{"id":10356,"date":"2017-11-08T08:00:03","date_gmt":"2017-11-08T16:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4129\/"},"modified":"2017-11-08T08:00:03","modified_gmt":"2017-11-08T16:00:03","slug":"news-4129","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4129\/","title":{"rendered":"3 Reasons to Use VMware NSX with Trend Micro\u2122 Deep Discovery\u2122"},"content":{"rendered":"<p><strong>Credit to Author: Dhanya Thakkar| Date: Wed, 08 Nov 2017 15:11:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Enterprises have begun adopting network virtualization for their IT infrastructure. According to <a href=\"https:\/\/www.accenture.com\/us-en\/insight-enterprise-network-virtualization\">a 2016 survey conducted by Accenture<\/a>, 95 percent of small, medium, and large enterprises believe \u201cnetwork services will be virtualized.\u201d Meanwhile, 25 percent of those who have adopted network virtualization have already seen cost reductions.<\/p>\n<p>Why has network virtualization suddenly become the hot topic for organizations? A lot of the attention is due to the benefits that enterprises are seeing with network virtualization. Network virtualization delivers flexibility and agility, whether it\u2019s to create a brand new (virtual) network, deploy applications or recover from hardware failure.<\/p>\n<p><strong>Security gaps in virtualization<\/strong><\/p>\n<p>We all know that cybercriminals are an agile, resilient, and increasingly well-resourced bunch. What this means is that they have been able to take advantage of the gaps that exist in many poorly-secured virtual environments to attack VMs and steal the organizational crown jewels.<\/p>\n<p>In this context, traditional perimeter approaches to security are woefully outdated. For one thing, they allow inter-VM attacks. This tactic is favored by targeted attackers who typically infiltrate one virtual machine and then move laterally inside a data center to others until they find what they\u2019re looking for, often barely stopped by any internal security controls.<\/p>\n<p>Additionally, manual security configuration and patching remains one of the biggest areas of exposure for corporations as hackers are quick to exploit any holes they\u00a0can find. And the dynamic nature of today\u2019s data centers makes keeping up with basic\u00a0security even more difficult as workloads are spun up and down and security policies have to be moved or reconfigured with the workloads.<\/p>\n<p><strong>Right tools for the right job<\/strong><\/p>\n<p>The VMware NSX networking and security platform combined with\u00a0Trend Micro\u2122 Deep Discovery\u2122 builds on security in the Software-Defined Data Center to deliver a new level of\u00a0data center security. The integration of Trend Micro Deep Security with NSX extends Trend Micro\u2019s security services platform including anti-malware, firewall, intrusion detection\/prevention (IDS\/IPS), web application protection, and integrity monitoring to the software-defined data center, enabling customers to leverage combined strengths for superior security and automation.<\/p>\n<p>The key benefits of this integrated solution from Trend Micro and VMware include:<\/p>\n<p><strong>SECURITY &#8211; Providing elastic protection and scalability<\/strong><\/p>\n<p>The joint solution extends micro-segmentation\u2014isolation of virtual clusters of workloads, even to the individual VM level, via distributed firewalling made possible by NSX. Deep Security extends micro segmentation via multiple security controls including IDS\/IPS, anti-malware, virtual patching, URL filtering, file integrity monitoring, and log inspection. This means not only can the workloads be locked down, but they can be locked down multiple ways from a single platform, achieving a layered security approach that\u2019s flexible depending on the needs of a given workload. This approach reduces the attack surface within the data center vs. perimeter security.<\/p>\n<p><strong>SPEED AND AGILITY &#8211; Automated deployment and provisioning<\/strong><\/p>\n<p>Deep Security has long offered network and endpoint introspection through vSphere with the ability to easily provision existing and new virtual machines (VMs). New integration capabilities delivered through NSX automation and Service Composer will further streamline the provisioning and deployment processes, making insertion, orchestration, and scaling of Deep Security significantly faster and easier across your data center.<\/p>\n<p><strong>OPERATIONAL EFFICIENCY &#8211; Automating workflow across protection layers<\/strong><\/p>\n<p>Through the use of a new common NSX tagging and orchestration framework, Deep Security services can be inserted as part of an automated, defined workflow for each security group, which is configured in NSX. The user can then decide to create an automated remediation process for each workload or group. This could be used to automate real-time remediation and incident response during attacks. The degree of automation reduces risk of human error in the configuration process and prevents proliferation of threats that do appear in the data center by isolating them and removing them once detected.<\/p>\n<p><strong>Next-gen security framework<\/strong><\/p>\n<p>With thousands of successful customer deployments worldwide, Trend Micro Deep Security has proven it improves security, manageability, scalability, and VM density. Trend Micro has received numerous accolades and recognition for virtualization security, including IDC\u2019s #1 ranking in market share for server security (which includes virtualization and cloud\u00a0security) since 2009.<\/p>\n<p>The VMware NSX platform represents the latest step forward, demonstrating VMware and\u00a0Trend Micro\u2019s commitment to design the ideal next-gen security framework for today\u2019s\u00a0virtualized and cloud environments.<\/p>\n<p><em>Join us at vForum 2017 happening across Asia, including Singapore (14 November), Indonesia and Malaysia (21 November) and the Philippines (28 November). For inquiries or to learn more about Trend Micro, send us an email at <a href=\"mailto:vmware@trendmicro.com\">vmware@trendmicro.com<\/a>\u00a0Trend Micro will talk about securing your virtual environments at vForum 2017 in Asia-Pacific this month. Drop by our booth to learn how Trend Micro technologies can secure potential blind spots in virtualization. We hope you will also attend our vForum sessions \u201cAutomated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security,\u201d wherein we discuss <\/em><em>how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection.<\/em><\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/3-reasons-use-vmware-nsx-trend-micro-deep-discovery\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Dhanya Thakkar| Date: Wed, 08 Nov 2017 15:11:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Enterprises have begun adopting network virtualization for their IT infrastructure. According to a 2016 survey conducted by Accenture, 95 percent of small, medium, and large enterprises believe \u201cnetwork services will be virtualized.\u201d Meanwhile, 25 percent of those who have adopted network virtualization have already seen cost reductions. Why has network virtualization suddenly become the hot&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714,11758],"class_list":["post-10356","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security","tag-virtualization"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10356"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10356\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}