Author Archives: Roger Fortier
Author Archives: Roger Fortier
There are a lot of reasons that IT organizations are virtualizing their networks more and more—and chief among them is micro-segmentation.
Micro-segmentation, which comes hand-in-hand with network virtualization, divides the data center into distinct segments. Each segment can be secured separately. When security controls and network services are separately defined and communications is isolated, an attacker’s movements are restricted even if a breach in your data center perimeter occurs.
Micro-segmentation doesn’t just improve on traditional perimeter defenses. It is a whole new way of securing the data center.
Sign up to get our FREE “Micro-segmentation for Dummies” eBook, and check out our infographic below to find out more about how it works.
The post Still Using Perimeter Defenses To Protect Your Data Center? Stop, Drop, and Defend—With Micro-Segmentation appeared first on The Network Virtualization Blog.
Sometimes a webcast isn’t enough – that’s why when VMware brings an NSX seminar to your hometown, you say “yes.” VMware is kicking off the NSX Fundamentals Live U.S. tour, so register now to secure your spot in one of these seminars when it gets to your town.
VMware experts will start off with a business overview of NSX use cases and IT outcomes. Want to know about the future of the software-defined data center and what role network virtualization will play in helping you face new business challenges? Here’s your chance. Want to discover how to bring the operational model of a virtual machine to your data center network, so you can transform the economics of network and security operations? Again, now’s your chance.
Following this business overview, experts will walk you through an in-depth technical overview of NSX architecture and key components. After this session, you’ll fully understand how networking functions and services are implemented within the NSX platform, and how to analyze key workflows for configuring virtual network & security services.
Digital business transformation is creating new opportunities and risks for businesses across every industry. VMware NSX helps you overcome challenges, such as increased risk Continue reading
Did you know the average organization’s security has been compromised an average of four times over the past year? If that seems like a lot, well, that’s because it is—especially considering that, according to a survey conducted by Forrester of 210 IT risk and compliance decision-makers, the vast majority of organizations also believe they are “extremely secure.” Fortunately, by virtualizing your network with VMware NSX, you can dramatically strengthen your security with micro-segmentation.
Click here to get our FREE VMware NSX resource kit your guide to micro-segmentation.
Find out more about leveraging micro-segmentation to build a Zero Trust network in the infographic below.
The post Infographic: Survey Reveals IT Organizations Underestimate Security Threats appeared first on The Network Virtualization Blog.
VMware NSX is indisputably the most widely deployed software network overlay on the market today, and many companies are realizing the valuable payoff that comes with virtualizing the network to improve security, IT automation and application continuity.
Now is your chance to be taught by VMware NSX experts, in-person, as they guide you through technical features, functions, and business use cases – all while you work directly with the solution. Collaborate with peers and ask the experts questions tailored to your case by signing up for a VMware NSX SociaLab near you.
VMware NSX enables a new policy-driven approach to transform the economics of network and security operations. Whether you’re a beginner, or you’re already working with the NSX platform, these expert-led, hands-on labs will highlight multiple features of NSX such as:
Bring your own device, join an interactive environment, and attend a free VMware SociaLab NSX event in your city this May-June.
The post VMware NSX SociaLab is Coming to a City Near You! appeared first on The Network Virtualization Blog.
Shopping for cloud solutions used to mean choosing between performance, elasticity and security — you could get one, maybe two, but never all three. With the help of VMware NSX, Armor Active Cyber Defense has proven that you can achieve the highest level of cloud security while maintaining the high performance and elasticity you demand.
Join our webcast, Next-Generation Cloud Security with VMware NSX and Armor, on May 4 to explore how NSX enhances automation and flexibility.
Learn more about VMware NSX and the key components of the Armor Virtual Private Cloud, including Server, Network and Security Virtualization. VMware and Armor Experts will demonstrate how to architect an environment with fully integrated security that provides the performance and efficiency customers demand from the cloud.
As threat actors display more proficiency, speed and diligence, cloud security is more important than ever. Here’s your chance to explore how VMware NSX can deliver secure cloud environments to you and your customers.
Sign up for our May 4 webcast today and explore the transformative security and automation benefits of VMware NSX.
The post May 4th – Get Ready for Next-Generation Cloud Security with NSX and Armor appeared first on The Network Virtualization Blog.
As a networking professional, you know there’s only one certainty in today’s business landscape: change. As technology continues to grow and evolve, so has the way we operate and manage the network. Throughout most of the data center, hardware-centric infrastructure has been replaced with more agile, efficient, software-defined solutions. That’s a huge step forward—but the transformation won’t be complete until the network is virtualized, too.
Are you prepared to deliver and manage the network your business users need?
Network virtualization opens the door to a whole new set of exciting possibilities. When you virtualize the network, you can create, provision, and manage networks in software, programmatically. That means your users’ services will be faster and more secure than ever. It also means your organization will save valuable time and money.
You already know how to run a network. So why is getting certified in network virtualization so important? Because in this field, credibility is everything. Certification sets you apart. It demonstrates not only that you are knowledgeable, but also that you’re dedicated to moving your IT organization forward.
Earlier this year we talked to Fred Baker, a Senior Network Engineer, Continue reading
Today, just about all enterprise data centers have virtualized a significant portion of their server resources, and a large percentage are moving to virtualize their storage resources as well.
That’s because the majority of IT organizations are realizing the payoff that comes with virtualization—things like better utilization of resources, increased IT agility, and lower capital and operational costs. Organizations have not yet virtualized their network resources, meanwhile, are leaving a lot of money on the table—in terms of potential capital and operational cost savings, increased data center security, and greater business and IT agility.
But could that payoff be even bigger? That’s the question asked in the new reference book “Network Virtualization for Dummies,” which explores the benefits of network virtualization in depth. Published by Wiley and sponsored by VMware, the book offers a crash course on the new, virtualized approach to the network, which is a key building block for the software-defined data center.
In simple, straightforward language, “Network Virtualization For Dummies” explains the fundamentals of network virtualization, including its core concepts, key technology components, use cases, and business and IT benefits. Spend a little time with the book—and a little time is really all you’ll Continue reading
Hey IT pros! Do you want to know how to simplify your IT with VMware solutions? Then join us at vForum Montreal on April 21st to discover the latest tips and tricks so that you can transform your IT! Whether you’re just starting out or you already have an advanced deployment plan, we’ll help you navigate your IT journey across cloud, virtualization and mobility. Make sure to free up your schedule for this one-day event – it’s free!
In the morning, you’ll hear some of IT’s biggest names dole out actionable advice on how to deliver an effective cloud strategy. Listen to VMware CTO of the Americas, Chris Wolf, discuss four key priorities that drive today’s IT imperatives. Then stick around for IDC Canada’s very own Program VP, David Senf, who will share his vast experience in forecasting and tracking markets & competitors in the cloud, servers, storage, networking & security, software tools and virtualization. Rounding out our list of keynote speakers is Shawn Rosemarin, VMware Chief of Staff Systems Engineer, who’ll explain how VMware’s Software Defined Enterprise can help mature your organization from a “cost center” into a “valued service provider.”
After lunch, dive deep into your IT Continue reading
PALO ALTO, Calif., June 10, 2015 – VMware, Inc. (NYSE: VMW), the global leader in virtualization and cloud infrastructure, today announced the City of Avondale, Ariz., has implemented VMware’s unified platform for the hybrid cloud. By virtualizing the network with VMware NSX™ and adopting VMware vCloud® Air™ Disaster Recovery, the City is better equipped to protect critical services. More than simple backups, Avondale is better prepared to achieve quick recovery from unforeseen incidents that could impact the delivery of municipal services to citizens and businesses such as traffic management, water and wastewater utilities, and emergency response by police officers and firefighters.
The city of Avondale, an innovative community in the Phoenix Metropolitan area, is committed to making sure that critical health, safety, utility, and financial services are always available for its residents. According to the City of Avondale, its municipal government maintains a budget of $180 million with over 500 employees. The 16-person Information Technology (IT) department supports the community by using technology to engage the community and innovate municipal services to keep the city responsive, efficient, and secure.
The City was looking to improve its ability to recover from unforeseen disasters through cloud-based disaster recovery. Given the Continue reading
If you missed a VMware vForum in a city near you, you can still join us on April 19th for vForum Online! At this free digital event, you’ll get practical guidance, and develop new strategies for building a digital success plan across the cloud, the virtualized network, and mobile. Continue reading
The latest AirWatch update expands VMware NSX integration, uniting two great technologies to create the foundation of next-generation security. Continue reading
This year’s RSA Conference ought to be good—and VMware is well represented among the industry’s security leaders and pioneers who will discuss topics from network virtualization to data center security to Minecraft. Continue reading
As technology evolves, companies adapt and grow. We are no longer confined to conducting business within brick and mortar offices. We can hold a meeting on our tablet in a coffee shop or organize our schedules in our smartphones at the grocery store. Even storage has travelled from overflowing file cabinets into a vast, expansive cloud that can be reached from portable devices wherever, whenever. As businesses go mobile, security is more vital than ever, and it’s important that we enhance it while remaining productive. But how can we be certain that our valuable, business-critical resources are protected?
Geoff Huang, VMware’s Director of Product Marketing, Networking and Security, will host this half-hour webcast on February 18th at 11:00 am PST on why yesterday’s security measurements have become inadequate with the rise of network virtualization, and how NSX can offer a remedy in the modern, mobile workspace.
The truth is, the mobile cloud’s increased efficiency also comes with increased security threats. Before, security was created by building a moat around a network to guard company resources against outsiders trying to break-in. Once that network transitions into a mobile workspace, however, its borders can no longer be tangibly defined, so Continue reading
The need for substantive network security in schools has never been greater. According to ID Analytics, more than 140,000 minors are victims of identity fraud per year—and when their data is exposed, it is misused more frequently. One reason for this is that minors’ clean credit reports can make them extra attractive to identity thieves.
“The educational space is extremely concerned about ensuring [that] Personally Identifiable Information (PII) about students, and their respective data, is kept safe, secure, and only used for the learning environment,” says Jason Radford, head of operations for IlliniCloud. Continue reading
It’s no secret that by transforming networking into a software industry, network virtualization has accelerated innovation. But what does virtualization mean for security more broadly? Can virtualization be a key weapon in the arsenal for improving IT security? If so, how?
Network security, for a long time, has worked off of the old Russian maxim, “trust but verify.” Trust a user, but verify it’s them. However, today’s network landscape — where the Internet of Things, the Cloud, and more are introducing new vulnerabilities — makes the “verify” part of “trust but verify” difficult and inefficient. We need a simpler security model. That model: Zero Trust. Continue reading
VMware NSX equips Armor with the ability to orchestrate each customer in a cloud-like environment while giving them a threat-tight security wrapper via micro-segmentation from day one. Continue reading
What will be our security challenge in the coming decade? Running trusted services even on untrusted infrastructure. That means protecting the confidentiality and integrity of data as it moves through the network. One possible solution – distributed network encryption – a new approach made possible by network virtualization and the software-defined data center that addresses some of the current challenges of widespread encryption usage inside the data center.
VMware’s head of security products Tom Corn recently spoke on the topic at VMworld 2015 U.S., noting, “Network encryption is a great example of taking something that was once a point product, and turning it into a distributed service—or what you might call an infinite service. It’s everywhere; and maybe more importantly it changes how you implement policy. From thinking about it through the physical infrastructure—how you route data, etcetera—to through the lens of the application, which is ultimately what you’re trying to protect. It eventually becomes really a check box on an application.”
VMware NSX holds the promise of simplifying encryption, incorporating it directly so that it becomes a fundamental attribute of the application. That means so as long as it has that attribute, any packet will be Continue reading
VMware NSX has been around for more than two years now, and in that time software-defined networking and network virtualization have become inextricably integrated into modern data center architecture. It seems like an inconceivable amount of progress has been made. But the reality is that we’re only at the beginning of this journey.
The transformation of networking from a hardware industry into a software industry is having a profound impact on services, security, and IT organizations around the world, according to VMware’s Chief Technology Strategy Officer for Networking, Guido Appenzeller.
“I’ve never seen growth like what we’ve found with NSX,” he says. “Networking is going through a huge transition.” Continue reading
Applications are a vital component of your business…but are your applications and data safe? Have you considered implementing a Zero Trust model at your organization to protect your vital resources? Join this hour-long webcast on Tuesday, September 29, 2015 at 11:00 AM PST / 2:00 PM EST to find out how to leverage micro-segmentation to build a true Zero Trust data center network.
Join our guest speaker, John Kindervag, VP and Principal Analyst at Forrester Research, as he discusses the results of the August 2015 commissioned research study, “Leverage Micro-segmentation To Build A Zero Trust Network”, conducted on behalf of VMware. Kindervag will cover Forrester’s three key findings from the study:
Protecting your data doesn’t have to be difficult! Reserve your spot for this webcast today.
And to learn more about how other leading organizations are using micro-segmentation to build a Zero Trust Model, watch the video below from David Giambruno, CIO of Continue reading