Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public cloud environments."
Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and services.
Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.
Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud challenge.
Get on a Faster Path to Prod
Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster.
Simplify Kubernetes Operations
Build and operate a secure, multi-cloud container infrastructure at scale.
Pair with App Development Experts
Unlock value by modernizing your existing apps and building innovative new products.
Connect and Run with Confidence
Reduce time-to-value, lower costs, and enhance security while modernizing your private and public cloud infrastructure.
Enhance Digital Experiences
Securely, reliably, and optimally connect applications in the cloud and at the edge to deliver unique experiences.
Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments.
Deliver an Engaging Experience
Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences.
Secure Today’s Anywhere Workspace
Ease the move to Zero Trust with situational intelligence and connected control points.
Automate the Workspace
Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management.
Secure & Connect Workloads
Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.
Protect APIs — the New Endpoints
Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside.
Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Work with a VMware Partner
Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers.
Become a Partner
Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers.
COVID-19 has exacerbated preexisting cyberthreats, from counter incident response and island hopping to lateral movement and destructive attacks. These attacks are ratcheting up existing geopolitical tensions.
Organizations, most of which depend on VPNs and other traditional network security infrastructure, may not be prepared. Stopping today’s increasingly sophisticated cyberattacks, whether they’re COVID-19-related or not, will mean adopting next generation IR strategies.
We hope that in this, the fifth installment of VMware Carbon Black’s semiannual Global Incident Response Threat Report, you’ll find a clearer picture of the evolving threat landscape as well as actionable guidance for today, tomorrow and the challenging months to come.
53% of IR professionals we surveyed encountered or observed an increase in cyberattacks exploiting COVID-19.
“Security teams now have to manage remote security configurations and provide real-time prevention rule updates to a slew of new, remote endpoints. In the absence of a cloud infrastructure for security, how do you rapidly deploy additional security to users? Improve investigations and endpoint visibility? Track unwanted configurations? These are challenges they face regardless of COVID-19, but the stakes are now higher for these common challenges amid global disruption.” – Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon Black
VPNs, which many organizations rely on for protection, have become increasingly vulnerable amid COVID-19, according to more than 60% of respondents. As such, it may be cause for concern that the average update cycle for software patches and security configurations on VPNs tends to occur on a weekly (or less frequent) basis.
As far as other new vulnerabilities go, IR professionals point to the use of IoT technologies, personal devices like iPhones and iPads, and web conferencing applications – all of which are increasingly in professional use as work moves remote and the corporate perimeter breaks down.
For instance, respondents said that 27% of incidents during the 90 days prior to the survey took advantage of IoT-related vulnerabilities.
Like lateral movement, about a third of respondents saw an attack that used island hopping.
Forty percent of attacks that used island hopping spread destructive malware in the process.
* All fields are required.