Aug 16

Understanding VMware AppDefense: A Tom Corn Perspective

How VMware AppDefense Enhances Security Across Clouds

Building on VMware’s foundational approach to cloud infrastructure and security, VMware AppDefense is a new solution that leverages the unique properties of virtualization to protect applications running on top of it. This new solution creates a least-privilege compute environment by capturing intended state of applications, and monitoring running machines against their intended state. AppDefense can detect and automate response to attacks that attempt to manipulate those applications, addressing a key challenges security organizations face from a constantly evolving and complex threat landscape.

Leveraging the Network Infrastructure

VMware AppDefense takes advantage of the application visibility the virtualization layer provides to enable what Tom Corn, VMware’s senior vice president for security products calls “an intent-based security model.” That model focuses on what the applications should do—the known good—rather than what the attackers do—the known bad. “We believe it will do for compute, what VMware NSX and micro-segmentation did for the network; shrink the attack surface and create a more actionable security model.”

The automation made possible by the virtualized, software-defined infrastructure allows AppDefense to automate every phase of this process, including threat detection and response.

Detect and Respond

The capabilities of VMware AppDefense open up new ways to shrink the attack surface and create a new security model that Corn says is “much more aligned to applications.” Now security organizations have the tools they need to leverage the power of the software-defined infrastructure to detect threats, and create “a much more actionable, orchestrated, and automated response” to attacks.

“With AppDefense,” Corn says, organizations have a simple but powerful mechanism to ‘ensure good’ rather than just ‘chase bad.’ This changes the current approach to security that Corns describes as “constantly chasing the evolving threat landscape.”

Watch Tom Corn’s light board presentation to see how VMware AppDefense improves security for applications running on virtualized and cloud environments.

VMware AppDefense is a new security solution that allows organizations to create least privilege environments around their applications running in virtualized or cloud systems, a key feature according to VMware’s senior vice president for security products, Tom Corn. Watch VMware’s Tom Corn illustrate how VMware AppDefense significantly enhances application security when working across clouds in this light board presentation.
NOTE: This video is roughly 13 minutes in length so it would be worth blocking out some time to watch it!

Rating: 5/5


Jul 26

NSX – How do I know if I need it or not?

Not all data centers are created equal. Oh sure we believe NSX is the greatest thing since cornbread and chicken. The reality is any product that goes into your data center must be able to increase your efficiency while decreasing your overhead. Join Jimmy Ray Purser as he explains how the NSX Pre-Assessment tool works and how you can justify the need or not for moving towards a Software Defined Data Center. All without having to purchase a single thing! Free is good right?

Rating: 5/5


Jul 12

VMware NSX and the Data Center Network Evolution

Watch this short video from Gustavo Santana (author, VCIX-NV, triple-CCIE, and NSX SE Manager for Latin America) to understand how VMware NSX can positively influence on the architecture of physical data center networks. Here are some of the topics addressed by Santana:

* The evolution of data center networks from the 1990s to the 2010s
* Benefits and challenges of each evolution phase (STP-based, Multi-chassis, fabrics)
* An architectural perspective of VMware NSX
* A new proposed architecture for data center networks

The network virtualization revolution continues!

Rating: 5/5


May 16

Using NSX to make a Virtualized DMZ

Need a more specific use-case to get started with Micro-segmentation and the NSX Distributed Firewall? Your DMZ is an excellent place to start! Why let your blast-area be the entire DMZ network – limit the scope of damage to each individual server. OS-level firewalls are great – but are subject to being disabled once the server has been compromised. NSX, with it’s point of control at the vNIC level, completely gets around that limitation to help reduce your exposure.

Rating: 5/5


May 16

How NSX Uses VXLAN

NSX is referred to as an “overlay” technology but what is actually doing the work on the back end to transfer that data back and forth? VXLAN is the unsung hero protocol moving data in and out of the virtual to the physical side of the house. Join Jimmy Ray Purser as he goes thru the basics of this standards based protocol and what you need to config on your physical network to enable it as well as how it interacts with other network devices.

Rating: 5/5


May 13

Using VLANs to Isolate Traffic

Using VLANs in vSphere helps you adapt the environment to network changes. VLAN modes overcome the limitations of the networking equipment and of host physical connectivity.

Rating: 5/5


Apr 29

VXLAN Virtual Wires, Part Two, Creating Virtual Wires

R&D Manager Sachin Thakkar shows you how to prepare your physical network for VXLAN virtual wires and then takes you through the procedure of creating a VXLAN virtual wire.

Rating: 5/5


Apr 28

VXLAN Virtual Wires, Part one, Overview

Using VLANs in vSphere helps you adapt the environment to network changes. VLAN modes overcome the limitations of the networking equipment and of host physical connectivity.

Rating: 5/5


Apr 24

Load Balancing Algorithms available for Virtual Switches in vSphere 6.0

In this video you will learn about the available load balanccing algorithms in vSphere 6.0.

Rating: 5/5


Mar 14

Migrating Host Networking to a vSphere Distributed Switch

Senior Staff Engineer Peter Shepherd shows you how to easily migrate host networking from a vSphere Standard Switch to a vSphere Distributed Switch in a single workflow.

Rating: 5/5