Security Services

VMware Zero Trust Readiness Assessment

  • Assess people, process, and VMware technology based on NIST 800-53v4  standard, in order to improve your Zero Trust Architecture.
  • Create a detailed gap analysis to demonstrate possible vulnerabilities within the environment.
  • Design a roadmap with prescriptive recommendations to achieve your outcomes and move you towards a Zero Trust Architecture. 

Endpoint Security

  • Help protect endpoints against malicious attacks, including malware, ransomware, zero day, and non-malware attacks.
  • Deploy Endpoint Detection and Response (EDR) and enable quarantine capabilities for endpoints.
  • Consolidate security capabilities to reduce alert fatigue.
  • Create policy mappings.

Workload Security

  • Reduce risk by hardening your datacenter and reducing attack surfaces.
  • Design and deploy Next Generation Anti-Virus (NGAV).
  • Create application isolation using segmentation. 
  • Configure rules and policies for your workload.

Network Security

  • Develop and implement security groups and policies to protect control points.
  • Create isolation using network segmentation and web application firewalls (WAF).
  • Develop allow lists that follow a Zero Trust architecture.

Access and Identity

  • Provide access and identity management, including laptops and mobile phones.
  • Ensure users access and identity protection with a data loss prevention policies and deployment of the software.
  • Design and deploy single sign-on with multi-factor and/or SAML authentications.

Security Operations

  • Ensure business continuity, while optimizing people and processes.
  • Design a security decisions tree, align security objectives with the correct permissions and roles, and design responder workflows.
  • Create personalized dashboards and tracking, in order to find ways to help the customer use the data and insights in actionable ways. 

Integration and Automation

  • Integrate Carbon Black Workload automations with sensor provisioning and updates, policy enforcement, and user/group management into your environment.
  • Develop custom remediation automations with targeted threat hunting, background scans and quarantining.
  • Design incident response automation with workload network isolation utilizing NSX.  


  • Ensure an accurate, and successful migration.
  • Import watch lists and security profiles, migrating automations, assisting in integrations, and providing guidance on redirecting sensors.

Health Checks

  • Examine the components and configurations supporting your production environment.
  • Gauge the effectiveness of your security system.
  • Validate your configuration and determine scalability.

Other Professional Services


Deliver a public cloud experience

Anywhere Workspace

Achieve inspiring and productive employee experiences


Create software-defined networks and WANS and secure your apps and data

App Modernization

Services to support the evolution of your app strategy