View
Sorting
Products found: 24
NSX SD-WAN by VeloCloud
VMWare AirWatch - Enterprise Mobility Management
What AirWatch Does Manage All Endpoints in a Single Solution AirWatch is built to manage the entire lifecycle of any endpoint, across all major operating systems in a single management console. You have various use cases spread across your business. The advantage of managing mobility with AirWatch is the ability to uniquely support these use cases within a single solution, including full device management, app-level management for BYOD or line of business use cases such as kiosk or shared devices. Support Full App Lifecycle from Development to Deployment AirWatch supports the complete app lifecycle including sourcing or developing an app, applying security policies, deploying an app catalog and analyzing app metrics. You can seamlessly deploy any app – native, web or remote – through a single app catalog across every device with built-in single sign-on. If you’re looking to develop internal apps, AirWatch supports three approaches: AppConfig Community, VMware AirWatch Software Development Kit or app wrapping. Automate Processes and Deliver Intelligent Insights IT is consistently challenged to deliver more for the business without additional budget or resources. One of the key advantages of the AirWatch platform is our powerful automation engines that ease the strain on IT that is typically associated with initial device deployment and day-to-day mobility management.
VMware Carbon Black App Control
KEY CAPABILITIES VMware Carbon Black App Control is a powerful positive security solution for data centers and critical systems that allows server admins to control change while consolidating agents. Using a ‘Default Deny’ approach, VMware Carbon Black App Control reduces your attack surface and downtime by automating approval of trusted software and eliminating the burden of whitelist management. Lock Down Critical Systems Stop malware and non-malware attacks by preventing unwanted changes to your applications and files, providing you with the control over your environment that you need. Ensure Continuous Compliance Accelerate compliance by meeting many of the requirements in regulatory standards and frameworks, such as PCI-DSS, HIPAA/HITECH, SOX, NERC CIP, GDPR and NIST 800-53. High Performance and Low Touch Application Control Be confident that your solution is blocking the “bad” and allowing the “good” without interrupting daily operations.
BENEFITS
- Stop malware, ransomware and next-gen attacks
- Eliminate unplanned downtime of critical systems
- Consolidate endpoint agents
- Prevent unwanted change to system configuration
- Meet IT risk and audit controls across major regulatory mandates
- Increase efficiency of IT resources with streamlined IT audit processes
- Protect legacy systems running on unsupported operating systems
- App Control is now a direct control for requirement 5 of PCI DSS
FEATURES
- Application control
- File integrity monitoring and control
- Device control
- Memory protection
- Reputation services
- Open APIs
PLATFORMS
- Sensor Support:
- Windows XP, Server, Vista, Embedded, POS
- Mac OS X
- RHEL Linux
- CentOS Linux
- Oracle RHCK Linux
VMware Carbon Black Cloud
- Analyze billions of system events to understand what is normal in your environment
- Prevent attackers from abusing legitimate tools
- Automate your investigation workflow to respond efficiently
Gain 24-hour visibility from our security operations center of expert analysts, who provide validation, context into root cause and automated monthly executive reporting. Audit and remediation – real-time device assessment and remediation Easily audit the current system state to track and harden the security posture of all your protected devices. Enterprise EDR – threat hunting and containment Proactively hunt for abnormal activity using threat intelligence and customizable detections.
VMware Carbon Black Cloud Audit and Remediation
KEY CAPABILITIES Single Agent, Cloud Platform Audit and Remediation is built on the PSC, a cloud-native endpoint protection platform that offers converged prevention, detection, and response with additional services that can be activated as you need them, using the same converged agent, without any additional deployment or infrastructure. On-Demand Queries Audit and Remediation gives your Security & IT Operations team visibility into even the most precise about the current system state of all endpoints, enabling you to make quick, confident decisions to reduce risk. Immediate Remote Remediation Audit and Remediation closes the gap between security and operations, giving administrators a remote shell directly into endpoints to perform full investigations and remote remediations all from a single cloud-based platform. Simplified Operational Reporting Audit and Remediation allows you to schedule daily, weekly, or monthly queries to automate operational reporting on patch levels, user privileges, disk encryption status and more to track & maintain the desired state of your ever-changing environment.
BENEFITS
- Execute abroad range of operational activities quickly and confidently
- Establish proactive IT hygiene to prevent attacks
- Build consistency into operational reporting and auditing processes
- Remove barriers between security analysis and IT operations
- Extend existing investigation and remediation capabilities
- Replace adhoc scripts and manual tasks with a structured security platform
- Automate operational reporting with scheduled queries
AUDIT AND REMEDIATION
- Leverages the same agenta nd console as NGAV, EDR and threat hunting platform
- Cloud-based storage of all query results
- Easy access to unified data across Security and IT teams
FEATURES
- Pre-Built Recommended Queries
- SQL query (open text field)
- Query Scheduler
- Copy & Re-run Queries
- Save and favorite queries
- Email notifications
- Filter and group results
- Data export
- Secure shell for remote remediation
- Two-way API
PLATFORMS
- Windows 7 and above
- Windows Server 2008 R2 and above
- MacOS 10.10 and above
- RedHat 6 and above
- CentOS 6 and above
- Ubuntu 16.04 and above
- SUSE 12 and above
- OpenS USE 15 & 42
- Amazon Linux 2
VMware Carbon Black Cloud Endpoint Standard
- Comprehensive protection of your organization’s data and customer information from malware, non-malware and living off the land (LotL) attacks.
- Simplified deployment and operation with out-of-the-box policies to adapt protection to your organization.
- Stay up to date on the latest attacks with in-product updates from our expert Threat Analysis Unit (TAU).
- Save money and time investigating and responding to incidents. With visibility into the entire attack chain and endpoint activity analysis, there’s no need to spend time tracking down which of your systems were affected and when.
- Respond remotely and minimize downtime to endpoints with a tool that allows you to instantly roll back attacks from the console.
- Tailor policies to your organization’s specific needs for easy integration into your existing systems and security practices, with less false positives.
- Simplify your security stack and return critical CPU cycles while improving performance on endpoints with an easy-touse, single cloud platform and agent.
- Get answers fast on how to use the product, and learn about the latest attacks and remediation tips from our expert Threat Analysis team and industry peers, with access to our User Exchange community.
Benefits:
- Protection from known and unknown attacks
- Clear alerts and prioritization of potential attacks
- Easier investigation into security incidents
- Faster mean time to resolution (MTTR)
- Reduced overhead; no infrastructure required
Operating Systems:
- Windows: Windows 7/8/10
- macOS X: 10.6.8+
- Linux RedHat (RHEL) & CentOS 6/7
- Windows 2008 R2
- Windows 2012
- Windows 2012 R2
- Windows 2016
- Windows 2019
VMware Carbon Black Cloud Enterprise EDR
Key Capabilities Complete Endpoint Protection Platform Built on the VMware Carbon Black Cloud, Enterprise EDR provides advanced threat hunting and incident response functionality from the same agent and console as our NGAV, EDR and real-time query solutions, allowing your team to consolidate multiple point products with a converged platform. Continuous & Centralized Recording Centralized access to continuously collected data means that security professionals have all the information they need to hunt threats in real time as well as conduct in-depth investigations after a breach has occurred. Attack Chain Visualization & Search Enterprise EDR provides intuitive attack chain visualization to make identifying root cause fast and easy. Analysts can quickly jump through each stage of an attack to gain insight into the attacker’s behavior, close security gaps, and learn from every new attack technique to avoid falling victim to the same attack twice. Live Response for Remote Remediation
With Live Response, incident responders can create a secure connection to infected hosts to pull or push files, kill processes, perform memory dumps and quickly remediate from anywhere in the world. Automation via Integrations & Open APIs Carbon Black boasts a robust partner ecosystem and open platform that allows security teams to integrate products like Enterprise EDR into their existing security stack.
BENEFITS
- Reduced complexity for more efficient endpoint security
- Easy deployment,automated updates, and elastic scalability
- Accelerated investigations with continuous endpoint visibility
- Complete understanding of root cause to close existing gaps
- Secure remote access for investigations
- Greatly reduced dwell time and average time to resolution
FEATURES
- Lightweight sensor deployed and managed from the cloud
- Process and binary search of centralized, unfiltered data
- Out-of-the-box and customizable behavioral detection
- Proprietary and third-party threat intel feeds
- Automated watchlist store-run queries
- Interactive and expandable attack chain visualization
- Secure remote shell for rapid remediation
- Open APIs
PLATFORMS
- Windows
- macOS
- Red Hat
- CentOS
VMware Carbon Black Cloud Managed Detection
Offered as a managed service, Managed Detection provides a world-class team of Carbon Black security experts who with your organization to validate and prioritize alerts, uncover new threats and accelerate investigations.
Key Capabilities Threat Validation and Insight With 24x7x365 coverage, your team can have true peace of mind knowing that nothing will slip through the cracks. Carbon Black’s security experts proactively validate alerts and send email notifications, helping to assure that your team doesn’t miss the alerts that matter. Roadmap to Root Cause Carbon Black Managed Detection provides additional, human-generated context to Carbon Black NGAV and Behavioral EDR alerts, such as connecting alerts caused by the same root cause, to help you streamline investigations and resolve security issues. Outbreak Advisories Carbon Black’s Threat Analysis Unit constantly monitors threat trends across the globe. When widespread and newsworthy outbreaks occur our team sends out advisories that include indicators of compromise, giving your team a jump start on assessing risk and closing gaps. Monthly Reporting Our Carbon Black Managed Detection experts provide monthly reports that summarize activity across your environment, including the most common suspicious events and most targeted machines. These reports provide a starting point for refining policies, help your team see big-picture trends and make reporting effortless.
BENEFITS
- More efficient and proactive security operations
- More actionable alerts, reducing alert fatigue
- Notifications provide analysts with the information needed to keep their leadership aware of threats and mitigations.
- Reduced time spent investigating root cause
- Alleviation of staffing pressures with 24x7 support
- Clearer view of security trends to help guide policy
FEATURES
- Threat validation
- Email alerts
- Root cause analysis
- Threat advisories
- Monthly reports
PLATFORMS Carbon Black Managed Detection is an add-on service to Carbon Black NGAV and Behavioral EDR, which supports:
- Windows: Windows 7/8/10
- Mac OS X: 10.6.8+
- Server:
Windows 2008
Windows 2012
Windows 2016
VMware Carbon Black Endpoint Detection and Response (EDR)
Key Capabilities Continuous and Centralized Recording Centralized access to continuously recorded endpoint data means that security professionals have the information they need to hunt threats in real time as well as conduct in-depth investigations after a breach has occurred. Live Response for Remote Remediation With Live Response, incident responders can create a secure connection to infected hosts to pull or push files, kill processes, perform memory dumps and quickly remediate from anywhere in the world. Attack Chain Visualization and Search Carbon Black EDR provides intuitive attack chain visualization to make identifying root cause fast and easy. Analysts can quickly jump through each stage of an attack to gain insight into the attacker’s behavior, close security gaps and learn from every new attack technique to avoid falling victim to the same attack twice. Automation via Integrations and Open APIs Carbon Black boasts a robust partner ecosystem and open platform that allows security teams to integrate products like Carbon Black EDR into their existing security stack.
BENEFITS
- Faster end-to-end response and remediation
- Accelerated IR and threat hunting with continuous endpoint visibility
- Rapid identification of attacker activities and root cause
- Secure remote access to infected endpoints for in-depth investigation
- Better protection from future attacks through automated hunting
- Unlimited retention and scale for the largest installations
- Reduced IT headaches from reimaging and helpdesk tickets
FEATURES
- Out-of-the-box and customizable behavioral detection
- Multiple, customizable threat intel feeds
- Automated watchlists capture queries
- Process and binary search of centralized data
- Interactive attack chain visualization
- Live Response for rapid remediation
- Open API sand 120+ out-of-the-box integrations
- On-prem, virtual private cloud, SaaS, or MSSP
- Windows & Windows Server
- MacOS
- Red Hat
- CentOS
- Oracle RHCK
- SuSE
- Clouds or On-Premise
VMware ESXi
- Consolidate hardware for higher capacity utilization.
- Increase performance for a competitive edge.
- Streamline IT administration through centralized management.
- Reduce CapEx and OpEx.
- Minimize hardware resources needed to run the hypervisor, meaning greater efficiency.
With a footprint of just 150MB, ESXi lets you do more with less while minimizing security threats to your hypervisor.
Reliable Performance
Accommodate apps of any size. Configure virtual machines up to 128 virtual CPUs, 6 TB of RAM and 120 devices to satisfy all your application needs. Consult individual solution limits to ensure you do not exceed supported configurations for your environment. Learn more about configuration maximums.
Enhanced Security
Protect sensitive virtual machine data with powerful encryption capabilities. Role-based access simplifies administration, and extensive logging and auditing ensure greater accountability and easier forensic analysis.
Ecosystem Excellence
Get support for a broad ecosystem of hardware OEM vendors, technology service partners, apps, and guest operating systems.
User-Friendly Experience
Manage day-to-day administrative operations with built-in modern UI based on HTML5 standards. For customers who need to automate their operations, VMware offers both a vSphere Command Line Interface and developer-friendly REST-based APIs.
VMware EVO:RAIL
- EVO:RAIL rapid deployment, configuration and management engine;
- Compute, network and storage virtualization enabled with vSphere and Virtual SAN.
- Four independent nodes for compute, network and storage;
- Each node has dual processors and 192GB memory;
- Total of 16TB of SSD and HDD storage via Virtual SAN;
- Phone and in-field hardware and software Support & Services (SnS).
VMware Horizon View
VMware NSX Data Center
Networking in software VMware NSX Data Center delivers a completely new operational model for networking defined in software, forming the foundation of the software-defined data center (SDDC) and extending to a virtual cloud network. Data center operators can now achieve levels of agility, security and economics that were previously unreachable when the data center network was tied solely to physical hardware components. NSX Data Center provides a complete set of logical networking and security capabilities and services, including logical switching, routing, firewalling, load balancing, virtual private network (VPN), quality of service (QoS) and monitoring. These services are provisioned in virtual networks through any cloud management platform leveraging NSX Data Center APIs. Virtual networks are deployed non-disruptively over any existing networking hardware and can extend across data centers, public and private clouds, container platforms and bare-metal servers.
KEY BENEFITS
- Protect applications with micro-segmentation at the workload level and granular security.
- Reduce network provisioning time from days to seconds and improve operational efficiency through automation.
- Gain consistent management of networking and security policies independent of physical network topology within and across data centers and native public clouds.
- Obtain detailed application topology visualization, automated security policy recommendations and continuous flow monitoring.
- Enable advanced, lateral threat protection on east-west traffic using the built-in, fully distributed threat prevention engine.
VMware vCloud Suite
- Application Operations. Enable developers to quickly release, troubleshoot, and optimize performance of highly distributed microservice-based cloud applications in real time.
- Self-Driving Operations. Help IT continuously optimize capacity and performance based on operational and business intent.
- Programmable Provisioning. Help developers and IT easily access infrastructure and application resources on any cloud through API, catalog, or CLI with full lifecycle management.
- Data Center Virtualization. Leverage the world’s leading virtualization platform as the foundation for multiple data center initiatives. Consolidate servers and data centers. Improve application availability and performance. Address application requirements for scale up or scale out.
- vRealize Suite . Cloud management platform that helps IT enable developers to quickly build VM and container-based applications in any cloud with secure and consistent operations.
- vRealize Lifecycle Manager. Automated installation, configuration, upgrade, patch, drift remediation, health, and content management of vRealize products.
- vRealize Operations. Automated IT operations management that enables IT to manage performance and gain visibility across physical, virtual, and cloud infrastructure.
- vRealize Business for Cloud. Automated cloud costing, cloud consumption analysis, and cloud comparison for private, public, and hybrid cloud.
- vSphere . Deliver business value from day one, with powerful server virtualization, breakthrough availability, safe automated management, and intelligent operational insight that adapts to your environment.
- vRealize Automation. Self-service, policy-based infrastructure and application provisioning and lifecycle management for multi-vendor virtual, physical, and public cloud environments.
- vRealize Log Insight. Heterogeneous and highly scalable log management for deep operational visibility and faster troubleshooting across physical, virtual, and cloud environments.
VMWare vRealize Automation
VMware vRealize Business for Cloud
VMware vRealize Log Insight
FEATURES Universal Log Collection and Analytics Leverage vRealize Log Insight to collect and analyze all types of machine-generated log data. Administrators can connect it to everything in their environment—operating systems (including Linux and Windows), applications, storage, firewalls, network devices or something else—for enterprise-wide visibility via log analytics. Enterprise-Class Scalability Highly scalable and designed to handle all kinds of machine generated data. In recent internal testing, Log Insight was three times faster than the leading solution in query tests across 1 billion log messages. Each node can ingest double the data per node, supporting up to 15,000 events per second, per node. Intuitive GUI & Easy Deployment An intuitive, GUI-based interface makes it easy to run simple interactive searches, as well as deep analytical queries for quick insights that provide immediate value and improved IT efficiency. vRealize Log Insight automatically chooses the best visualization for your data, saving you valuable time. Built-in vSphere Knowledge Developed by VMware experts, vRealize Log Insight comes with built-in knowledge and native support for VMware vSphere with Operations Management. You can analyze logs beyond your virtual infrastructure and use a central log management solution to analyze data from your entire IT environment. Integration With vRealize Operations Integration with the vRealize Operations platform extends operational visibility and proactive management capabilities across infrastructure and applications. It also helps you maximize ROI, by bringing unstructured data (such as log files) together with structured data (such as metrics and key performance indicators).
VMWARE vRealize Network Insight
VMware vRealize Operations
VMWARE vRealize Suite
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.