VMware Verify setup with Workspace

posted

        JEFFREY DAVIDSON Consulting Architect In this blog post we will walk through the process of setting up VMware Verify and enabling it on your mobile device. VMware Verify was introduced earlier this year as a free multi-factor authentication solution provided by VMware. Verify is built into VMware Identity Manager (Workspace One) Read more...

3 Steps to Transforming IT Security

posted

Protecting the connections between people, devices, and objects has become more critical than ever, especially for organizations that are embracing the cloud. In a virtualized environment, maximum visibility and control are key to mitigating risk. In order to stay ahead of changing security needs, you need deep visibility into every interaction between users and applications, which Read more...

TELLING THEIR SIDE OF THE STORY – VMworld 2017

posted

WHAT DOES A GLOBAL NEWS AND ENTERTAINMENT TELEVISION NETWORK, WOMEN AND CHILDREN EMPOWERMENT, A LEADING DIGITAL FINANCIAL INSTITUTION, A FURNITURE MAKER, A PHARMACEUTICAL COMPANY, A MAJOR MEDICAL CENTER, AND NEW YORK CITY HAVE IN COMMON? Each of them will be telling their side of the story at VMware 2017 in Las Vegas next week. Be sure you Read more...

Managing VMware NSX Manager Global Certificates

posted

Introduction   In a previous post called Managing VMware NSX Edge and Manager Certificates, we looked into NSX Edge self-signed certificates, certificates signed by a Certification Authority (CA), and certificates generated and signed by a CA and how to use them in NSX. We briefly mentioned a functionality called Global certificates as well. NSX Global Read more...

Why Firewalls Alone Are No Longer Enough

posted

This free Tech Brief from VMware explores the security options that network virtualization and micro-segmentation bring to the data center. But first, it sets the scene by reviewing why firewalls are no longer enough. For the longest time, firewalls were synonymous with security—and for the most part, that equation held true, so long as the Read more...

What is Network Virtualization?

posted

In Redefining Networking with Network Virtualization network virtualization is defined as: Much as server virtualization recreates the traits of a physical server within software, network virtualization likewise replicates the components of network and security services in a software container. Consequently, the virtualized network is provisioned and managed independent of your hardware, and the physical networking devices simply Read more...

Basic VMware Security Tools and Practices

posted

  by Melba Lopez   I had the pleasure of joining my first ever internal security conference called MooseCon (Making Our Organization Security Experts Conference). There were a variety of topics discussed, but one particular talk by Noah Wasmer, Senior Vice President of Mobile Products, stayed with me the most. Noah discussed recent cyber attacks in the news, and he Read more...

Cyber Attacks, Data Security, and Employee Productivity: A Cybersecurity Podcast Series Recap

posted

In our recent podcast series, West Coghlan, senior editor for technology at the Economist Intelligence Unit (EIU), unpacked the findings of the 2016 EIU study, The Cyber-Chasm: How the Disconnect Between the C-suite and Security Endangers the Enterprise. The study surveyed 1,100 C-suite and senior technology executives at companies across the globe and sought both Read more...