1
is the average amount of time it takes to detect & contain a breach. 2 was the average cost of a data center outage in 2016. 3 VMware shrinks the application attack surface by delivering consistent, intrinsic security from the data center, to the cloud, to the edge. • VMware NSX ® Technologies: Enable micro-segmentation on the network to prevent the lateral spread of threats. • VMware AppDefense : Enforces application intended state and behavior on data center endpoint. • VMware vSphere ® and VMware vSAN : Deliver at-rest data encryption. Download the White Paper Core Principles of Cyber Hygiene > Join Us Online: LEARN MORE $740,357 257 DAYS 5 WAYS TO SECURE APPLICATIONS WHEREVER THEY LIVE MODERN APPLICATIONS ARE VULNERABLE TO HACKERS AND MALWARE. Launching a cyberattack is easier than ever, and security losses are on the rise. 5 WAYS VMWARE SECURES THE APPLICATION INFRASTRUCTURE . Intrinsic security. Applications and data are secured by default, which eliminates the gaps caused by point solutions. Ubiquitous app visibility. Application-layer communications and dependencies are visible across public, private, and hybrid clouds. Reduced attack surface. Micro-segmentation and least-privilege principles shrink the available surface of applications and data. Consistent security from data center to cloud to edge. A unified, automated platform helps to secure the entire infrastructure, with one policy defined and enforced throughout. Isolation from the threat surface. Built-in security helps to prevent attackers from turning off controls. HARDENING THE DATA CENTER PERIMETER IS NO LONGER ENOUGH. APPS ARE AGILE. SO ARE THE THREATS CHASING THEM. In today’s hyper-connected world, apps are widely distributed across locations, clouds, and branch networks—making the attack surface larger and adding more risk. To complicate things, applications and data are continually on the move. Sophisticated and targeted attack vectors, methodologies, and technologies can exploit apps and data. “To create a more secure network, companies must restructure their infrastructure in a way that allows all data to be protected regardless of where it sits in the network.” — Forrester Research, Enabling Zero Trust Security Through Network Virtualization and Micro-Segmentation, 2018 surveyed in a recent study are pursuing network virtualization and micro-segmentation as a key strategic security initiative. 4 75% OF ORGANIZATIONS Legacy security technologies can’t stop threats from spreading laterally after they’ve breached the data center perimeter. Bolted-on security technologies that require manual deployment and configuration can’t keep pace with dynamic, distributed applications. A modern approach to security must be just as ubiquitous and agile as the applications themselves. rise in data center outages between 2010 and 2016. 1 2% TO 22% 1, 3 Cost of Data Center Outages, Ponemon Institute, January 2016 2 Cost of Data Center Outages, Ponemon Institute, June 2017 4 Forrester Research, Enabling Zero Trust Security Through Network Virtualization and Micro-Segmentation, 2018 VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2018 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: TS-0501_VM_SAI-Infographic 07/18

5 Ways to Secure Applications Wherever They Live...2010 and 2016.1 2% TO 22% 1, 3 Cost of Data Center Outages, Ponemon Institute, January 2016 2 Cost of Data Center Outages, Ponemon

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 5 Ways to Secure Applications Wherever They Live...2010 and 2016.1 2% TO 22% 1, 3 Cost of Data Center Outages, Ponemon Institute, January 2016 2 Cost of Data Center Outages, Ponemon

is the average amount of time it takes to detect & contain a breach.2

was the average cost of a data center outage in 2016.3

VMware shrinks the application attack surface by delivering consistent, intrinsic security from the data center, to the cloud, to the edge.

• VMware NSX® Technologies: Enable micro-segmentation on the network to prevent the lateral spread of threats.

• VMware AppDefense™: Enforces application intended state andbehavior on data center endpoint.

• VMware vSphere® and VMware vSAN™: Deliver at-rest data encryption.

Download the White PaperCore Principles of Cyber Hygiene >

Join Us Online:

LEARN MORE

$740,357 257 DAYS

5 WAYS TO SECUREAPPLICATIONSWHEREVERTHEY LIVE

MODERN APPLICATIONS ARE VULNERABLE TO HACKERS AND MALWARE.Launching a cyberattack is easier than ever, and security losses are on the rise.

5 WAYS VMWARE SECURES THE APPLICATION INFRASTRUCTURE.

Intrinsic security. Applications and data are secured by default, which eliminates the gaps caused by point solutions.

Ubiquitous app visibility. Application-layer communications and dependencies are visible across public, private, and hybrid clouds.

Reduced attack surface. Micro-segmentation and least-privilege principles shrink the available surface of applications and data.

Consistent security from data center to cloud to edge. A unified, automated platform helps to secure the entire infrastructure, with one policy defined and enforced throughout.

Isolation from the threat surface. Built-in security helps to prevent attackers from turning o� controls.

HARDENING THE DATA CENTER PERIMETER IS NO LONGER ENOUGH.

APPS ARE AGILE. SO ARE THE THREATSCHASING THEM.

In today’s hyper-connected world, apps are widely distributed across locations, clouds, and branch networks—making the attack surface larger and adding more risk.

To complicate things, applications and data are continually on the move.

Sophisticated and targeted attack vectors, methodologies, and technologies can exploit apps and data.

“To create a more secure network, companies must restructure their infrastructure in a way that allows all data to be protected regardless of where it sits in the network.”

— Forrester Research, Enabling Zero Trust Security Through Network Virtualization and Micro-Segmentation, 2018

surveyed in a recent study are pursuing network virtualization and micro-segmentation as a key strategic security initiative.4

75% OF ORGANIZATIONS

Legacy security technologies can’t stop threats from spreading laterally after they’ve breached the data center perimeter.

Bolted-on security technologies that require manual deployment and configuration can’t keep pace with dynamic, distributed applications.

A modern approach to security must be just as ubiquitous and agile as the applications themselves.

rise in data center outages between 2010 and 2016.1

2% TO 22%

1, 3 Cost of Data Center Outages, Ponemon Institute, January 20162 Cost of Data Center Outages, Ponemon Institute, June 20174 Forrester Research, Enabling Zero Trust Security Through Network Virtualization and Micro-Segmentation, 2018

VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2018 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: TS-0501_VM_SAI-Infographic07/18