

posted

On October 17th, VMware Photon Platform introduced Kubernetes as a Service. Purpose built for cloud-native applications with integrated enterprise container infrastructure support, Photon Platform is a fully API-driven, multi-tenant platform leveraging ESXi, VMware NSX and VMware Virtual SAN.   Guido Appenzeller, VMware’s chief technology strategy officer, demonstrated NSX and containers at VMworld 2016, and now with VMware Photon Read more...

Micro-segmentation Benchmark – NSX Securing "Anywhere" Part VI

posted

Welcome to part 6 of the Micro-segmentation Defined– NSX Securing “Anywhere”  blog series. Previous topics covered in this series include • Part I –    Micro-segmentation Defined • Part II –  Securing Physical Environments • Part III – Operationalizing Micro-segmentation • Part IV – Service Insertion • Part V – Context, Visibility, and Containment Previous posts set the Read more...

Physical Security in a Virtual World – NSX Securing “Anywhere” – Part II

posted

This is the second blog post in our Micro-segmentation Defined – NSX Securing “Anywhere” blog series. This blog post walks through security requirements that exist in environments with mixed workload deployment types. A mixed workload environment is one utilizing multiple application deployment models, including applications deployed on both virtual machines and legacy physical servers. We Read more...

Micro-segmentation Defined – NSX Securing "Anywhere" – Part I

posted

The landscape of the modern data center is rapidly evolving. The migration from physical to virtualized workloads, move towards software-defined data centers, advent of a multi-cloud landscape, proliferation of mobile devices accessing the corporate data center, and adoption of new architectural and deployment models such as microservices and containers has assured the only constant in Read more...

Leverage Micro-Segmentation to Build a Zero Trust Network

posted

Applications are a vital component of your business…but are your applications and data safe?  Have you considered implementing a Zero Trust model at your organization to protect your vital resources?  Join this hour-long webcast on Tuesday, September 29, 2015 at 11:00 AM PST / 2:00 PM EST to find out how to leverage micro-segmentation to Read more...