Quantcast
Channel: Network and Security Virtualization
Browsing all 481 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Achieve Multi-Cloud Application Scalability for Modern Apps

The modern application is dynamic and highly adaptive to changes in demand. It lives across multiple clusters and clouds. And it is highly distributed with hundreds of microservices servicing the...

View Article


Network, It’s Time to Modernize!

The network is a critical component of any IT environment. When it works, it’s “normal” and few notice it. But the smallest glitch can have devastating business impacts.  For over a decade, networking...

View Article


Threat Intelligence Report: Targeted Snake Ransomware

In the last few weeks, VMware NSX threat telemetry revealed the submission of a Windows executable Ransomware sample, written in Go, which is related to the Snake Ransomware family. This ransomware...

View Article

Image may be NSFW.
Clik here to view.

Encrypted VelvetSweatshop Password Still a Threat to Excel Files

Office documents, such as Word and Excel files, can be password-protected using a symmetric key encryption mechanism involving one password which is the key to both encrypt and decrypt a file. Malware...

View Article

Advanced Threat Intelligence Begins with Network Visibility

The current reality has pushed users, applications, and data to the edge of the network —where traditional perimeter security solutions have historically fallen short. Threat actors know this, of...

View Article


VMware is Not New to Enterprise Security

By: Keith Luck None of us can stop thinking about how 2020 has changed the way we go about our daily tasks. Going to school, going to the store, going out to eat — going anywhere at all. But now, for...

View Article

Securing Modern Applications

Modern applications are changing enterprise security. Apps today are comprised of dozens, or even hundreds, of microservices. They can be spun up and down in real time and may span multiple clouds...

View Article

Image may be NSFW.
Clik here to view.

NSX-T Data Center Migration Coordinator – Modular Migration

NSX-T 3.1 For a point release, VMware NSX-T 3.1 is packed with a bunch of major features. One of these is modular migration, which is making its debut with this release. Customers had asked for an...

View Article


Explore VMware’s Virtual Cloud Network Vision with Tom Gillis

The past year has been filled with challenges. It’s been difficult to adapt to the new realities of how we work, how users access applications, and how we build out and scale our network...

View Article


Operationalizing Advanced East-West Security at Scale in the Datacenter

East-west security is the new battleground for keeping enterprises safe from malicious actors. As we all know, perimeters will be breached. That’s a given. The massive scale of data center...

View Article

Adapt Business Agility with Modern Load Balancing

It’s no secret that enterprises are rapidly automating the modern network across compute, storage, and network environments. What you may not know is that load balancing is being left behind....

View Article

Image may be NSFW.
Clik here to view.

Phorpiex-Powered BitRansomware Targets APAC Universities

By: Jason Zhang, Stefano Ortolani – VMware Threat Analysis Unit BitRansomware (also known as DCryptSoft or Readme) is a — you guessed it — ransomware program that first surfaced in July 2020. Initially...

View Article

Image may be NSFW.
Clik here to view.

Declare Your Application State with Tanzu Service Mesh

YES! You can declare your application resiliency state and keep it like that with a combination of Kubernetes and the new application resiliency capabilities in Tanzu Service Mesh. First things first:...

View Article


Navigating Supply-Chain Vulnerabilities with a Zero-Trust Architecture

In light of the SolarWinds breach, we want to help our customers who may have questions on how a Zero Trust Architecture can act as an effective approach to limit the impact of such attacks. VMware has...

View Article

Image may be NSFW.
Clik here to view.

Protecting Workloads with Global Network Backing Using Site Recovery Manager

Many thanks to Dimitri Desmidt from VMware, NSBU for providing the Design details of Multi-Location and Federation. Preface Starting NSX-T version 3.0.2 workloads with NSX-T global network backing (L2...

View Article


Image may be NSFW.
Clik here to view.

How to Lift and Shift Migrate with NSX-T Data Center Migration Coordinator

What’s New in NSX-T 3.1.1  VMware NSX-T 3.1.1 is a minor release that’s packed with features, particularly features that enable migration from NSX for vSphere to NSX-T Data Center. One of these is a...

View Article

Image may be NSFW.
Clik here to view.

Death of Emotet: The Takedown of The Emotet Infrastructure

By Stefano Ortolani and Giovanni Vigna Cybercrime campaigns can last days or months, but the malicious actors behind them can be active for years.  As it’s often difficult to have first-hand...

View Article


Image may be NSFW.
Clik here to view.

Introducing HCX 4.0: Migration Event Details and Estimation, In-Service...

VMware HCX is indeed a swiss army knife — a mobility platform with several options to streamline and optimize workload migrations between on-premises and VMC-based environments. HCX delivers secure,...

View Article

Attend Future:NET 2021 – A Premier Networking Event

What is Future:NET?  Sponsored by VMware, Future:NET 2021 is the premier thought leadership event on networking of the year. Scheduled for March 23 in AMER and March 24 in EMEA and APJ, the event will...

View Article

Image may be NSFW.
Clik here to view.

Phishing Detection Using Perceptual Hashes

What are phishing attacks?  Phishing attacks have become more prominent and prevalent in recent years. In particular, our research into the cyber threat landscape over the last few months has shown a...

View Article
Browsing all 481 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>