VMware NSX Bare Metal Edge Performance
Every cloud environment is rooted in virtualization and is defined by three pillars: network virtualization, server virtualization, and storage virtualization. The VMware NSX Edge Node plays an...
View ArticleNSX V2T Layer 2 Bridging with NSX-T Projects
When it comes to migration from one infrastructure to another, there are always complexities and risks involved. Finding the most appropriate approach is key to successful delivery of desired outcomes,...
View ArticleVPC: The Secure Bridge Between Application and Infrastructure Teams
The Cloud operating model is all about simplicity—bringing the agility of public clouds together with the security and control that enterprises have traditionally placed importance on. The fundamental...
View ArticleMigration Coordinator – Selecting the migration mode
Migration Coordinator is a fully supported free tool, that is built into NSX Data Center, that is designed to help customers migrating from NSX for vSphere to NSX (aka NSX-T). NSX-T 2.4, was the first...
View ArticleGenerative AI Meets Cybersecurity: Use Cases for Lateral Security and the SOC
With security, the battle between good and evil is always a swinging pendulum. Traditionally, the shrewdness of the attack has depended on the skill of the attacker and the sophistication of the...
View ArticleOptimizing NSX Performance Based on Workload and ROI
Optimizing NSX Performance Based on Workload Overview Performance tuning, in general, requires a holistic view of the application traffic profiles, features leveraged and the criteria for performance...
View ArticleCybersecurity, Cloud and AI: Top-of-mind themes heading into 2024
Recently I had the opportunity to host a group of forward-thinking CISOs, CIOs and other executive decision makers drawn from several enterprise organizations in the United States. The goal was to...
View ArticleNext-Level Lateral Security for Your Private Cloud
Cyber attacks are growing in frequency and complexity. And at an average cost of $4.35M1, data breaches are no joke. With Generative AI, this threat will grow even further—equipping even an...
View ArticleTackling the 5Cs of Enterprise Security with the Advent of AI – Spotlight on...
For the traditional enterprise, the last decade has been an ongoing saga in the journey to cloud. This either moving workloads into the public cloud or embracing a cloud-operating model within their...
View ArticleLateral Security for the Private Cloud – Leveraging the Power of Seamless...
Because modern threats are distributed and multi-varied, protecting against them cannot be accomplished through a series of point security solutions. Recently, there are discussions happening in the...
View Article