Tag: NSX

VMware Cloud on AWS with Transit Gateway Demo

VMware Cloud on AWS with Transit Gateway Demo

This post was originally published on this site —At AWS re:Invent 2018 last November, AWS introduced a regional construct called Transit Gateway (TGW). AWS Transit Gateway allows customers to connect multiple Virtual Private Clouds (VPCs) together easily. TGW can be seen as a hub and all the VPCs can be seen as spokes in a hub and spoke-type model; any-to-any communication is made possible by traversing the TGW. TGW can replace the popular AWS Transit VPC design many customers have deployed prior for connecting multiple Virtual Private Clouds (VPCs) Read more […]

NSX-T 2.4 – NSX Cloud eases your Adoption/Operations between on-premises Datacenter, AWS and Azure

NSX-T 2.4 – NSX Cloud eases your Adoption/Operations between on-premises Datacenter, AWS and Azure

This post was originally published on this site —2018 was a great year for NSX with Cloud seeing increased customer traction, strong partnerships established across the board, and a whole host of new features being released throughout the year! While most of our competitors are just starting on their public cloud solution, NSX Cloud is entering its second year of adoption, enabling consistent networking and security across on-premises Datacenter, AWS, and Azure. With NSX-T 2.4, we’re extending our industry-leading capabilities, which will Read more […]

Context-aware Micro-segmentation with NSX-T 2.4

Context-aware Micro-segmentation with NSX-T 2.4

This post was originally published on this site —With last’s week landmark release of NSX-T 2.4,  and the RSA conference is in full swing,  this is the perfect time to talk about to some of the new security functionality we are introducing in NSX-T 2.4. If you prefer seeing NSX-T in action, you can watch this demo which covers Layer 7 application identity, FQDN Filtering and Ientity Firewall. Or if you are around at RSAC in San Francisco this week, swing by the VMware booth.  Micro-segmentation has been one of the key reasons Read more […]

Meet the VMware Service-defined Firewall: A new approach to firewalling

Meet the VMware Service-defined Firewall: A new approach to firewalling

This post was originally published on this site —VMware has had front row seats to the digital transformation that has touched virtually every organization. We’ve been there (and helped drive!) the journey from monolithic applications hosted on a single server, to distributed apps running in VMs, to further decentralization in the form of cloud-native apps composed of microservices. Now, we’re watching the proliferation of public clouds, the up and coming space of serverless and the adoption of functions as a service as ways to build Read more […]

Introducing IPv6 in NSX-T Data Center 2.4

Introducing IPv6 in NSX-T Data Center 2.4

This post was originally published on this site —With the latest release for VMware NSX-T Data Center 2.4, we announced the support for IPv6. Since the advent of IPv4 address space exhaustion, IPv6 adoption has continued to increase around the world. A quick look at the Google IPv6 adoption statistics proves the fact that IPv6 adoption is ramping up. With the advances in IoT space and explosion in number of endpoints (mobile devices), this adoption will continue to grow. IPv6 increases the number of network address bits from its predecessor IPv4 Read more […]

Introducing NSX-T 2.4 – A Landmark Release in the History of NSX

Introducing NSX-T 2.4 – A Landmark Release in the History of NSX

This post was originally published on this site —In February 2017, we introduced VMware NSX-T Data Center to the world. For years, VMware NSX for vSphere had been spearheading a network transformation journey with a software-defined, application-first approach. In the meantime, as the application landscape was changing with the arrival of public clouds and containers, NSX-T was being designed to address the evolving needs of organizations to support cloud-native applications, bare metal workloads, multi-hypervisor environments, public clouds, and Read more […]

Re-introducing VMware AppDefense, Part I – Application Security in Virtualized and Cloud Environments

Re-introducing VMware AppDefense, Part I – Application Security in Virtualized and Cloud Environments

This post was originally published on this site —This blog will be part of a series where we start off with a basic reintroduction of VMware AppDefense and then progressively get into integrations, best practices, mitigating attacks and anomaly detection with vSphere Platinum, vRealize Log Insight, AppDefense and NSX Data Center. Before we get into the meat of things let’s level-set on a few core principles of what VMware believes to be appropriate cyber hygiene. The full white paper can be viewed here. Follow a least privileged model The Read more […]

IHS Markit Talks Pioneering Private Cloud, Containers, and VMware Cloud on AWS

IHS Markit Talks Pioneering Private Cloud, Containers, and VMware Cloud on AWS

This post was originally published on this site —Global information, analytics, and solutions company IHS Markit provides data-driven insight for its government and corporate customers. Using VMware vRealize Automation, the company has already rolled out a private cloud that helped developers cut a 6-month infrastructure provisioning process down to one week. They’ve also been using VMware NSX-T Data Center to secure their workloads at a granular level with micro-segmentation, and to fundamentally re-think network design. At VMworld 2018 Read more […]

NSX-T Integration with Openshift

NSX-T Integration with Openshift

This post was originally published on this site —I am sometimes being approached with questions about NSX-T integration details for Openshift. It seems people are well aware how NSX-T works and integrates with Pivotal Container Service (aka PKS), Pivotal Application Service (PAS formerly known as PCF), and even with vanilla Kubernetes but there is no much information how we integrate with Redhat’s Openshift. This post aims to throw some light on the integration with this platform. In the examples below I am using Openshift Origin (aka OKD) Read more […]

Securing your SWIFT environment with VMware

Securing your SWIFT environment with VMware

This post was originally published on this site —The SWIFT Controls Framework was created to help customers figure out which controls are needed to better secure their SWIFT environment.  The SWIFT security controls framework is broken down into objectives, principles, and controls.   The three objectives are “Secure your environment, Know and Limit Access, and Detect and Respond”. Customers interested in exploring VMware product alignment with the SWIFT framework should evaluate the end-to-end solution. This includes Read more […]