Transform the economics of network and security operations

November 30, 2015

Cyber threats today are coordinated attacks that often include months of reconnaissance, vulnerability exploits, and “sleeper” malware agents that can lie dormant until activated by remote control. Despite increasing types of protection at the edge of data centre networks — including firewalls, intrusion prevention systems, and network-based malware detection — attacks are succeeding in penetrating the perimeter, and breaches continue to occur. 1

Micro-segmentation enables organisations to logically divide the data centre into distinct security segments down to the individual workload level, and then define security controls and deliver services for each unique segment. 1

The primary issue is that once an attack gets past the data centre perimeter, there are few lateral controls to prevent threats from traversing inside the network. The best way to solve this is to adopt a stricter, micro-granular security model with the ability to tie security to individual workloads and the agility to provision policies automatically. 1

Click on the image below to view an interesting and informative summary video. Nice work VMware.

1 Microsegmentation For Dummies®, VMware Special Edition. Copyright © 2015 by John Wiley & Sons, Inc., Hoboken, New Jersey

Call: 1800 777 111