Registration Is Now Live for VMware Explore
Discover the center of the multi-cloud universe August 29 – September 1.
VMware Contexa, the VMware Threat Intelligence Cloud
VMware Contexa™ sees what others don’t, powering VMware Security to stop threats others can’t.
Deliver Native Visibility and Analytics at Scale
Drive Data Center–Wide Visibility
Visualize and gain deep insights into all flows across the entire data center with stateful layer 7 inspection and complete workload context, eliminating security blind spots and accelerating incident remediation.
Converge Your Security Ops
Slash tool sprawl and ramp up collaboration between infrastructure and security teams by embedding security operations consoles, firewall policy recommendations, and management within the NSX UI.
Eliminate the network overhead of duplicating packets — and the complexity of managing large centralized appliances — with an analytics engine that’s built right into the hypervisor.
The Advantages of An Intrinsic Approach to Analytics
Natively Built Into NSX
Comprehensive Layer 7 Packet Inspection
Complete Workload Context
Automate Network and Micro-Segmentation
Simplify operationalizing segmentation with a seamless user experience that combines automated firewall policy recommendations, iterative policy workflows, and real-time visualization of application dependencies and security policies.
Simplify Security Incident Troubleshooting
Get detailed drill-down topology visualization within the NSX console with complete inventory and meta-data of every workload, continuous layer 7 analysis of every flow without sampling, eliminating any blind-spots in security visibility.
Demonstrate and Maintain Policy Compliance
Rely on a complete record of every flow, from every workload, with continuous analysis. Overlay policies against actual flows to highlight misconfigurations, policy exceptions, and non-compliant flows between workloads or security scopes.
Enhance Protection Against Lateral Movement
Proactively detect anomalous behavior in network traffic patterns with built-in detection for classic attack techniques such as network scans, exfiltration over alternate protocols, mismatched application layer protocols, etc.