Using Skyline Automation Toolkit to Remediate…

Using Skyline Automation Toolkit to Remediate Your Skyline Findings Using Skyline Automation Toolkit to Remediate… Tweet As you know, Skyline Advisor Pro is essential to enhance the health of your virtual infrastructure. It provides proactive insights to avoid your problem before disaster occurs. If a problem does occur and Service Request (SR) is created, the […]

Ransomware Attacks and Techniques – Analysis…

Ransomware Attacks and Techniques – Analysis from VMware Threat Report Ransomware Attacks and Techniques – Analysis… Ransomware attacks are evolving to target Linux-based cloud environments and often combine data exfiltration and double-extortion tactics, according to Exposing Malware in Linux-Based Multi-Cloud Environments, a VMware Threat Analysis Unit report. This post highlights some key analysis of recent […]

Micro-segmentation and Beyond with NSX Firewall

Micro-segmentation and Beyond with NSX Firewall Micro-segmentation and Beyond with NSX Firewall VMware-based workload environments are the norm in private clouds for enterprise-class customers. 100%[1] of Fortune 500 companies deploy vSphere/ESXi. Further, ~99% of Fortune 1000 and ~98%[2] of Forbes Global 2000 companies deploy vSphere/ESXi. VMware’s deep presence in enterprise private clouds has made NSX […]

PowerCLI – Where do I start from?

PowerCLI – Where do I start from? PowerCLI – Where do I start from? PowerCLI is a tool that millions of our customers use. Kamen Nikolov, R&D Manager, is walking you through some resources that can help you ramp up quickly with PowerCLI. Learn More: https://www.youtube.com/watch?v=rUWDEy30d-I #PowerShell #VMare #PowerCLI VMware Social Media Advocacy

Mitigating Security Risk in the Cloud(s)

Mitigating Security Risk in the Cloud(s) Mitigating Security Risk in the Cloud(s) Is your cloud security posture keeping you awake at night? The promise of DevSecOps is security that is inherent to every phase of the application lifecycle. This means that security processes are incorporated earlier, commonly called “shift left” security. This implies that security […]