Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public cloud environments."
Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and services.
Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.
Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud challenge.
Give developers the flexibility to use any app framework and tooling for a secure, consistent and fast path to production on any cloud.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Operate apps and infrastructure consistently, with unified governance and visibility into performance and costs across clouds.
Empower your employees to be productive from anywhere, with secure, frictionless access to enterprise apps from any device.
Run enterprise apps and platform services at scale across public and telco clouds, data centers and edge environments.
Get on a Faster Path to Prod
Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster.
Simplify Kubernetes Operations
Build and operate a secure, multi-cloud container infrastructure at scale.
Pair with App Development Experts
Unlock value by modernizing your existing apps and building innovative new products.
Build, run, secure, and manage all of your apps across any cloud with application modernization solutions and guidance from VMware.
11 Security Practices to Manage Container Lifecycle
Get recommended practices for DevSecOps teams that desire a more modern app methodology.
Connect and Run with Confidence
Reduce time-to-value, lower costs, and enhance security while modernizing your private and public cloud infrastructure.
Enhance Digital Experiences
Securely, reliably, and optimally connect applications in the cloud and at the edge to deliver unique experiences.
Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments.
VMware Research: Multi-Cloud Strategies
Learn why enterprises find multi-cloud strategies critical for success.
Deliver an Engaging Experience
Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences.
Secure Today’s Anywhere Workspace
Ease the move to Zero Trust with situational intelligence and connected control points.
Automate the Workspace
Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management.
Enable any employee to work from anywhere, anytime with seamless employee experiences.
Remote Work Is No Longer Optional
Shift from supporting remote work to becoming an anywhere organization.
Secure & Connect Workloads
Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.
Protect APIs — the New Endpoints
Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside.
Be Future-Ready
Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Protect Your Multi-Cloud Environments
Discover the unique characteristics of malware and how to stay ahead of attacks.
Work with a VMware Partner
Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers.
Become a Partner
Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers.
With thousands of partners worldwide, we are positioned to help customers scale their business, drive innovation and transform their customer experience.
Working Together with Partners for Customer Success
See how we work with a global partner to help companies prepare for multi-cloud.
The SolarWinds breach is prompting security leaders from all industries to reevaluate their overall security posture. Read VMware’s analysis and updated insights on the breach.
The SolarWinds breach reveals how companies in the global digital supply chain will continue to be targeted for compromise. This is an instance of a sophisticated attack deployed by nation state actors for the purpose of espionage and disruption. It raised the bar in terms of stealth and sophistication as it provided direct access to a multitude of organizations across the globe. This attack was especially hard to detect because the backdoor resided in software that was digitally signed and delivered to customers via a software update.
The SolarWinds breach is a wakeup call for organizations around the world. Many organizations must reevaluate their strategies and tactics for protecting critical applications and data.
Enabling Zero Trust with an Intrinsic Security Approach
Attacks like the SolarWinds breach remind organizations to assume there is already a compromise somewhere in their environment. Organizations need to adopt a ’Zero Trust’ model that is realized by leveraging controls at four strategic points that surround critical applications and data: people, endpoints, workloads and networks. It is imperative that these control points align with each other via shared visibility and analytics leading to the ultimate goal of coordinated automation and orchestration.
The challenge with achieving Zero Trust in an efficient and effective manner stems from the constraints of a bolt-on model with many different point tools, a lack of context, and siloes between security and IT teams. An intrinsic security approach, which leverages your multi-cloud and mobile infrastructure, can improve the overall effectiveness of your security program. Advantages include:
For a more detailed perspective on VMware’s approach to Zero Trust and Intrinsic Security, click the video to the right to hear from Sanjay Poonen, COO at VMware.
VMware’s Intrinsic Security approach also leads to improved cyber hygiene at each of the above control points which should be an imperative for any security program.
Keep systems up to date and consistently maintained. Any critical system that is out of date is a meaningful security risk.
Verify users and system components using multiple factors (not just simple passwords) and according to the risk associated with the requested access or function.
Allow users only the minimum necessary access needed to perform their job and nothing more. System components should be allowed only the minimum necessary function required.
Divide the whole IT environment into smaller parts to make it more manageable to protect and contain the damage if one part gets compromised.
Encrypt all data, whether stored or transmitted. In the event of a data breach, critical files should only result in unreadable data.
Finally, it is imperative to implement behavior-based approaches for prevention, detection and response. The new breed of sophisticated attacks will not be addressed with legacy anti-malware solutions. Attacks that leverage legitimate software, like the SolarWinds breach, require behavior-based approaches for prevention, detection and response.
VMware delivers a set of solutions for each of these control points that can work in accord and leverage existing infrastructure for a stronger, more intrinsic approach to Zero Trust:
We will continue to update these resources as the SolarWinds situation evolves. Check back for additional recommendations and analysis.