Technology is now central to transforming government, creating opportunities for better services, bigger efficiencies, and a lower operations cost. As agencies shift to software-defined infrastructure, VMware’s specialized portfolio of services for government is essential to moving productivity forward without compromising security, value, and IT simplicity.
Combined with the deep micro-segmentation NSX facilitates, Intel Security’s McAfee Virtual Network Security Platform (vNSP) helps secure diverse networks and workloads. While NSX provides the micro-segmentation that makes resources easier to manage and secure, McAfee vNSP automates security policy distribution to apply advanced threat discovery and signature-less inspection technologies to critical east-west traffic. It all adds up to tough zero trust security that’s easy to build and manage.
If your perimeter defenses fail, would you know? It took organizations an average of 205 days to detect lateral data center threats, and almost 70% of those breaches were detected by a third party running a service inside the network. * By exploiting aging, disparate defenses, these threats directly target high-profile applications and connections — and VMware and Intel Security can help, combining the very best in east-west intrusion detection with the deep dependability of micro-segmentation.
* Mandiant. M-Trends® 2015: A View From the Frontlines | Web
NSX confronts lateral threats with zero trust security - all traffic is considered untrusted until policy proves otherwise. A user or connection authorized for one connection can’t automatically access another just because they’ve breached perimeter defenses. As agency networks stretch to support everything from mobility workforce to the rapidly growing Internet of Things, only VMware simplicity and a zero trust approach to security can protect the important daily work of government.
Intel Security’s McAfee Virtual Network Security Platform automates this robust protection while also extending the data center’s threat-detection capabilities to the perimeter. Ultimately, this means the data center is now secured against east-west and north-south threat traffic.