Detect Malicious Behavior Across The Network
Operationalize East/West Security
Behavioral analysis on east/west traffic across multi-cloud environments radically closes the security gap for lateral movement tactics defined by the MITRE ATT&CK.
NTA sensors are built directly into the hypervisor for a completely tapless architecture—easing deployment while eliminating hairpinning.
Accelerate Time to Respond
Threats detected by NTA are correlated into attack campaigns with the context you need for rapid triage and response.
Advanced AI Models
Apply supervised and unsupervised ML to detect network protocol and traffic anomalies and differentiate between real threats and false positives.
Distribute NTA as a Service
VMware distributes NTA directly on the hypervisor, essentially virtualizing the entire security stack, making security intrinsic to the infrastructure.
Encrypted Traffic Analysis
Leverage VMware’s machine learning models that operate directly on encrypted traffic to identify malicious communication without the need to inspect any payload.
Gain Authoritative Context
VMware gives you more than alerts. Gain full authoritative context of your environment and threat intelligence that is trustworthy, actionable and readily available.
Eliminate Network Changes
Deliver security as a built-in, distributed service by replacing NTA appliance-based solutions with a software-based architecture that is built directly into the hypervisor and distributed to each host.
Proactive Prevention, Detection, and Response
Prevent lateral movement and exfiltration of data by inspecting every packet for anomalous, advanced, and zero-day attacks across your East-West traffic.
Obtain Broader Threat Visibility
Provide your security team with the highest level clarity when monitoring networking events. NTA ensures your team is best positioned to take action driven by visibility, depth, and accuracy of data collection.
Detect Threats On Encrypted Traffic
VMware pioneered an innovative approach of building models that operate directly on encrypted traffic to identify malicious communication without the need to inspect any payload.