US
1-877-486-9273
Communities
Store
Login
My VMware
Partner Connect
VMware Glossary
Contact Sales
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Advanced Persistent Threat
Allowlisting
Application Management
Application Migration
Application Modernization
Application Monitoring
Application Release Automation (ARA)
Application Security
Application Virtualization
B
Bare metal hypervisor
Behavioral Analysis
Big Data Analytics
Bring Your Own Device (BYOD)
Business Continuity
Business Continuity Application
Business Continuity Plan
Business Mobility
C
Cloud
Cloud Architecture
Cloud Automation
Cloud Computing Infrastructure
Cloud Cost Management
Cloud Economics
Cloud Infrastructure Management
Cloud Management
Cloud Migration
Cloud Networking
Cloud ROI
Cloud Scalability
Cloud Security
Cloud Server
Cloud TCO
Components of Kubernetes
Container Deployment
Container Management
Container Networking
Container Orchestration
Container Security
Containerization Strategy
Containers
Converged Infrastructure
Cyber Espionage
Cyber Threat Hunting
D
Data Center
Data Center Extension
Data Center Migration
Data Center Networking
Data Center Operations
Data Center Security
Data Center Solutions
Denylisting
Desktop as a Service (DaaS)
Desktop Management
Desktop Virtualization
DevOps
Digital Transformation
Digital Workplace
Disaster Recovery
Disaster Recovery as a Service (DRaaS)
Distributed Workforce
E
Employee Experience Management
End User Computing
Endpoint Protection Platform
Endpoint Security
Enterprise Cloud Suite
Enterprise Mobility
Enterprise Networking
Enterprise Security
F
Federated Network
Future Ready Cloud
H
Hybrid Cloud
Hybrid Cloud Architecture
Hybrid Cloud Infrastructure
Hybrid Cloud Management
Hybrid Cloud Networking
Hybrid Cloud Security
Hybrid Cloud Storage
Hybrid Cloud Strategy
Hybrid cloud vs. Multi-cloud
Hybrid Infrastructure Services
Hyperconverged Storage
Hyperconvergence
Hypervisor
I
Identity Management
Incident Response
Infrastructure as Code
Intent-based Networking
Internal Firewall
Internet of Things (IoT)
Intrusion Prevention System
IT Automation
IT Operations Management
K
Kubernetes
Kubernetes Architecture
Kubernetes Cluster
Kubernetes Deployment
Kubernetes Infrastructure
Kubernetes Monitoring
Kubernetes Namespace
Kubernetes Networking
Kubernetes Pods
Kubernetes Security
Kubernetes Services
L
Log Management
M
Malware
Micro-Segmentation
Microservices
Mobile Device Management
Mobile Device Security
Multi-Cloud
Multi-Cloud Management
N
Network Access Control
Network Analytics
Network Automation
Network Configuration
Network Convergence
Network Functions Virtualization (NFV)
Network Infrastructure Security
Network Security
Network Segmentation
Network Virtualization
Next-Generation Antivirus
Next-Generation Firewall
O
OpenStack API
P
Perimeter Firewall
Private Cloud
Private Cloud Solutions
Private Cloud vs. Public Cloud
Public Cloud
R
Ransomware
Remote first
Remote Work
Remote Work Security
Remote Workforce Management
S
SD-WAN
SecOps
Server Virtualization
Service Mesh
Software Load Balancing
Software-Defined Networking (SDN)
Software-Defined Storage
Storage Area Network (SAN)
T
Telco Cloud
Threat Intelligence
U
Unified Endpoint Management (UEM)
V
Virtual Desktop
Virtual Desktop Infrastructure (VDI)
Virtual Desktop Infrastructure Security
Virtual Infrastructure
Virtual Machine
Virtual Networking
Virtualized Security
VMs vs Containers
W
Windows for Mac
Workload Protection
X
XDR (Extended Detection and Response)
Z
Zero Trust
Zero-trust Security
Cookie Settings