SlideShare a Scribd company logo
© 2014 VMware Inc. All rights reserved.
Paul Penn - ppenn@vmware.com
Sales Director Western US
Garrett Kray- krayg@vmware.com
Security Specialist
Network and Security Business Unit
VMware NSX
Transforming Security
VMware – Who we are…
 Headquartered in Palo Alto
• Campus the size of Disneyland
 Over $25 billion in revenues
 17 years old
 Over 55,000 partners worldwide
 ~17,800 employees worldwide
 Fastest Software Company in
history to grow to $5 billion in
sales (and did it with one
product)
 Corporate Mascot: Turtle
VMware Software Defined Enterprise
3
Policy-based
Management &
Automation
Cloud Automation Cloud Operations Cloud Business
Software-Defined Data Center
Private
Clouds
Public
Clouds
vCHS
Virtualized Infrastructure
Abstract & Pool
Applications
End User
Computing
Desktop Mobile
Virtual Workspace
Modern SaaSTraditional
Compute Network Security Storage Availability
vSphere NSX vSAN SRM
vCenter Server
vCenter Automation Center (VCAC)
vCenter Operations
(vCOPS)
ITBM
Horizon Workspace
Horizon View
Horizon Mirage
Agenda
1 SDDC/NSX Overview
2 The Killer Use Case // Micro-segmentation
3 Current Customers and Benchmarks
4 VMware AppDefense
4Confidential
IT’S TIME FOR A NEW IT APPROACH
SLOW TECHNOLOGY
ADOPTION RATES
HIGH USER
EXPECTATIONS
SLOW
REPONSES
PRIVACY
ISSUES
INTEGRATION
PROBLEMS
SERVICE
OUTAGES
SHORTAGE
OF RIGHT
SKILLS
DECLINING BUDGET
DIFFERENT
APPLICATIONS AGING INFRASTRUCTURE
SECURITY
PROLIFERATION
OF DEVICES
FRAGMENTED
DATA CENTER
LIMITED
RESOURCES
CLOUD SILOS
SECURITY
PROLIFERATION
OF DEVICES
FRAGMENTED
DATA CENTER
CLOUD SILOS
We are in the 3rd fundamental structural transition in the history of IT
Client Server Cloud/MDM/SDDC
We are here
Mainframe
Mainframe
PC Revolution
Client/Server
Cloud
Cloud
• Mobile Devices & Clouds
(public & private)
• Software Defined
• Local Applications
• Minor role for networking
• Desktops & Servers
• Campus Networks
• Data Centers
What Is a Software-Defined Data Center (SDDC)?
7
Hardware
Software
Data center virtualization layer
Pooled compute, network, and storage capacity
Vendor independent, best price/performance/service
Simplified configuration and management
Intelligence in software
Operational model of VM for data center
Automated provisioning and configuration
CONFIDENTIAL
NSX value proposition
Network virtualization is at
the core of the software-
defined data center
approach
Network, storage, compute
Virtualization layer
8CONFIDENTIAL
Network and
security services
now in the
hypervisor
Switching
Routing Firewalling/ACLs
Load balancing
East-west firewalling
High throughput rates
Hardware independent
The Next-generation Networking Model
9CONFIDENTIAL
NSX value proposition
Network, storage, compute
Virtualization layer
“Network platform”
Virtual networks
10CONFIDENTIAL
11
SECURITY
Architecting security as an inherent part of the
data center infrastructure
Network Virtualization
How is it being used today?
AUTOMATION
Automating IT processes to deliver IT at the
speed of business
APPLICATION CONTINUITY
Enabling applications and data to reside and
be accessible anywhere
CONFIDENTIAL
CONFIDENTIAL 12
Transforming Security with Micro-segmentation
Increased Security Spending Has Not Decreased Breaches
CONFIDENTIAL 13
IT Spend Security Spend Security Breaches
Annual Cost of Security
Breaches: $445B
(Source: Center for Strategic and
International Studies)
Security as a
Percentage of IT Spend:
2012: 11%
2015: 21 %
(Source: Forrester)
Projected Growth Rate in
IT Spend from 2014-2019:
Zero (Flat)
(Source: Gartner)
Digital makes reliance on data lucrative for thieves
Security investments are increasing, yet the cost of breaches are rising faster
14
Underfunding security
isn’t the problem.
Improved Data Center Network Security
Perimeter-centric network security has proven insufficient, and HW micro-segmentation is operationally infeasible
Little or no
lateral controls
inside perimeter
Internet Internet
Traditional Edge FW NSX dFW
16
Web App DB
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
Security
Micro-segmentation | Secure End User | DMZ Anywhere
Granular Policy Enforcement
Enables zero trust security model with
policy enforced at every workload
CONFIDENTIAL 17
3rd Party Service Insertion with NSX
Advanced Services Insertion – Example: Palo Alto Networks NGFW
Internet
Security Policy
Security Admin
Traffic
Steering
Public Cloud Provider
Your Data Center
Your IT Governance
VMware on AWS powered by NSX
Coalfire Benchmark Report
CONFIDENTIAL 20
• Does VMware NSX functionally
satisfy NIST recommendations?
• Are the precepts of micro-
segmentation, as defined in the
complete definition, satisfied
conceptually and in testing by NSX?
• Can real-world threats be stopped by
NSX in E-W and N-S, using industry-
standard Penetration Testing tools?
Expanding Security to Scale with
the Business
Columbia Sportswear continues to stay ahead
of competitors and threats by combining
advanced, automated security inside the data
center.
“There just wasn’t a great
way to insert security in order
to address east-west traffic
between VMs, nor have the
security tied to the
applications as they moved
around dynamically.”
John Spiegel
Network Manager
Columbia Sportswear
CONFIDENTIAL 22
VMware AppDefense
Abstraction layer between infrastructure and apps
23
We call this the
“Goldilocks Zone”
We can use this zone
to transform endpoint
detection and response
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
Hypervisor
IT
provisions a
new app
1
Visibility and context into application lifecycle
24
Automated collection
of intended state
across app lifecycle
IT provisions a
change to the app
3
AppDefense
notes the change
4
AppDefense
collects intended
state of the app
2
AppDefense
NSX
Insert security into
DevOps process
VMware AppDefense
Hypervisor
Automated detection & response
25
Compare intended state
against run-time state
to detect deviations
Automate response
through vSphere
and NSX:
• Quarantine
• Modify security policy
• Increase logging
AppDefense
NSX
Attacker
compromise
s an app
1
AppDefense
automatically
responds
2
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
Hypervisor
AppDefense
NSX
Isolation from attack surface
26
Isolated environment
to monitor and control
all endpoints
AppDefense itself is
protected from attacks
Attacker
compromise
s an app
1
AppDefense is
protected from the
attack surface
2
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
“Simple works, especially in
InfoSec…I can sleep easy at night
knowing that when AppDefense
detects a problem, it will respond
automatically.”
Brad Doctor
Senior Director, Information Security
VMware
VMware’s Information
Security team uses
AppDefense in our SOC to
protect the critical security
systems that secure our
business applications.
VMware Information Security – Case Study
Thank you

More Related Content

PDF
IBM Cloud pak for data brochure
PPTX
Google Cloud Dataproc - Easier, faster, more cost-effective Spark and Hadoop
PPTX
Migration into cloud
PDF
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
PDF
Oracle database in cloud, dr in cloud and overview of oracle database 18c
PDF
Manage the Digital Transformation with Machine Learning in a Reactive Microse...
PDF
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
PPTX
Part 2: A Visual Dive into Machine Learning and Deep Learning 

IBM Cloud pak for data brochure
Google Cloud Dataproc - Easier, faster, more cost-effective Spark and Hadoop
Migration into cloud
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Oracle database in cloud, dr in cloud and overview of oracle database 18c
Manage the Digital Transformation with Machine Learning in a Reactive Microse...
IBM + REDHAT "Creating the World's Leading Hybrid Cloud Provider..."
Part 2: A Visual Dive into Machine Learning and Deep Learning 


What's hot (20)

PDF
Machine Learning in the Enterprise 2019
PPTX
Big data journey to the cloud 5.30.18 asher bartch
PPTX
Get started with Cloudera's cyber solution
PPTX
Introduction to ibm cloud paks concept license and minimum config public
PPTX
Big data journey to the cloud rohit pujari 5.30.18
PPTX
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
PDF
Cloud analytics for dummies
PPTX
RapidScale CloudApps
PDF
WP VERITAS InfoScale Storage and Dockers Intro - v8
PDF
Predictable Business Continuity for Amazon Web Services
PPTX
PaaS or Fail: Rule the Cloud with Altus
PDF
Blockchain and Apache NiFi
PDF
Cloudian and Rubrik - Hybrid Cloud based Disaster Recovery
PPTX
Cloudera - The Modern Platform for Analytics
PPTX
Cloud and azure and rock and roll
PPTX
How Data Drives Business at Choice Hotels
PPTX
Introducing Cloudera DataFlow (CDF) 2.13.19
PPTX
A Journey to a Serverless Business Intelligence, Machine Learning and Big Dat...
PDF
Modern big data and machine learning in the era of cloud, docker and kubernetes
PDF
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Machine Learning in the Enterprise 2019
Big data journey to the cloud 5.30.18 asher bartch
Get started with Cloudera's cyber solution
Introduction to ibm cloud paks concept license and minimum config public
Big data journey to the cloud rohit pujari 5.30.18
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Cloud analytics for dummies
RapidScale CloudApps
WP VERITAS InfoScale Storage and Dockers Intro - v8
Predictable Business Continuity for Amazon Web Services
PaaS or Fail: Rule the Cloud with Altus
Blockchain and Apache NiFi
Cloudian and Rubrik - Hybrid Cloud based Disaster Recovery
Cloudera - The Modern Platform for Analytics
Cloud and azure and rock and roll
How Data Drives Business at Choice Hotels
Introducing Cloudera DataFlow (CDF) 2.13.19
A Journey to a Serverless Business Intelligence, Machine Learning and Big Dat...
Modern big data and machine learning in the era of cloud, docker and kubernetes
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Ad

Similar to #PCMVision: VMware NSX - Transforming Security (20)

PDF
VMware NSX for vSphere - Intro and use cases
PPTX
Nsx security deep dive
PDF
VMworld 2014: Introduction to NSX
PDF
NSX on VMware Data Center
PPTX
nsx overview with use cases 1.0
PDF
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
PDF
Moving Forward with Network Virtualization (VMware NSX)
PPTX
NSX 9 Core Use Cases
PPTX
20150311 NSX update 301
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
PDF
Business Agility and Security with VMware
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PPTX
Reston Virtualization Group 9-18-2014
PPTX
VMworld 2015: Introducing Application Self service with Networking and Security
PDF
Infographic: Why Businesses are Adopting Network Virtualization
PDF
VMworld 2015: The Future of Network Virtualization with VMware NSX
PPTX
VMware 2015: Next Horizon for Cloud Networking and Security
PDF
Arrow VMware NSX Infographic
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMware NSX for vSphere - Intro and use cases
Nsx security deep dive
VMworld 2014: Introduction to NSX
NSX on VMware Data Center
nsx overview with use cases 1.0
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
Moving Forward with Network Virtualization (VMware NSX)
NSX 9 Core Use Cases
20150311 NSX update 301
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
Business Agility and Security with VMware
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Reston Virtualization Group 9-18-2014
VMworld 2015: Introducing Application Self service with Networking and Security
Infographic: Why Businesses are Adopting Network Virtualization
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMware 2015: Next Horizon for Cloud Networking and Security
Arrow VMware NSX Infographic
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
Ad

More from PCM (19)

PPTX
PCM Vision 2019 Breakout: HPI
 
PPTX
PCM Vision 2019 Breakout: Dell
 
PPTX
PCM Vision 2019 Breakout: Cisco
 
PPTX
PCM Vision 2019 Keynote: Todd Pekats
 
PPTX
PCM Vision 2019 Keynote: Jeff Crume
 
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PPTX
PCM Vision 2019 Breakout: Veritas
 
PPTX
PCM Vision 2019 Keynote: Elliot Baretz
 
PPTX
PCM Vision 2019 Breakout: Quest Software
 
PPTX
PCM Vision 2019 Breakout: Samsung
 
PPTX
PCM Vision 2019 Breakout: Symantec
 
PPTX
PCM Vision 2019 Keynote: Gary Miglicco
 
PPTX
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PPTX
PCM Vision 2019 Breakout: VMWare
 
PPTX
PCM Vision 2019 Breakout: Zebra
 
PPTX
#PCMVision: Real-Time Collaboration: Intel Unite
 
PDF
#PCMVision: Oracle Hybrid Cloud Solutions
 
PPTX
#PCMVision: HPE Family: Numble Storage and SimpliVity
 
PPTX
#PCMVision Customer Day Presentation Slides
 
PCM Vision 2019 Breakout: HPI
 
PCM Vision 2019 Breakout: Dell
 
PCM Vision 2019 Breakout: Cisco
 
PCM Vision 2019 Keynote: Todd Pekats
 
PCM Vision 2019 Keynote: Jeff Crume
 
PCM Vision 2019 Breakout: IBM | Red Hat
 
PCM Vision 2019 Breakout: Veritas
 
PCM Vision 2019 Keynote: Elliot Baretz
 
PCM Vision 2019 Breakout: Quest Software
 
PCM Vision 2019 Breakout: Samsung
 
PCM Vision 2019 Breakout: Symantec
 
PCM Vision 2019 Keynote: Gary Miglicco
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PCM Vision 2019 Breakout: VMWare
 
PCM Vision 2019 Breakout: Zebra
 
#PCMVision: Real-Time Collaboration: Intel Unite
 
#PCMVision: Oracle Hybrid Cloud Solutions
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
 
#PCMVision Customer Day Presentation Slides
 

Recently uploaded (20)

PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Introduction to Effective Communication.pptx
PPTX
Effective_Handling_Information_Presentation.pptx
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Primary and secondary sources, and history
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Project and change Managment: short video sequences for IBA
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
fundraisepro pitch deck elegant and modern
PPTX
Relationship Management Presentation In Banking.pptx
_ISO_Presentation_ISO 9001 and 45001.pptx
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Hydrogel Based delivery Cancer Treatment
Learning-Plan-5-Policies-and-Practices.pptx
Introduction to Effective Communication.pptx
Effective_Handling_Information_Presentation.pptx
Swiggy’s Playbook: UX, Logistics & Monetization
Impressionism_PostImpressionism_Presentation.pptx
The Effect of Human Resource Management Practice on Organizational Performanc...
oil_refinery_presentation_v1 sllfmfls.pdf
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
Emphasizing It's Not The End 08 06 2025.pptx
Primary and secondary sources, and history
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Project and change Managment: short video sequences for IBA
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
fundraisepro pitch deck elegant and modern
Relationship Management Presentation In Banking.pptx

#PCMVision: VMware NSX - Transforming Security

  • 1. © 2014 VMware Inc. All rights reserved. Paul Penn - ppenn@vmware.com Sales Director Western US Garrett Kray- krayg@vmware.com Security Specialist Network and Security Business Unit VMware NSX Transforming Security
  • 2. VMware – Who we are…  Headquartered in Palo Alto • Campus the size of Disneyland  Over $25 billion in revenues  17 years old  Over 55,000 partners worldwide  ~17,800 employees worldwide  Fastest Software Company in history to grow to $5 billion in sales (and did it with one product)  Corporate Mascot: Turtle
  • 3. VMware Software Defined Enterprise 3 Policy-based Management & Automation Cloud Automation Cloud Operations Cloud Business Software-Defined Data Center Private Clouds Public Clouds vCHS Virtualized Infrastructure Abstract & Pool Applications End User Computing Desktop Mobile Virtual Workspace Modern SaaSTraditional Compute Network Security Storage Availability vSphere NSX vSAN SRM vCenter Server vCenter Automation Center (VCAC) vCenter Operations (vCOPS) ITBM Horizon Workspace Horizon View Horizon Mirage
  • 4. Agenda 1 SDDC/NSX Overview 2 The Killer Use Case // Micro-segmentation 3 Current Customers and Benchmarks 4 VMware AppDefense 4Confidential
  • 5. IT’S TIME FOR A NEW IT APPROACH SLOW TECHNOLOGY ADOPTION RATES HIGH USER EXPECTATIONS SLOW REPONSES PRIVACY ISSUES INTEGRATION PROBLEMS SERVICE OUTAGES SHORTAGE OF RIGHT SKILLS DECLINING BUDGET DIFFERENT APPLICATIONS AGING INFRASTRUCTURE SECURITY PROLIFERATION OF DEVICES FRAGMENTED DATA CENTER LIMITED RESOURCES CLOUD SILOS SECURITY PROLIFERATION OF DEVICES FRAGMENTED DATA CENTER CLOUD SILOS
  • 6. We are in the 3rd fundamental structural transition in the history of IT Client Server Cloud/MDM/SDDC We are here Mainframe Mainframe PC Revolution Client/Server Cloud Cloud • Mobile Devices & Clouds (public & private) • Software Defined • Local Applications • Minor role for networking • Desktops & Servers • Campus Networks • Data Centers
  • 7. What Is a Software-Defined Data Center (SDDC)? 7 Hardware Software Data center virtualization layer Pooled compute, network, and storage capacity Vendor independent, best price/performance/service Simplified configuration and management Intelligence in software Operational model of VM for data center Automated provisioning and configuration CONFIDENTIAL
  • 8. NSX value proposition Network virtualization is at the core of the software- defined data center approach Network, storage, compute Virtualization layer 8CONFIDENTIAL
  • 9. Network and security services now in the hypervisor Switching Routing Firewalling/ACLs Load balancing East-west firewalling High throughput rates Hardware independent The Next-generation Networking Model 9CONFIDENTIAL
  • 10. NSX value proposition Network, storage, compute Virtualization layer “Network platform” Virtual networks 10CONFIDENTIAL
  • 11. 11 SECURITY Architecting security as an inherent part of the data center infrastructure Network Virtualization How is it being used today? AUTOMATION Automating IT processes to deliver IT at the speed of business APPLICATION CONTINUITY Enabling applications and data to reside and be accessible anywhere CONFIDENTIAL
  • 12. CONFIDENTIAL 12 Transforming Security with Micro-segmentation
  • 13. Increased Security Spending Has Not Decreased Breaches CONFIDENTIAL 13 IT Spend Security Spend Security Breaches Annual Cost of Security Breaches: $445B (Source: Center for Strategic and International Studies) Security as a Percentage of IT Spend: 2012: 11% 2015: 21 % (Source: Forrester) Projected Growth Rate in IT Spend from 2014-2019: Zero (Flat) (Source: Gartner)
  • 14. Digital makes reliance on data lucrative for thieves Security investments are increasing, yet the cost of breaches are rising faster 14 Underfunding security isn’t the problem.
  • 15. Improved Data Center Network Security Perimeter-centric network security has proven insufficient, and HW micro-segmentation is operationally infeasible Little or no lateral controls inside perimeter Internet Internet Traditional Edge FW NSX dFW
  • 16. 16 Web App DB VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM Security Micro-segmentation | Secure End User | DMZ Anywhere Granular Policy Enforcement Enables zero trust security model with policy enforced at every workload
  • 17. CONFIDENTIAL 17 3rd Party Service Insertion with NSX
  • 18. Advanced Services Insertion – Example: Palo Alto Networks NGFW Internet Security Policy Security Admin Traffic Steering
  • 19. Public Cloud Provider Your Data Center Your IT Governance VMware on AWS powered by NSX
  • 20. Coalfire Benchmark Report CONFIDENTIAL 20 • Does VMware NSX functionally satisfy NIST recommendations? • Are the precepts of micro- segmentation, as defined in the complete definition, satisfied conceptually and in testing by NSX? • Can real-world threats be stopped by NSX in E-W and N-S, using industry- standard Penetration Testing tools?
  • 21. Expanding Security to Scale with the Business Columbia Sportswear continues to stay ahead of competitors and threats by combining advanced, automated security inside the data center. “There just wasn’t a great way to insert security in order to address east-west traffic between VMs, nor have the security tied to the applications as they moved around dynamically.” John Spiegel Network Manager Columbia Sportswear
  • 23. Abstraction layer between infrastructure and apps 23 We call this the “Goldilocks Zone” We can use this zone to transform endpoint detection and response Hypervisor AppDefense NSX Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 24. Hypervisor IT provisions a new app 1 Visibility and context into application lifecycle 24 Automated collection of intended state across app lifecycle IT provisions a change to the app 3 AppDefense notes the change 4 AppDefense collects intended state of the app 2 AppDefense NSX Insert security into DevOps process VMware AppDefense
  • 25. Hypervisor Automated detection & response 25 Compare intended state against run-time state to detect deviations Automate response through vSphere and NSX: • Quarantine • Modify security policy • Increase logging AppDefense NSX Attacker compromise s an app 1 AppDefense automatically responds 2 Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 26. Hypervisor AppDefense NSX Isolation from attack surface 26 Isolated environment to monitor and control all endpoints AppDefense itself is protected from attacks Attacker compromise s an app 1 AppDefense is protected from the attack surface 2 Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 27. “Simple works, especially in InfoSec…I can sleep easy at night knowing that when AppDefense detects a problem, it will respond automatically.” Brad Doctor Senior Director, Information Security VMware VMware’s Information Security team uses AppDefense in our SOC to protect the critical security systems that secure our business applications. VMware Information Security – Case Study

Editor's Notes

  • #3: Fulfilling our vision to empower people and organizations has made VMware the industry-leading virtualization software company. More than 500,000 customers, from small and midsize companies to large enterprises—including 99 percent of Fortune 500 and 100 percent of Fortune Global 100 companies—use VMware technologies and services. More than 55,000 partners, including technology and consulting partners, top distributors and resellers, and system vendors and integrators, help provide customers with freedom and choice. Through the broadest set of cloud service provider partners—more than 10,000 of them—VMware is making the hybrid cloud a reality. VMware stays close to customers with offices in more than 100 countries. Innovation begins with the more than 13,000 VMware employees.
  • #19: Let’s quickly look at how this advanced insertion works, using Palo Alto Networks as an example… Panorama, the Palo Alto Network management console, registers with the NSX Controller. The Controller then distributes the Palo Alto Networks VM Series application to each hypervisor in the SDDC virtualization layer. Then, security policies are created and connected to the NSX firewall policies and VMs are provisioned, If the workloads policy requires the advanced feature set and deep packet inspection offered by the Palo Alto next gen firewall the NSX firewalling steers traffic into the Palo Alto Networks VM. And, if the VMs move, the NSX platform automates moving the security policies with it.
  • #21: OBJECTIVES OF THIS COALFIRE NSX MICRO-AUDIT VMware NSX-based micro-segmentation purports to meet all four of these recommendations. Coalfire Systems’ testing of the NSX product during this “micro-audit” intends to examine the form and function of NSX to determine the following: 􏰀  Does VMware NSX functionally satisfy NIST SP 800-125B recommendations VM-FW-R1, VM- FW-R2, VM-FW-R3 and VM-FW-R4? 􏰀  Are the precepts of micro-segmentation, as defined in the complete definition, satisfied conceptually and in testing by NSX? 􏰀  Can real-world threats be stopped by NSX in E-W (peer transits on the L2 network) and N-S (network to network transits via L3), using industry-standard Penetration Testing tools? Based on the determination of these three objectives, Coalfire will also render an opinion on the potential suitability of the VMware NSX product to deliver effective security controls to real-world legacy and emerging virtualized software-defined data centers.
  • #29: Q&A