aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • Platforms

VMware Makes Comprehensive Workload And Network Security More Economical and Easier To Operate Inside Data Centers And Clouds

  • aster_cloud
  • February 27, 2020
  • 6 minute read

VMware, Inc., a leading innovator in enterprise software, announced new innovations to advance the company’s strategy to make security intrinsic to the digital enterprise. Intrinsic security makes protecting critical applications and data more automated, proactive and pervasive across the entire distributed enterprise. Announcements, made at RSA Conference 2020, include:

  • New VMware Advanced Security for Cloud Foundation, which will enable customers to replace legacy security solutions and deliver unified protection across private and public clouds
  • Advancements to the VMware Carbon Black Cloud, which including automated correlation with the MITRE ATT&CK framework and upcoming prevention coverage for Linux machines
  • New VMware Secure State auto-remediation capabilities to automate actions across cloud environments and proactively reduce risk

On Wednesday, February 26 at 10:30 a.m. PT in Moscone West, VMware’s Sanjay Poonen will deliver a keynote address: “Rethink the Way You Secure Your Organization with Intrinsic Security,” which will discuss how making security intrinsic can unlock new advantages and make life easier for security practitioners.


Partner with aster.cloud
for your next big idea.
Let us know here.


cyberpogo

“There has never been a more challenging and exciting time in security,” said Sanjay Poonen, chief operating officer, customer operations, VMware. “Attacker sophistication, security threats, breaches, and exploits are becoming more prevalent with no end in sight. And with cloud, new applications, pervasive mobility, IoT, and data at the edge, the problem is only getting harder to solve. There must be a new approach to cybersecurity – one that is built-in, unified and context-centric. We believe the best strategy and approach is to make security intrinsic, enabling organizations to leverage their infrastructure and its unique capabilities across any app, any cloud and any device to better secure the world’s digital infrastructure – from networks, to endpoints, to workloads, to identities, to clouds.”

“Our members rely on us to deliver best-in-class financial services,” said Mark Fournier, Systems Architect for the U.S. Senate Federal Credit Union. “VMware has put our team in a position to deliver consistent innovation, evolve our digital transformation and keep our data better secured amidst an attack landscape that’s constantly evolving. VMware’s ability to deliver and help secure our digital infrastructure gives us the confidence that we’re staying ahead of the latest threats in an environment where cybersecurity is built into the fabric of our enterprise, not just bolted on.”

Read More  Learn How To Get Observability Into Your Applications With New KubeAcademy Course

New VMware Advanced Security for Cloud Foundation

Data breaches are increasingly devastating, often wiping out billions in market capitalization and costing public company CEOs their jobs. Damage rarely results from a single compromised server. It results from attackers moving laterally (East-West) through the datacenter from a single point of compromise, often for months, as they locate, harvest and exfiltrate sensitive data. Most security professional know this, but struggle to adequately protect their data centers. A survey commissioned by VMware and conducted by Forrester Consulting shows that 75 percent of respondents depend on perimeter firewalls, however East-West security controls need to be different than those for traditional perimeter (North-South) security as 73 percent of respondents believe their existing East-West traffic is not adequately protected(1).

VMware is specifically addressing the internal data center security challenge with the new VMware Advanced Security for Cloud Foundation, which will include VMware Carbon Black technology, VMware NSX Advanced Load Balancer with Web Application Firewall capabilities and VMware NSX Distributed IDS/IPS. Each one is purpose-built for the data center and together deliver a unique and more comprehensive data center security solution. Also, all three will tightly integrate into VMware vSphere, the industry standard for data center workloads, enabling world-class security to follow workloads wherever they go through their entire life.

World class data center security starts with a strong foundation—properly protecting data center workloads. VMware Carbon Black technology protects workloads with Real-time Workload Audit/Remediation, Next-Generation Antivirus (NGAV) and Endpoint Detection & Response (EDR). VMware Carbon Black will be tightly integrated with VMware vSphere to yield an “agentless” solution, eliminating the need to insert antivirus and other agents. Instead, endpoint telemetry will be managed and gathered via built-in sensors protected by the hypervisor. This also means, unlike agent-based solutions, the hypervisor will be able to detect if an attacker attempts to gain root access and tamper with the VMware Carbon Black technology — all from a separate trust domain.

The web server is the “front door” of the data center, and NSX Advanced Load Balancer / Web Application Firewall safeguards this frequent point of attack. Often customers using hardware-based solutions with fixed capacity will turn off security filtering under heavy loads, leaving critical servers vulnerable. The unique, scale-out software architecture of the NSX Web Application Firewall helps confirm web servers have enough computation capacity for maximum security filtering even under peak loads. The NSX Web Application Firewall uses rich understanding of applications, automated learning, and app-specific rules to provide strong security with lower false positives.

Read More  Best Practices For Upgrading Your Anthos Clusters On Bare Metal

Behind the web tier, micro-segmentation and in-band East-West firewalling helps prevent lateral movement of attackers. The VMware NSX Distributed IDS/IPS, a new capability of the VMware NSX Service-defined Firewall, will provide intrusion detection on the many different services that make up an application making it easier to get deep visibility. The distributed architecture of NSX Distributed IDS/IPS will enable advanced filtering to be applied to every hop of the application, significantly reducing the blind spots created when using traditional perimeter security products. Policies will be automatically generated and enforced on an application-specific basis, thereby lowering false positives.

For more information on VMware Advanced Security for Cloud Foundation read this blog.

VMware Carbon Black Cloud Enhancements

VMware has introduced automated correlation with MITRE ATT&CK framework Technique IDs (TIDs)—a list of common tactics, techniques, and procedures (TTPs)—built into the VMware Carbon Black Cloud. Using MITRE’s ATT&CK framework, customers can begin searching for specific TTPs based on MITRE ATT&CK techniques within the VMware Carbon Black Cloud to discover potential threats and identify areas of improvement in their security posture.

VMware Carbon Black has also integrated with the Microsoft Windows Anti-Malware Scanning Interface (AMSI) to provide additional visibility by decoding obfuscated commands. Using the integration, customers will be able to seek visibility into the exact content executed by script interpreters, such as PowerShell. Customers will also be able to search across their continuously collected endpoint activity data and create custom detections based on AMSI-related script content.

Finally, VMware Carbon Black will be adding malware prevention capabilities for Linux machines. This innovation will empower customers to migrate away from other endpoint prevention solutions specific to Linux and consolidate their security programs. This addition to the VMware Carbon Black Cloud platform means customers will have the option for comprehensive security coverage across all major operating systems (Windows, Mac, and Linux).

Read More  Google Cloud Next 2019 | Beyond Your Bill: Getting More Detail On Cost

For more information on the latest VMware Carbon Black Cloud enhancements read this blog.

VMware Secure State Counters Cloud Threats with a Flexible, In-Account Remediation Approach

With VMware Secure State’s real-time detection and remediation capabilities, customers can now close the loop on cloud security and compliance to mitigate risks proactively. VMware Secure State is adding a new, flexible remediation framework to help customers automate actions across multicloud environments. Currently in Beta(2), this solution is designed to help cloud security teams collaborate with DevOps teams and gain trust as they gradually scale best practices. The service provides pre-defined, out of the box actions or ability to create new, custom actions as code. All actions can be targeted to selectively remediate resources based on conditions such as cloud accounts, regions or resource tags.

Security teams will also get comprehensive capabilities for managing overall cloud risk. To address existing misconfigurations, they can either bulk remediate violations themselves or publish actions to delegate decisions to DevOps teams. In order to prevent new misconfigurations, they can build guardrails that auto-remediate violations at real-time speed. With an extensible, policy as code approach, users can programmatically execute all remediations as code using API and integrate them within the CI/CD pipeline. No matter how actions are triggered, customers maintain centralized visibility into remediation progress and changes to cloud resources.

For more information about VMware Secure State auto-remediation, read this blog.


About VMware

VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact. For more information, please visit https://www.vmware.com/company.html


Our humans need coffee too! Your support is highly appreciated, thank you!

aster_cloud

Related Topics
  • Cloud Security
  • Network Security
  • VMware
You May Also Like
View Post
  • Architecture
  • Platforms
  • Software
  • Solutions
  • Technology

What To Expect From Apple’s WWDC 2023

  • June 1, 2023
View Post
  • Platforms

Build Next-Generation, AI-Powered Applications On Microsoft Azure

  • May 26, 2023
View Post
  • Platforms
  • Solutions

MongoDB And Alibaba Cloud Extend Global Partnership

  • May 25, 2023
View Post
  • Computing
  • Platforms

Oracle Cloud Infrastructure Adds To Growing List Of Government Approved Cloud Services

  • May 22, 2023
View Post
  • Engineering
  • People
  • Platforms

KubeCon Europe 2023 Highlights Kubernetes Explosion And Need For Instant Platform Engineering

  • May 17, 2023
View Post
  • Data
  • Platforms
  • Technology

Cloudflare’s R2 Is The Infrastructure Powering Leading AI Companies

  • May 16, 2023
View Post
  • Platforms

Oracle Opens Cloud Region In Serbia

  • May 12, 2023
View Post
  • Computing
  • Engineering
  • Platforms

The Next Generation Of Cloud Management And Automation

  • May 9, 2023

Stay Connected!
LATEST
  • 1
    Building A Kubernetes Platform: How And Why To Apply Governance And Policy
    • June 4, 2023
  • 2
    Leave, This “United” “Kingdom”, This “Great” “Britain”
    • June 4, 2023
  • 3
    Amazing Federated Multicloud Apps
    • June 2, 2023
  • 4
    What’s The Future Of DevOps? You Tell Us. Take The 2023 Accelerate State Of DevOps Survey
    • June 2, 2023
  • 5
    Resolving Deployment Issues With Ts-node And Azure Development Pipelines
    • June 1, 2023
  • 6
    What To Expect From Apple’s WWDC 2023
    • June 1, 2023
  • 7
    What Is Platform Engineering And Why Adopt It In Your Company?
    • June 1, 2023
  • 8
    Four Steps To Managing Your Cloud Logging Costs On A Budget
    • May 31, 2023
  • 9
    Red Hat Puts Podman Container Management On The Desktop
    • May 30, 2023
  • 10
    The Agile Mindset: A Path to Personal Fulfillment and Growth
    • May 30, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Huawei ICT Competition 2022-2023 Global Final Held In Shenzhen — 146 Teams From 36 Countries And Regions Win Awards
    • May 27, 2023
  • 2
    Huawei OceanStor Pacific Scale-Out Storage Tops IO500 Rankings
    • May 26, 2023
  • 3
    MongoDB And Alibaba Cloud Extend Global Partnership
    • May 25, 2023
  • 4
    Tricentis Launches Quality Engineering Community ShiftSync
    • May 23, 2023
  • 5
    G7 2023: The Real Threat To The World Order Is Hypocrisy.
    • May 27, 2023
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.