Tag: vmware

[Video] Overcoming Challenges Facing Enterprise IT With the Digital Workspace

[Video] Overcoming Challenges Facing Enterprise IT With the Digital Workspace

This post was originally published on this site —When it comes to enabling users with applications, the world of enterprise IT has never been more challenging. If we go back only a few years, organisations primarily used not only Microsoft Windows devices but also Windows applications. Enterprise mobility and the consumerisation of IT led to a huge increase in the variety of devices and operating systems being used. MacBook and Chromebook laptops, mobile phones and rugged devices are just a few examples of the devices found in organisations these Read more […]

PowerCLI Beta

PowerCLI Beta

This post was originally published on this site —The PowerCLI Beta containing support for MacOS and Linux is LIVE! How to participate: Log in to the VMware Community and read this first! Join the Community discussions in the beta forum Join us on VMware {Code} Slack in the #PowerCLI channel! That’s it for now! Happy Automating! Jake The post PowerCLI Beta appeared first on VMware PowerCLI Blog. Read more […]

vRA UpgradeGovernance – Debug Tips

vRA UpgradeGovernance – Debug Tips

This post was originally published on this site —vRA UpgradeGovernance   UpgradeGovernance upgrades Entitlements and Approval policies in the self-service platform vRA. Entitlements determine which users or groups can request catalog items or perform specific actions on requested items. Approval policies attached to entitled catalog items or entitled actions allow additional controls to the environment. This blog post makes an attempt to give step by step procedure to debug known scenarios that come up in entitlements and approvals migration Read more […]

Mastering NSX Load Balancers using vRealize Automation

Mastering NSX Load Balancers using vRealize Automation

This post was originally published on this site — Unlock the Greater Value of vRealize Automation Many vRealize Automation (vRA) customers start their IT automation journey from the basic Infrastructure-as-a-service. If you have achieved fast provisioning and delivery of infrastructure services to end users, the next logical step is to connect vRealize Automation with other existing tools, deliver custom services and make a true end-to-end automation happen in your IT environment.  vRealize Automation, Read more […]

Data Security Series: 7 Reasons to Use Virtual Desktops & Apps

Data Security Series: 7 Reasons to Use Virtual Desktops & Apps

This post was originally published on this site —Your Comprehensive Guide to Transforming Security with Desktop Virtualization Not a day goes by without a data breach or a cyberattack. No one seems to be immune, from government agencies to retailers, Big Four accounting firms, fast food chains, and now, credit reporting agencies. Whether the breach is due to lax security on the part of the organization, insiders going rogue or brute force by cyberterrorists, we all pay the price when data is compromised. While it may be tempting to say that “nothing Read more […]

Managed Service Accounts (GMSA) and vRA

Managed Service Accounts (GMSA) and vRA

This post was originally published on this site —Part of my job as a Customer Success Architect is to consult customers on various topics around vRA. Sometimes, those topics go to uncharted territory. One of them is managing the IaaS service account and its password according to security protocols. VMware supports this and we even have a procedure defined in a KB, but once we throw it at the customer we immediately get a bunch of additional questions around it. How to automate it? What happens to provisioning requests during the password change? Read more […]

Rapid Micro-segmentation using Application Rule Manager Recommendation Engine

Rapid Micro-segmentation using Application Rule Manager Recommendation Engine

This post was originally published on this site —Customers understand the need for micro-segmentation and benefits it provides to enhance the security posture within their datacenter. However, one of the challenges for a Security admin is how to define micro-segmentation policies for applications owned and managed by application teams. This is even more challenging especially when you have tens or hundreds of unique applications in your data center, all of which use different port and protocols and resources across the cluster. The traditional Read more […]

Remediating Risk: How VMware Workspace ONE and Lookout Secure Enterprise Mobility

Remediating Risk: How VMware Workspace ONE and Lookout Secure Enterprise Mobility

This post was originally published on this site —  Sachin Sharma, Sr. Product Line Marketing Manager, VMware, and Nick Fisher, Product Marketer at Lookout discuss the need for, and benefits of, a platform approach to comprehensive enterprise mobile security. Today’s enterprise faces growing mobile risk A quick scan of last year’s news headlines reveals enterprise security breaches and malicious attacks are on the rise, with mobile devices becoming the preferred target. This means the task of securing the enterprise for IT and Read more […]

Remediating Risk: How VMware Workspace ONE & Lookout Secure Enterprise Mobility

Remediating Risk: How VMware Workspace ONE & Lookout Secure Enterprise Mobility

This post was originally published on this site —Sachin Sharma, senior product line marketing manager at VMware, and Nick Fisher, product marketer at Lookout, discuss the need for, and benefits of, a platform approach to comprehensive enterprise mobile security. Today’s Enterprise Faces Growing Mobile Risk A quick scan of last year’s news headlines reveals enterprise security breaches and malicious attacks are on the rise, with mobile devices becoming the preferred target. This means the task of securing the enterprise for IT and security Read more […]