SlideShare a Scribd company logo
1 of 31
What’s New in vShield 5.0 – Trust your Cloud
Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
Re-think End-User Computing Modernize Application Development SaaS Apps Existing Apps New Enterprise Apps Evolve the Infrastructure Public Cloud Services Existing Datacenters Three Core Focus Areas
In 2010 VMware Unveiled a Complete Hybrid Cloud Stack… vSphere vSphere vSphere vCloud Director vShield Security vCenter Management
vSphere vSphere vSphere New Cloud Infrastructure Launch(vSphere, vCenter, vShield, vCloud Director) vCloud Director 1.5 vCloud Director vShield Security vShield 5.0 vCenter Operations 1.0vCenter SRM 5.0 vCenter Management vSphere 5.0 In 2011 VMware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack
VMware Cloud Infrastructure Respond to Business Faster Trust Your Cloud Run Business Critical Apps with Confidence ,[object Object]
Resource Elasticity
Flexible Hybrid Cloud Management
Visibility into Sensitive Data
Protection Against Network Intrusions
Efficient Anti-Virus
Scalability and Performance
High Availability and Disaster Recovery
Broad Industry Support ,[object Object]
Resource Elasticity
Flexible Hybrid Cloud Management
Visibility into Sensitive Data
Protection Against Network Intrusions
Efficient Anti-Virus
Scalability and Performance
High Availability and Disaster Recovery
Broad Industry Support ,[object Object]
Security and Compliance Defined Security is about protecting applications, data, server, storage, and networks from malware, and unauthorized human access. Compliance is demonstrating adherence to a standard or regulatory requirement.
Security and Compliance Concerns in Detail….. How can I manage security policies across virtual desktops, servers and networks? How do I verify that confidential and regulated data is secure in the cloud? How do I implement compliance audits for resources in the cloud? I have too many VLANsfor segmenting traffic, and agents for securing applications. I can’t keep up InfrastructureTeam Security OperationsTeam Compliance Officer Both Security and Proof of Compliance are Required to Build Trust
Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
The VMware Advantage Traditional Securityand Compliance VMware Advantage Complex ,[object Object]
Overlapping admin roles
Multiple point solutionsSimple ,[object Object]
Separation of duties
Firewall policy reduction 70:1,  virtual security appliancesWeak ,[object Object]
No granular segmentation

More Related Content

What's hot

Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware introRedazione InnovaPuglia
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld
 
Microsoft sc 900 exam dumps 2021
Microsoft sc 900 exam dumps 2021Microsoft sc 900 exam dumps 2021
Microsoft sc 900 exam dumps 2021SkillCertProExams
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppttswong
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services OlivierMichot
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware DatasheetArrow ECS UK
 

What's hot (19)

Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
Microsoft sc 900 exam dumps 2021
Microsoft sc 900 exam dumps 2021Microsoft sc 900 exam dumps 2021
Microsoft sc 900 exam dumps 2021
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware Datasheet
 

Similar to VMware vShield 5.0 Trust Your Cloud

VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...Dell TechCenter
 
Presentation v mware virtualization & cloud vision 2010
Presentation   v mware virtualization & cloud vision 2010Presentation   v mware virtualization & cloud vision 2010
Presentation v mware virtualization & cloud vision 2010solarisyourep
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapAmit Gatenyo
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
Convergence of Private Clouds
Convergence of Private CloudsConvergence of Private Clouds
Convergence of Private Cloudslatoga
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...solarisyourep
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...xKinAnx
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual envsolarisyourep
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual envxKinAnx
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationCalin Damian Tanase
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 

Similar to VMware vShield 5.0 Trust Your Cloud (20)

VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...
Merlin Glynn (@virtualMerlin) - Building an Enterprise Hybrid Cloud with the ...
 
Presentation v mware virtualization & cloud vision 2010
Presentation   v mware virtualization & cloud vision 2010Presentation   v mware virtualization & cloud vision 2010
Presentation v mware virtualization & cloud vision 2010
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
Convergence of Private Clouds
Convergence of Private CloudsConvergence of Private Clouds
Convergence of Private Clouds
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive Presentation
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 

More from Suministros Obras y Sistemas

VMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareVMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareSuministros Obras y Sistemas
 
Measuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsMeasuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsSuministros Obras y Sistemas
 
Caso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonCaso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonSuministros Obras y Sistemas
 
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoCaso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoSuministros Obras y Sistemas
 
Guía para padres de protección infantil en internet
Guía para padres de protección infantil en internetGuía para padres de protección infantil en internet
Guía para padres de protección infantil en internetSuministros Obras y Sistemas
 
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASNexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASSuministros Obras y Sistemas
 
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationVeeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationSuministros Obras y Sistemas
 
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaVMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaSuministros Obras y Sistemas
 
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationCisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationSuministros Obras y Sistemas
 

More from Suministros Obras y Sistemas (20)

Cisco Rock Night - UCS & VXI
Cisco Rock Night -  UCS & VXICisco Rock Night -  UCS & VXI
Cisco Rock Night - UCS & VXI
 
Cisco Rock Night SMB
Cisco Rock Night   SMBCisco Rock Night   SMB
Cisco Rock Night SMB
 
Ruckus Wireless - Guia de productos en Español
Ruckus Wireless - Guia de productos en EspañolRuckus Wireless - Guia de productos en Español
Ruckus Wireless - Guia de productos en Español
 
ESG Brief Nexsan Gets Its NAS
ESG Brief Nexsan Gets Its NASESG Brief Nexsan Gets Its NAS
ESG Brief Nexsan Gets Its NAS
 
VMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMwareVMware - Contactando El Soporte Técnico De VMware
VMware - Contactando El Soporte Técnico De VMware
 
IPv6 Transition,Transcición IPv6
IPv6 Transition,Transcición IPv6IPv6 Transition,Transcición IPv6
IPv6 Transition,Transcición IPv6
 
Measuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized EnvironmentsMeasuring Nexsan Performance and Compatibility in Virtualized Environments
Measuring Nexsan Performance and Compatibility in Virtualized Environments
 
Caso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / SiragonCaso de Estudio SAP sobre VMware en Greentech / Siragon
Caso de Estudio SAP sobre VMware en Greentech / Siragon
 
Caso de Estudio SAP sobre VMware en SATECA
Caso de Estudio SAP sobre VMware en SATECACaso de Estudio SAP sobre VMware en SATECA
Caso de Estudio SAP sobre VMware en SATECA
 
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro BarquisimetoCaso de Estudio SAP sobre VMware en Hierro Barquisimeto
Caso de Estudio SAP sobre VMware en Hierro Barquisimeto
 
Guía para padres de protección infantil en internet
Guía para padres de protección infantil en internetGuía para padres de protección infantil en internet
Guía para padres de protección infantil en internet
 
SAP Solution On VMware - Best Practice Guide 2011
SAP Solution On VMware - Best Practice Guide 2011SAP Solution On VMware - Best Practice Guide 2011
SAP Solution On VMware - Best Practice Guide 2011
 
Cisco Catalyst Poster
Cisco Catalyst PosterCisco Catalyst Poster
Cisco Catalyst Poster
 
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NASNexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
Nexsan E5000 Family / Familia E5000 Nexsan / Enterprise NAS
 
Fortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIPFortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIP
 
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & ReplicationVeeam diferencias entre versión Standard y Enterprise de Backup & Replication
Veeam diferencias entre versión Standard y Enterprise de Backup & Replication
 
Veeam Resumen de productos
Veeam Resumen de productosVeeam Resumen de productos
Veeam Resumen de productos
 
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva CorporativaVMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
VMware Corporate Overview Presentation 2001, VMware Perspectiva Corporativa
 
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex GenerationCisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
Cisco Centro de Datos de proxima generación, Cisco Data Center Nex Generation
 
VCON xPoint S Briefing
VCON xPoint S BriefingVCON xPoint S Briefing
VCON xPoint S Briefing
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

VMware vShield 5.0 Trust Your Cloud

  • 1. What’s New in vShield 5.0 – Trust your Cloud
  • 2. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 3. Re-think End-User Computing Modernize Application Development SaaS Apps Existing Apps New Enterprise Apps Evolve the Infrastructure Public Cloud Services Existing Datacenters Three Core Focus Areas
  • 4. In 2010 VMware Unveiled a Complete Hybrid Cloud Stack… vSphere vSphere vSphere vCloud Director vShield Security vCenter Management
  • 5. vSphere vSphere vSphere New Cloud Infrastructure Launch(vSphere, vCenter, vShield, vCloud Director) vCloud Director 1.5 vCloud Director vShield Security vShield 5.0 vCenter Operations 1.0vCenter SRM 5.0 vCenter Management vSphere 5.0 In 2011 VMware is Introducing a Major Upgrade of the Entire Cloud Infrastructure Stack
  • 6.
  • 13. High Availability and Disaster Recovery
  • 14.
  • 21. High Availability and Disaster Recovery
  • 22.
  • 23. Security and Compliance Defined Security is about protecting applications, data, server, storage, and networks from malware, and unauthorized human access. Compliance is demonstrating adherence to a standard or regulatory requirement.
  • 24. Security and Compliance Concerns in Detail….. How can I manage security policies across virtual desktops, servers and networks? How do I verify that confidential and regulated data is secure in the cloud? How do I implement compliance audits for resources in the cloud? I have too many VLANsfor segmenting traffic, and agents for securing applications. I can’t keep up InfrastructureTeam Security OperationsTeam Compliance Officer Both Security and Proof of Compliance are Required to Build Trust
  • 25. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 26.
  • 28.
  • 30.
  • 32.
  • 34.
  • 36.
  • 38. Automated remediation, programmableDeployments on VMware are More Secure than Physical
  • 39. VMware Transforms Security from Complex… Network Admin Security Admin VI admin 2 1 Overlapping Roles / Responsibilities Multiple frameworks and provisioning interfaces Network Firewall Load Balancer Application VMware vSphere 3 Multiple physical3rd party solutions
  • 40. …To Disruptively Simple Network Admin Security Admin VI admin 2 1 UnifiedFramework Clear separation of Roles / Responsibilities Reduced numberof steps: Configure vCenter vCenter + vShield Manager Network Load Balancer Application Firewall vCenter RSA Other AVvendors Other ISV Trend VMware vSphere 3 Integrated into Virtual Security appliances
  • 41. VMware Turns Security from Weak... Not Virtualization aware Virus spreads quickly in flat networks without segmentation Antivirus storms Agents in every VM DMZ PCI Compliant 1 1 WEB MAIL 2 Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent “Air gap” 3 Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent VMware vSphere and vCenter VMware vSphere and vCenter VMware vSphereand vCenter VMware vSphereand vCenter File Server Switch Switch Switch Switch
  • 42. PCI Compliant ….to More Secure Protect every VM with hypervisor level firewall & IPS Quarantine infected VMs Eliminate agents and antivirus storms Enforce policies with adaptive trust zones DMZ PCI Compliant DMZ 2 3 3 1 Quarantine Zone Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent Agent AV PartnerProduct IPS PartnerProduct AV PartnerProduct Agent Agent Agent Agent VMware vSphere vCenter
  • 43. VMware Turns Compliance from Being Labor Intensive… FISMA HIPAA SOX Using Traditional Ways of Maintaining Compliance ISO 27002 GLBA DISA Requires specialized knowledge Not change-aware Manual remediation NERC/ FERC PCI DSS NIST Virtualization Hardening Guidelines CIS Benchmarks
  • 44. …To Automated Continuous Compliance Preconfigured templates Monitor data and changes 1 PCI FISMA HIPAA SOX Continuous assessment Automated remediation SOX VMware 2 NERC/ FERC PCI DSS NIST 3
  • 45. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 46. Security and Compliance Market Overview Market Size in 2012 Endpoint Security Antivirus $30B Worldwide in 2009 New in vShield 5.0 Content Security Network Security Identity Mgmt $3,565(20%) Segments Addressed Today $9,136 (8%) Security Operations Market Size($M) in 2009 $2,987 (15%) $4,062 (7%) Change Mgmt Endpoint Security $3,001 (8%) $3,001 (2%) Data Security $3,258 (19%) Application Security $713 (8%) Market Growth Rate Source: IDC, 2009 Network Security Identity Management Change & Compliance Others
  • 47. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 48.
  • 49. Protect infrastructure from being compromised by hackers
  • 50. Improve performance of Anti-Virus solution
  • 51. Sensitive Data Discovery to meet standards & regulations
  • 52. Accurately discover and report sensitive data in unstructured files
  • 53. Segment off VMs with sensitive data in separate trust zones
  • 54. Strong and efficient protection against network intrusions
  • 55. Ability to quarantine compromised VMs
  • 56.
  • 57. Accurately discover and report sensitive data in unstructured files with analysis engine
  • 58.
  • 59. Reduce risk of non-compliance and reputation damage
  • 60. Improve performance by offloading data discovery functions to a virtual appliance Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
  • 61.
  • 62.
  • 63.
  • 64.
  • 66. Reduce risk and improve performance by eliminating agents susceptible to attack
  • 67. Lower cost and complexity to protect virtual machines against malwareagent agent agent agent agent agent Cloud Infrastructure(vSphere, vCenter, vShield, vCloud Director)
  • 68. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 69.
  • 74. Restrict inbound and outbound traffic to the trust zones
  • 75. Restrict access to applications in a trust zone to View users in the subgroup within the zone
  • 76.
  • 77. Lower Capex & Opex by replacing hardware appliances with virtual appliancesVMware vSphere + vCenter + vShield Manager
  • 78. Agenda Primary customer concerns with the cloud VMware value proposition New features and use cases Customer examples Product summary
  • 79. Summary – To build Trust in Cloud You NeedSecurity and Proof of Compliance Security Proof of Compliance $300/VM $800/VM VMware vShield and vCenter Configuration Manager Deliver Trust in Your Cloud
  • 80.

Editor's Notes

  1. To address this challenge, VMware is focused on three core solution areas in IT:How best to evolve the infrastructure to support this new world,Changes in application development to speed time-to-market for business-critical applications, that take advantage of this new world,And a new way of approaching end-user computing, to increase user satisfaction.<click>Let’s begin by exploring the evolution of infrastructure.
  2. VMware delivers the industry leading cloud infrastructure solution for building trusted private, public, and hybrid clouds. Leveraging the proven vSphere 5.0 virtualization platform, VMware creates intelligent cloud infrastructure with built-in automation and resource elasticity to free IT from manual processes and enable it to meet business requirements on-demand.
  3. VMware delivers the industry leading cloud infrastructure solution for building trusted private, public, and hybrid clouds. Leveraging the proven vSphere 5.0 virtualization platform, VMware creates intelligent cloud infrastructure with built-in automation and resource elasticity to free IT from manual processes and enable it to meet business requirements on-demand.
  4. IT security is about protecting an organization’s digital assets – the IT infrastructure such as servers, storage and network, applications and the data that lives there. Organizations want to control: who is accessing digital assetswhat apps and data need protection from theft or leakswhat infrastructure is at risk from threats such as malware or network-based attacks Compliance utilizes a set of processes to determine conformance to regulatory frameworks, industry standards, internal organizational standards, or vendor best practices. IT compliance commonly includes requirements for security controls as they pertain to protecting industry-regulated assets such as personal healthcare information or credit card data. In the case of corporate governance, security applies to assets critical to the business such as intellectual property or customer lists. Within the IT compliance area are several regulatory frameworks, many of which are specific to an industry vertical:Healthcare – HIPAARetail - PCIFinancial – GLBAGovernment – FISMAGovernance – Enterprise policies
  5. Most surveys on cloud computing1 unanimously cite security and compliance as the by far the most significant concerns hindering the adoption of cloud computing. These high level concerns typically boil down to three concrete security and compliance issues: Patchwork of security solutions. Cloud infrastructure is about breaking the silos in the datacenter, and creating a virtualized shared infrastructure that stands ready to support any application workload on-demand. However, existing security solutions are often based on the old siloed way of managing the datacenter – where each group – the server, storage, network, security, and desktop teams – has its own security frameworks and tools. Without a common, unified security policy management framework to control polices and provide visibility into changes, how can the network, virtualization and security teams maintain the level of control that they desire? How can they make rapid changes to security policies if the need arises when so much manual offline coordination is required? Securing applications and data. Before making the jump to cloud, enterprises must be confident that their applications and data can be properly segmented for compliance, and that trust zones can be maintained. The traditional approach has been to segment applications into different zones by creating physical hardware separation or “air gaps”. This approach no longer works in a cloud environment based on a fully virtualized shared infrastructure. Organizations need a new approach that would allow strict application segmentation in trust zones without the need for hardware separation.  IT compliance - Customers are concerned that cloud computing makes IT compliance more complex. Change management, configuration management, access controls, auditing and logging in a cloud infrastructure are the important concerns. Organizations need compliance solutions that are tuned for the dynamic and ever-changing nature of cloud infrastructure. Exposure or leakage of sensitive business data is another important aspect of security in the cloud. For example, stolen credit card data or compromised personal health information can cost an enterprise millions of dollars or harm its reputation. Many organizations have requirements to keep data in certain jurisdictions (e.g. the EU directive for safeguarding EU citizen’s personal information in EU jurisdictions). Cloud solutions today provide very limited firewalls to segment applications, with very limited ability to detect or prevent leakage of sensitive information. Today’s solutions for protecting applications and data continue to rely on brittle and/or dedicated hardware infrastructure that isn’t suitable for securing a highly virtualized environment. 
  6. VMware Transforms Security from Complex…”Traditional IT security is very complex to provision and deploy. First, customers have to configure multiple purpose-built security appliances with proprietary interfaces to deploy the security solution. Second, VI admins, network and security teams have overlapping roles and it takes a lot of manual coordination to properly configure and setup the network, firewall rules and vSphere configurations. These teams are also limited in terms of the proper role based views into policy and implementation. This results in slow provisioning, very complex configuration with significant requirements on coordination, and lack of role based views into policy and implementation details. Finally, traditional security architectures require multiple special purpose appliances. These appliances are expensive and increase CAPex. In addition it delivers a solution with limited scalability, poor availability with multiple points of failure, consumes more power and rack space. All of this increases the Opex of traditional security solutions.
  7. vShield drastically reduces the complexity and the number of steps it takes for VI admins to implement clearly defined policies , and along with vCenter this solution enables security, network and VI admin teams to work closely together where the policies can be clearly defined, implemented, viewed and changed seamlessly. With role-based access to administration and reporting interfaces, administration is clear and simple. VI admins are empowered to implement the security policies .The lead times it takes to provision the right set of security services is greatly reduced, and these can be done through UI’s or through scriptable, REST based APIs.vShield technology also helps eliminate the sprawl in VLANs, firewall rules and agents. We’ll talk more about this in a few minutes when we get into the products overview.
  8. “VMware Turns Security Solutions from Weak …..”Industry regulations often dictate that ‘in-scope’ systems – ones where regulated/sensitive data are stored or processed – have special policies applied to them. Traditional security solutions are tied to physical hosts and don’t allow flexible groupings of resources to implement these policies.This results in what is known as ‘air-gapped’ solutions. Air gaps are created by the need for dedicated hardware and appliances. They are also created because traditional IT security requires dedicated hardware resources/clusters for specific application tiers or groups, since mixing and matching applications across tiers/groups is not possible because of the implied exposure and infection risks. In virtualized environments, the airgap effect is just as bad, since it implies that specific groups of VMs must be limited to specific hosts. This reduces overall efficiency, imposes constraints on how applications /workloads are scaled, load balanced or otherwise managed. This also means that where datacenter-level or user driven infrastructure changes are required, a lot of manual work and cost is incurred to support such change – this leads to a very rigid infrastructure that does not adapt to changing business needs.
  9. Lets start with an overview of the broad security market.The traditional security market is a mature market segment which has over 27Billion spend – the larger segments in this market include network security, along with Identity Management, Antivirus/endpoint.VMware vShield in it’s initial version is targeting the network security, endpoint security and application security segments to begin with. We also plan to partner closely with key vendor such as RSA, Trend, McAfee, Symantec etc to jointly address other segments.
  10. The Sensitive Data Discovery feature includes over 80 pre-built templates for the most common standards for protecting sensitive data including PII (Personally Identifiable Information), PCI-DSS cardholder data, and PHI (Private Health Information). Each pre-built template provides the ability to scans all elements of a virtualization environment - whether datacenters, file shares, resource pools, hosts and VMs – and produces a detailed report that identifies if all of them are in compliances with the specific standardThe key benefits of this feature is quickly identifies sensitive data and reduces risk of non-compliance and reputation damage. It also improves performance over traditional solutions by offloading all sensitive data discovery functions to a secure virtual appliance.