SlideShare a Scribd company logo
© 2014 VMware Inc. All rights reserved.
Paul Penn - ppenn@vmware.com
Sales Director Western US
Garrett Kray- krayg@vmware.com
Security Specialist
Network and Security Business Unit
VMware NSX
Transforming Security
VMware – Who we are…
 Headquartered in Palo Alto
• Campus the size of Disneyland
 Over $25 billion in revenues
 17 years old
 Over 55,000 partners worldwide
 ~17,800 employees worldwide
 Fastest Software Company in
history to grow to $5 billion in
sales (and did it with one
product)
 Corporate Mascot: Turtle
VMware Software Defined Enterprise
3
Policy-based
Management &
Automation
Cloud Automation Cloud Operations Cloud Business
Software-Defined Data Center
Private
Clouds
Public
Clouds
vCHS
Virtualized Infrastructure
Abstract & Pool
Applications
End User
Computing
Desktop Mobile
Virtual Workspace
Modern SaaSTraditional
Compute Network Security Storage Availability
vSphere NSX vSAN SRM
vCenter Server
vCenter Automation Center (VCAC)
vCenter Operations
(vCOPS)
ITBM
Horizon Workspace
Horizon View
Horizon Mirage
Agenda
1 SDDC/NSX Overview
2 The Killer Use Case // Micro-segmentation
3 Current Customers and Benchmarks
4 VMware AppDefense
4Confidential
IT’S TIME FOR A NEW IT APPROACH
SLOW TECHNOLOGY
ADOPTION RATES
HIGH USER
EXPECTATIONS
SLOW
REPONSES
PRIVACY
ISSUES
INTEGRATION
PROBLEMS
SERVICE
OUTAGES
SHORTAGE
OF RIGHT
SKILLS
DECLINING BUDGET
DIFFERENT
APPLICATIONS AGING INFRASTRUCTURE
SECURITY
PROLIFERATION
OF DEVICES
FRAGMENTED
DATA CENTER
LIMITED
RESOURCES
CLOUD SILOS
SECURITY
PROLIFERATION
OF DEVICES
FRAGMENTED
DATA CENTER
CLOUD SILOS
We are in the 3rd fundamental structural transition in the history of IT
Client Server Cloud/MDM/SDDC
We are here
Mainframe
Mainframe
PC Revolution
Client/Server
Cloud
Cloud
• Mobile Devices & Clouds
(public & private)
• Software Defined
• Local Applications
• Minor role for networking
• Desktops & Servers
• Campus Networks
• Data Centers
What Is a Software-Defined Data Center (SDDC)?
7
Hardware
Software
Data center virtualization layer
Pooled compute, network, and storage capacity
Vendor independent, best price/performance/service
Simplified configuration and management
Intelligence in software
Operational model of VM for data center
Automated provisioning and configuration
CONFIDENTIAL
NSX value proposition
Network virtualization is at
the core of the software-
defined data center
approach
Network, storage, compute
Virtualization layer
8CONFIDENTIAL
Network and
security services
now in the
hypervisor
Switching
Routing Firewalling/ACLs
Load balancing
East-west firewalling
High throughput rates
Hardware independent
The Next-generation Networking Model
9CONFIDENTIAL
NSX value proposition
Network, storage, compute
Virtualization layer
“Network platform”
Virtual networks
10CONFIDENTIAL
11
SECURITY
Architecting security as an inherent part of the
data center infrastructure
Network Virtualization
How is it being used today?
AUTOMATION
Automating IT processes to deliver IT at the
speed of business
APPLICATION CONTINUITY
Enabling applications and data to reside and
be accessible anywhere
CONFIDENTIAL
CONFIDENTIAL 12
Transforming Security with Micro-segmentation
Increased Security Spending Has Not Decreased Breaches
CONFIDENTIAL 13
IT Spend Security Spend Security Breaches
Annual Cost of Security
Breaches: $445B
(Source: Center for Strategic and
International Studies)
Security as a
Percentage of IT Spend:
2012: 11%
2015: 21 %
(Source: Forrester)
Projected Growth Rate in
IT Spend from 2014-2019:
Zero (Flat)
(Source: Gartner)
Digital makes reliance on data lucrative for thieves
Security investments are increasing, yet the cost of breaches are rising faster
14
Underfunding security
isn’t the problem.
Improved Data Center Network Security
Perimeter-centric network security has proven insufficient, and HW micro-segmentation is operationally infeasible
Little or no
lateral controls
inside perimeter
Internet Internet
Traditional Edge FW NSX dFW
16
Web App DB
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
VMVM
Security
Micro-segmentation | Secure End User | DMZ Anywhere
Granular Policy Enforcement
Enables zero trust security model with
policy enforced at every workload
CONFIDENTIAL 17
3rd Party Service Insertion with NSX
Advanced Services Insertion – Example: Palo Alto Networks NGFW
Internet
Security Policy
Security Admin
Traffic
Steering
Public Cloud Provider
Your Data Center
Your IT Governance
VMware on AWS powered by NSX
Coalfire Benchmark Report
CONFIDENTIAL 20
• Does VMware NSX functionally
satisfy NIST recommendations?
• Are the precepts of micro-
segmentation, as defined in the
complete definition, satisfied
conceptually and in testing by NSX?
• Can real-world threats be stopped by
NSX in E-W and N-S, using industry-
standard Penetration Testing tools?
Expanding Security to Scale with
the Business
Columbia Sportswear continues to stay ahead
of competitors and threats by combining
advanced, automated security inside the data
center.
“There just wasn’t a great
way to insert security in order
to address east-west traffic
between VMs, nor have the
security tied to the
applications as they moved
around dynamically.”
John Spiegel
Network Manager
Columbia Sportswear
CONFIDENTIAL 22
VMware AppDefense
Abstraction layer between infrastructure and apps
23
We call this the
“Goldilocks Zone”
We can use this zone
to transform endpoint
detection and response
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
Hypervisor
IT
provisions a
new app
1
Visibility and context into application lifecycle
24
Automated collection
of intended state
across app lifecycle
IT provisions a
change to the app
3
AppDefense
notes the change
4
AppDefense
collects intended
state of the app
2
AppDefense
NSX
Insert security into
DevOps process
VMware AppDefense
Hypervisor
Automated detection & response
25
Compare intended state
against run-time state
to detect deviations
Automate response
through vSphere
and NSX:
• Quarantine
• Modify security policy
• Increase logging
AppDefense
NSX
Attacker
compromise
s an app
1
AppDefense
automatically
responds
2
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
Hypervisor
AppDefense
NSX
Isolation from attack surface
26
Isolated environment
to monitor and control
all endpoints
AppDefense itself is
protected from attacks
Attacker
compromise
s an app
1
AppDefense is
protected from the
attack surface
2
Hypervisor
AppDefense
NSX
Hypervisor
AppDefense
NSX
VMware AppDefense
“Simple works, especially in
InfoSec…I can sleep easy at night
knowing that when AppDefense
detects a problem, it will respond
automatically.”
Brad Doctor
Senior Director, Information Security
VMware
VMware’s Information
Security team uses
AppDefense in our SOC to
protect the critical security
systems that secure our
business applications.
VMware Information Security – Case Study
Thank you

More Related Content

What's hot (20)

PDF
Machine Learning in the Enterprise 2019
Timothy Spann
 
PPTX
Big data journey to the cloud 5.30.18 asher bartch
Cloudera, Inc.
 
PPTX
Get started with Cloudera's cyber solution
Cloudera, Inc.
 
PPTX
Introduction to ibm cloud paks concept license and minimum config public
Petchpaitoon Krungwong
 
PPTX
Big data journey to the cloud rohit pujari 5.30.18
Cloudera, Inc.
 
PPTX
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Andrew Miller
 
PDF
Cloud analytics for dummies
Ramachandran Mahalingam
 
PPTX
RapidScale CloudApps
RapidScale
 
PDF
WP VERITAS InfoScale Storage and Dockers Intro - v8
Rajagopal Vaideeswaran
 
PDF
Predictable Business Continuity for Amazon Web Services
Veritas Technologies LLC
 
PPTX
PaaS or Fail: Rule the Cloud with Altus
Cloudera, Inc.
 
PDF
Blockchain and Apache NiFi
Timothy Spann
 
PDF
Cloudian and Rubrik - Hybrid Cloud based Disaster Recovery
Cloudian
 
PPTX
Cloudera - The Modern Platform for Analytics
Cloudera, Inc.
 
PPTX
Cloud and azure and rock and roll
David Giard
 
PPTX
How Data Drives Business at Choice Hotels
Cloudera, Inc.
 
PPTX
Introducing Cloudera DataFlow (CDF) 2.13.19
Cloudera, Inc.
 
PPTX
A Journey to a Serverless Business Intelligence, Machine Learning and Big Dat...
DataWorks Summit
 
PDF
Modern big data and machine learning in the era of cloud, docker and kubernetes
Slim Baltagi
 
PDF
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Lustratus REPAMA
 
Machine Learning in the Enterprise 2019
Timothy Spann
 
Big data journey to the cloud 5.30.18 asher bartch
Cloudera, Inc.
 
Get started with Cloudera's cyber solution
Cloudera, Inc.
 
Introduction to ibm cloud paks concept license and minimum config public
Petchpaitoon Krungwong
 
Big data journey to the cloud rohit pujari 5.30.18
Cloudera, Inc.
 
MGT3342BUS - Architecting Data Protection with Rubrik - VMworld 2017
Andrew Miller
 
Cloud analytics for dummies
Ramachandran Mahalingam
 
RapidScale CloudApps
RapidScale
 
WP VERITAS InfoScale Storage and Dockers Intro - v8
Rajagopal Vaideeswaran
 
Predictable Business Continuity for Amazon Web Services
Veritas Technologies LLC
 
PaaS or Fail: Rule the Cloud with Altus
Cloudera, Inc.
 
Blockchain and Apache NiFi
Timothy Spann
 
Cloudian and Rubrik - Hybrid Cloud based Disaster Recovery
Cloudian
 
Cloudera - The Modern Platform for Analytics
Cloudera, Inc.
 
Cloud and azure and rock and roll
David Giard
 
How Data Drives Business at Choice Hotels
Cloudera, Inc.
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Cloudera, Inc.
 
A Journey to a Serverless Business Intelligence, Machine Learning and Big Dat...
DataWorks Summit
 
Modern big data and machine learning in the era of cloud, docker and kubernetes
Slim Baltagi
 
Cloud Computing Without The Hype An Executive Guide (1.00 Slideshare)
Lustratus REPAMA
 

Similar to #PCMVision: VMware NSX - Transforming Security (20)

PDF
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
PPTX
Nsx security deep dive
solarisyougood
 
PDF
VMworld 2014: Introduction to NSX
VMworld
 
PDF
NSX on VMware Data Center
Angel Villar Garea
 
PPTX
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
PDF
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld
 
PDF
Moving Forward with Network Virtualization (VMware NSX)
VMware
 
PPTX
NSX 9 Core Use Cases
Kevin Groat
 
PPTX
20150311 NSX update 301
Kevin Groat
 
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld
 
PDF
Business Agility and Security with VMware
Angel Villar Garea
 
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Jürgen Ambrosi
 
PPTX
Reston Virtualization Group 9-18-2014
VMwareJenn
 
PPTX
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld
 
PDF
Infographic: Why Businesses are Adopting Network Virtualization
VMware
 
PDF
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld
 
PPTX
VMware 2015: Next Horizon for Cloud Networking and Security
VMworld
 
PDF
Arrow VMware NSX Infographic
SolutionStation
 
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld
 
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
Nsx security deep dive
solarisyougood
 
VMworld 2014: Introduction to NSX
VMworld
 
NSX on VMware Data Center
Angel Villar Garea
 
nsx overview with use cases 1.0
Ploynatcha Akkaraputtipat
 
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld
 
Moving Forward with Network Virtualization (VMware NSX)
VMware
 
NSX 9 Core Use Cases
Kevin Groat
 
20150311 NSX update 301
Kevin Groat
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld
 
Business Agility and Security with VMware
Angel Villar Garea
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Jürgen Ambrosi
 
Reston Virtualization Group 9-18-2014
VMwareJenn
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld
 
Infographic: Why Businesses are Adopting Network Virtualization
VMware
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMworld
 
Arrow VMware NSX Infographic
SolutionStation
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld
 
Ad

More from PCM (19)

PPTX
PCM Vision 2019 Breakout: HPI
PCM
 
PPTX
PCM Vision 2019 Breakout: Dell
PCM
 
PPTX
PCM Vision 2019 Breakout: Cisco
PCM
 
PPTX
PCM Vision 2019 Keynote: Todd Pekats
PCM
 
PPTX
PCM Vision 2019 Keynote: Jeff Crume
PCM
 
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
PPTX
PCM Vision 2019 Breakout: Veritas
PCM
 
PPTX
PCM Vision 2019 Keynote: Elliot Baretz
PCM
 
PPTX
PCM Vision 2019 Breakout: Quest Software
PCM
 
PPTX
PCM Vision 2019 Breakout: Samsung
PCM
 
PPTX
PCM Vision 2019 Breakout: Symantec
PCM
 
PPTX
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
PPTX
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM
 
PPTX
PCM Vision 2019 Breakout: VMWare
PCM
 
PPTX
PCM Vision 2019 Breakout: Zebra
PCM
 
PPTX
#PCMVision: Real-Time Collaboration: Intel Unite
PCM
 
PDF
#PCMVision: Oracle Hybrid Cloud Solutions
PCM
 
PPTX
#PCMVision: HPE Family: Numble Storage and SimpliVity
PCM
 
PPTX
#PCMVision Customer Day Presentation Slides
PCM
 
PCM Vision 2019 Breakout: HPI
PCM
 
PCM Vision 2019 Breakout: Dell
PCM
 
PCM Vision 2019 Breakout: Cisco
PCM
 
PCM Vision 2019 Keynote: Todd Pekats
PCM
 
PCM Vision 2019 Keynote: Jeff Crume
PCM
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
PCM Vision 2019 Breakout: Veritas
PCM
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM
 
PCM Vision 2019 Breakout: Quest Software
PCM
 
PCM Vision 2019 Breakout: Samsung
PCM
 
PCM Vision 2019 Breakout: Symantec
PCM
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM
 
PCM Vision 2019 Breakout: VMWare
PCM
 
PCM Vision 2019 Breakout: Zebra
PCM
 
#PCMVision: Real-Time Collaboration: Intel Unite
PCM
 
#PCMVision: Oracle Hybrid Cloud Solutions
PCM
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
PCM
 
#PCMVision Customer Day Presentation Slides
PCM
 
Ad

Recently uploaded (20)

PDF
COSHH - Sri Ramachandar Bandi HSE in the Oil & Gas Industry (COSHH) Training ...
babufastdeals
 
PPTX
Introduction_to_Python_Presentation.pptx
vikashkumargaya5861
 
PPTX
Diversity in tech, the missing link to great software.
Ramona Domen
 
PPTX
The Brain Behind Your Device: A Deep Dive into Operating Systems
vanshshah1920
 
PPTX
India Energy and Utility Sector Landscape
Anand Akshay
 
PPTX
presentations in the cyber security with ai
srinivasuluk211
 
PDF
Exploring User Perspectives on Data Collection, Data Sharing Preferences, and...
Daniela Napoli
 
PPTX
A Power Point Presentaion of 2 test match
katarapiyush21
 
PPTX
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
PDF
Helpful but Terrifying: Older Adults' Perspectives of AI in Remote Healthcare...
Daniela Napoli
 
PPTX
The Waiting Time Sermon Delivered at SDA CHURCH.pptx
HumphreyAgala
 
PPTX
Applied Stats for Real-Life Decisions.pptx
khalyaniramjan49
 
PDF
Something I m waiting to tell you By Shravya Bhinder
patelprushti2007
 
PPTX
2025-07-20 Abraham 08 (shared slides).pptx
Dale Wells
 
PPTX
Patient with Upper & Lower GI bleeding .pptx
bdmlwb701
 
PPTX
milgram study as level psychology core study (social approach)
dinhminhthu1405
 
PDF
Securing Africa’s future: Technology, culture and the changing face of threat
Kayode Fayemi
 
PPTX
Enterprise Asset Management Overview with examples
ManikantaBN1
 
PPTX
“Mastering Digital Professionalism: Your Online Image Matters”
ramjankhalyani
 
PDF
Chapter-52-Relationship-between-countries-at-different-levels-of-development-...
dinhminhthu1405
 
COSHH - Sri Ramachandar Bandi HSE in the Oil & Gas Industry (COSHH) Training ...
babufastdeals
 
Introduction_to_Python_Presentation.pptx
vikashkumargaya5861
 
Diversity in tech, the missing link to great software.
Ramona Domen
 
The Brain Behind Your Device: A Deep Dive into Operating Systems
vanshshah1920
 
India Energy and Utility Sector Landscape
Anand Akshay
 
presentations in the cyber security with ai
srinivasuluk211
 
Exploring User Perspectives on Data Collection, Data Sharing Preferences, and...
Daniela Napoli
 
A Power Point Presentaion of 2 test match
katarapiyush21
 
Rotary_Fundraising_Overview_Updated_new video .pptx
allangraemeduncan
 
Helpful but Terrifying: Older Adults' Perspectives of AI in Remote Healthcare...
Daniela Napoli
 
The Waiting Time Sermon Delivered at SDA CHURCH.pptx
HumphreyAgala
 
Applied Stats for Real-Life Decisions.pptx
khalyaniramjan49
 
Something I m waiting to tell you By Shravya Bhinder
patelprushti2007
 
2025-07-20 Abraham 08 (shared slides).pptx
Dale Wells
 
Patient with Upper & Lower GI bleeding .pptx
bdmlwb701
 
milgram study as level psychology core study (social approach)
dinhminhthu1405
 
Securing Africa’s future: Technology, culture and the changing face of threat
Kayode Fayemi
 
Enterprise Asset Management Overview with examples
ManikantaBN1
 
“Mastering Digital Professionalism: Your Online Image Matters”
ramjankhalyani
 
Chapter-52-Relationship-between-countries-at-different-levels-of-development-...
dinhminhthu1405
 

#PCMVision: VMware NSX - Transforming Security

  • 1. © 2014 VMware Inc. All rights reserved. Paul Penn - [email protected] Sales Director Western US Garrett Kray- [email protected] Security Specialist Network and Security Business Unit VMware NSX Transforming Security
  • 2. VMware – Who we are…  Headquartered in Palo Alto • Campus the size of Disneyland  Over $25 billion in revenues  17 years old  Over 55,000 partners worldwide  ~17,800 employees worldwide  Fastest Software Company in history to grow to $5 billion in sales (and did it with one product)  Corporate Mascot: Turtle
  • 3. VMware Software Defined Enterprise 3 Policy-based Management & Automation Cloud Automation Cloud Operations Cloud Business Software-Defined Data Center Private Clouds Public Clouds vCHS Virtualized Infrastructure Abstract & Pool Applications End User Computing Desktop Mobile Virtual Workspace Modern SaaSTraditional Compute Network Security Storage Availability vSphere NSX vSAN SRM vCenter Server vCenter Automation Center (VCAC) vCenter Operations (vCOPS) ITBM Horizon Workspace Horizon View Horizon Mirage
  • 4. Agenda 1 SDDC/NSX Overview 2 The Killer Use Case // Micro-segmentation 3 Current Customers and Benchmarks 4 VMware AppDefense 4Confidential
  • 5. IT’S TIME FOR A NEW IT APPROACH SLOW TECHNOLOGY ADOPTION RATES HIGH USER EXPECTATIONS SLOW REPONSES PRIVACY ISSUES INTEGRATION PROBLEMS SERVICE OUTAGES SHORTAGE OF RIGHT SKILLS DECLINING BUDGET DIFFERENT APPLICATIONS AGING INFRASTRUCTURE SECURITY PROLIFERATION OF DEVICES FRAGMENTED DATA CENTER LIMITED RESOURCES CLOUD SILOS SECURITY PROLIFERATION OF DEVICES FRAGMENTED DATA CENTER CLOUD SILOS
  • 6. We are in the 3rd fundamental structural transition in the history of IT Client Server Cloud/MDM/SDDC We are here Mainframe Mainframe PC Revolution Client/Server Cloud Cloud • Mobile Devices & Clouds (public & private) • Software Defined • Local Applications • Minor role for networking • Desktops & Servers • Campus Networks • Data Centers
  • 7. What Is a Software-Defined Data Center (SDDC)? 7 Hardware Software Data center virtualization layer Pooled compute, network, and storage capacity Vendor independent, best price/performance/service Simplified configuration and management Intelligence in software Operational model of VM for data center Automated provisioning and configuration CONFIDENTIAL
  • 8. NSX value proposition Network virtualization is at the core of the software- defined data center approach Network, storage, compute Virtualization layer 8CONFIDENTIAL
  • 9. Network and security services now in the hypervisor Switching Routing Firewalling/ACLs Load balancing East-west firewalling High throughput rates Hardware independent The Next-generation Networking Model 9CONFIDENTIAL
  • 10. NSX value proposition Network, storage, compute Virtualization layer “Network platform” Virtual networks 10CONFIDENTIAL
  • 11. 11 SECURITY Architecting security as an inherent part of the data center infrastructure Network Virtualization How is it being used today? AUTOMATION Automating IT processes to deliver IT at the speed of business APPLICATION CONTINUITY Enabling applications and data to reside and be accessible anywhere CONFIDENTIAL
  • 12. CONFIDENTIAL 12 Transforming Security with Micro-segmentation
  • 13. Increased Security Spending Has Not Decreased Breaches CONFIDENTIAL 13 IT Spend Security Spend Security Breaches Annual Cost of Security Breaches: $445B (Source: Center for Strategic and International Studies) Security as a Percentage of IT Spend: 2012: 11% 2015: 21 % (Source: Forrester) Projected Growth Rate in IT Spend from 2014-2019: Zero (Flat) (Source: Gartner)
  • 14. Digital makes reliance on data lucrative for thieves Security investments are increasing, yet the cost of breaches are rising faster 14 Underfunding security isn’t the problem.
  • 15. Improved Data Center Network Security Perimeter-centric network security has proven insufficient, and HW micro-segmentation is operationally infeasible Little or no lateral controls inside perimeter Internet Internet Traditional Edge FW NSX dFW
  • 16. 16 Web App DB VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM VMVM Security Micro-segmentation | Secure End User | DMZ Anywhere Granular Policy Enforcement Enables zero trust security model with policy enforced at every workload
  • 17. CONFIDENTIAL 17 3rd Party Service Insertion with NSX
  • 18. Advanced Services Insertion – Example: Palo Alto Networks NGFW Internet Security Policy Security Admin Traffic Steering
  • 19. Public Cloud Provider Your Data Center Your IT Governance VMware on AWS powered by NSX
  • 20. Coalfire Benchmark Report CONFIDENTIAL 20 • Does VMware NSX functionally satisfy NIST recommendations? • Are the precepts of micro- segmentation, as defined in the complete definition, satisfied conceptually and in testing by NSX? • Can real-world threats be stopped by NSX in E-W and N-S, using industry- standard Penetration Testing tools?
  • 21. Expanding Security to Scale with the Business Columbia Sportswear continues to stay ahead of competitors and threats by combining advanced, automated security inside the data center. “There just wasn’t a great way to insert security in order to address east-west traffic between VMs, nor have the security tied to the applications as they moved around dynamically.” John Spiegel Network Manager Columbia Sportswear
  • 23. Abstraction layer between infrastructure and apps 23 We call this the “Goldilocks Zone” We can use this zone to transform endpoint detection and response Hypervisor AppDefense NSX Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 24. Hypervisor IT provisions a new app 1 Visibility and context into application lifecycle 24 Automated collection of intended state across app lifecycle IT provisions a change to the app 3 AppDefense notes the change 4 AppDefense collects intended state of the app 2 AppDefense NSX Insert security into DevOps process VMware AppDefense
  • 25. Hypervisor Automated detection & response 25 Compare intended state against run-time state to detect deviations Automate response through vSphere and NSX: • Quarantine • Modify security policy • Increase logging AppDefense NSX Attacker compromise s an app 1 AppDefense automatically responds 2 Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 26. Hypervisor AppDefense NSX Isolation from attack surface 26 Isolated environment to monitor and control all endpoints AppDefense itself is protected from attacks Attacker compromise s an app 1 AppDefense is protected from the attack surface 2 Hypervisor AppDefense NSX Hypervisor AppDefense NSX VMware AppDefense
  • 27. “Simple works, especially in InfoSec…I can sleep easy at night knowing that when AppDefense detects a problem, it will respond automatically.” Brad Doctor Senior Director, Information Security VMware VMware’s Information Security team uses AppDefense in our SOC to protect the critical security systems that secure our business applications. VMware Information Security – Case Study

Editor's Notes

  • #3: Fulfilling our vision to empower people and organizations has made VMware the industry-leading virtualization software company. More than 500,000 customers, from small and midsize companies to large enterprises—including 99 percent of Fortune 500 and 100 percent of Fortune Global 100 companies—use VMware technologies and services. More than 55,000 partners, including technology and consulting partners, top distributors and resellers, and system vendors and integrators, help provide customers with freedom and choice. Through the broadest set of cloud service provider partners—more than 10,000 of them—VMware is making the hybrid cloud a reality. VMware stays close to customers with offices in more than 100 countries. Innovation begins with the more than 13,000 VMware employees.
  • #19: Let’s quickly look at how this advanced insertion works, using Palo Alto Networks as an example… Panorama, the Palo Alto Network management console, registers with the NSX Controller. The Controller then distributes the Palo Alto Networks VM Series application to each hypervisor in the SDDC virtualization layer. Then, security policies are created and connected to the NSX firewall policies and VMs are provisioned, If the workloads policy requires the advanced feature set and deep packet inspection offered by the Palo Alto next gen firewall the NSX firewalling steers traffic into the Palo Alto Networks VM. And, if the VMs move, the NSX platform automates moving the security policies with it.
  • #21: OBJECTIVES OF THIS COALFIRE NSX MICRO-AUDIT VMware NSX-based micro-segmentation purports to meet all four of these recommendations. Coalfire Systems’ testing of the NSX product during this “micro-audit” intends to examine the form and function of NSX to determine the following: 􏰀  Does VMware NSX functionally satisfy NIST SP 800-125B recommendations VM-FW-R1, VM- FW-R2, VM-FW-R3 and VM-FW-R4? 􏰀  Are the precepts of micro-segmentation, as defined in the complete definition, satisfied conceptually and in testing by NSX? 􏰀  Can real-world threats be stopped by NSX in E-W (peer transits on the L2 network) and N-S (network to network transits via L3), using industry-standard Penetration Testing tools? Based on the determination of these three objectives, Coalfire will also render an opinion on the potential suitability of the VMware NSX product to deliver effective security controls to real-world legacy and emerging virtualized software-defined data centers.
  • #29: Q&A