Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/3/2015
11:40 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

VMware Expands NSX Platform Security

VMware is working to add network encryption as a distributed service via its network virtualization platform.

Security has been messy and complicated, where the investment in numerous security products bolted onto servers and network infrastructure isn't paying off in increased protection, VMware CEO Pat Gelsinger said in his keynote at this week's VMworld.

Gelsinger and other VMware executives pushed virtualization and its NSX platform as a way to tackle the security problem.

"Virtualization provides the fundamental requirement allowing us to architect for security," by allowing precise and dynamic binding of security services to applications, data and users, he said. "Now we can truly architect in security....Architected-in security allows us to be twice as secure at half the price."

VMware has said that security has been a top use case for its NSX network virtualization platform with its micro-segmentation capabilities. This week, the company provided a view into additional security services its engineers are developing in NSX, specifically network encryption.

For the full article, see Network Computing.

 

Marcia Savage is the managing editor for Network Computing, and has been covering technology for 15 years. She has written and edited for CRN and spent several years covering information security for SC Magazine and TechTarget. Marcia began her journalism career in daily ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jinumadhavan
50%
50%
jinumadhavan,
User Rank: Apprentice
9/4/2015 | 12:42:25 AM
its a good news
now days security has the first preferance many of them are cracked during less security . the big companies are invest a big amount for add security inb their networks so the VM going to the rioght paths anyway thanks for the good news 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13616
PUBLISHED: 2020-05-26
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
CVE-2020-13614
PUBLISHED: 2020-05-26
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.
CVE-2020-13615
PUBLISHED: 2020-05-26
lib/QoreSocket.cpp in Qore before 0.9.4.2 lacks hostname verification for X.509 certificates.
CVE-2020-9046
PUBLISHED: 2020-05-26
A vulnerability in all versions of Kantech EntraPass Editions could potentially allow an authorized low-privileged user to gain full system-level privileges by replacing critical files with specifically crafted files.
CVE-2020-12388
PUBLISHED: 2020-05-26
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.