vCloud Air Network Partners… Behold vCAN Edge

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für vCloud Air Network Partners… Behold vCAN Edge
Mrz 312017
 

All Service Providers and Aggregators in the vCloud Air Network (vCAN) should visit and bookmark vCAN Edge today. It’s an easy-to-use website that is dedicated to vCAN solutions, products, and driving the success of your public and hybrid cloud business. It also includes current information such as technical whitepapers, the vCloud architecture toolkit, and customer case studies.

The post vCloud Air Network Partners… Behold vCAN Edge appeared first on Partner News.

Facebook Live vSAN TechTalk with John Nicholson

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Facebook Live vSAN TechTalk with John Nicholson
Mrz 312017
 

We are excited to host another Facebook Live vSAN TechTalk! Please tune into ourFacebook pageon Thursday, April 6th at 1:30 P.M. PSTto hear John Nicholson (@Lost_Signal), Senior Technical Marketing Architect, talk about How to build, configure and deploy a Storage Only Nodefor vSAN! During the 10 minute live stream, John will address: What are the

The post Facebook Live vSAN TechTalk with John Nicholson appeared first on Virtual Blocks.

Celebrate World Backup Day by Safeguarding Your Workloads in the Cloud

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Celebrate World Backup Day by Safeguarding Your Workloads in the Cloud
Mrz 312017
 

It&#rsquo;s World Backup Day, a day dedicated to raising awareness of data, the increased value it brings to our lives, and the importance of ensuring that it’s protected should the unexpected happen.

 

Everyday computer users aren&#rsquo;t the only ones who need to be reminded to protect their applications and data. Even savvy IT folks often overlook the need to protect workloads in the cloud in addition to the workloads they run on-premises.

 

But don&#rsquo;t worry, we&#rsquo;ve got your back. You can ensure data protection in your VMware vCloud Air® environment with vCloud Air Data Protection, an optional backup and recovery feature for Dedicated Cloud or Virtual Private Cloud instances – and get the peace of mind protection you deserve.

 

Data Protection is an agentless, self-service, policy-driven backup and recovery service with image-level backups. It helps ensure that all operating system, file system, and application data residing within a virtual machine are captured as a snapshot image before committed to backup media. With this self-service backup feature, you can fully embrace the public cloud and deploy critical applications without worrying about data loss.

 

And, Data Protection is comparable to private enterprise backup and recovery operations environments, with default policy attributes that support a guaranteed service level for backup and recovery objectives without imposing excessive administrative burden on IT Operations staff. Now that&#rsquo;s a reason to celebrate every day.

In addition to Data Protection, VMware offers a portfolio of vCloud Air availability services including vCloud Air Disaster Recovery, and the newly launched vCloud Air Dedicated Disaster Recovery solution, which combines vCloud Air services such as Dedicated Cloud, Hybrid Cloud Manager, and vSphere-based replication to deliver a customized enterprise-centric solution.

 

Learn more about VMware vCloud Air availability services now.

The post Celebrate World Backup Day by Safeguarding Your Workloads in the Cloud appeared first on VMware vCloud.

For Your Own Safety, Read This Week’s Top Mobile News

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für For Your Own Safety, Read This Week’s Top Mobile News
Mrz 312017
 
Apple updates galore—and it&#rsquo;s for your own safety. Apple pushed its iOS 10.3, tvOS 10.2 and macOS 10.12.4 operating system (OS) updates this week. Multiple media sources, including Forbes, warn that Apple iPhone users should update to the latest OS ASAP to dam a serious security vulnerability. But great news on the enterprise mobility side: […]]> Apple updates galore—and it&#rsquo;s for your own safety.

Apple pushed its iOS 10.3, tvOS 10.2 and macOS 10.12.4 operating system (OS) updates this week. Multiple media sources, including Forbes, warn that Apple iPhone users should update to the latest OS ASAP to dam a serious security vulnerability.

But great news on the enterprise mobility side: AirWatch announced same-day support and some pretty cool iOS and Apple TV capabilities coming in its 9.1 release. Claire Feeney gives us the details here.

Want to get the top mobile news in your inbox every Friday? Simply enter your email at the top of the page.

In a Galaxy far, far away…

From its Unpacked event in NYC (okay, so maybe not so &#rsquo;far away&#rdquo; …), Samsung launched its new Galaxy S8 device that &#rsquo;breaks through the confines of the smartphone screen.&#rdquo; Check it out here.

For businesses, Samsung also announced its new &#rsquo;desktop experience&#rdquo;—or DeX—technology. When paired with a leading digital workspace solution, like VMware Workspace ONE, end users can experience a full desktop experience on their S8 smartphone. Productivity &#rsquo;Unpacked.&#rdquo; Read more here.

Time to plug that leak.

Security leak, that is. Wandera&#rsquo;s David Renwick effectively scares us half to death with his new blog. He details the security threats that slip through the once-secure IT perimeter, thanks to workers&#rsquo; smartphones and seemingly innocent apps. Read this blog with the lights on.

352 billion mobile app downloads. Say what?!

App Annie projected this week that mobile app store revenue will exceed $139 billion in 2021, thanks to a forecasted 352 billion app downloads. Um, wow. Dive into the numbers on TechCrunch.

It&#rsquo;s so tiny!

For only $55, you can get the world&#rsquo;s smallest smartphone. The Posh Mobile Micro X, also called the &#rsquo;anti-phablet,&#rdquo; is available unlocked on Amazon today.

Father Android gets back in the game.

Android OS creator Andy Rubin hit social this week testing his new smartphone company&#rsquo;s first device.

I’m really excited about how this is shaping up. Eager to get it in more people’s hands… pic.twitter.com/LRzQCFSKTm

— Andy Rubin (@Arubin) March 27, 2017

 

April&#rsquo;s To-Do List

  • Register for aVMware SociaLabin your city
  • Webinar: Achieve Your Digital Workspace Goals: Episode 2
  • Webinar: Explore the Latest AirWatch 9.1 Release
  • VMUG Webcast: Modernizing Windows 10 Management for the Mobile-Cloud Era
  • On Demand: EUC Insights 2017
    • EUC Insights 2017 AMER
    • EUC Insights 2017 APJ
    • EUC Insights 2017 EMEA

     

Troubleshooting Videos for vRealize Operations Manager, Workspace ONE, and NSX Now Available in the Learning Zone!

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Troubleshooting Videos for vRealize Operations Manager, Workspace ONE, and NSX Now Available in the Learning Zone!
Mrz 312017
 

This month the Learning Zone was focused on troubleshooting for vRealize, Workspace ONE, and NSX. The following videos can now be accessed by Standard and Premium subscribers:

  • VMware vRealize Operations Manager 6.x Troubleshooting Tips & Tricks
  • Learn Best Practices and Troubleshooting of Workspace One
  • Advanced Troubleshooting for VMware NSX

In addition to these videos, the following is available for Premium subscribers:

  • VMware Certification Exam Prep: VMware Certified Professional 6 – Network Virtualization (VCP6-NV) Exam v6.2 (2V0-642)

For more information on this course, click here.

To watch these videos, make sure to subscribe to the Learning Zone here. Want to keep up with new releases in the Learning Zone in real time? Follow #NewintheZone on Twitter.

The post Troubleshooting Videos for vRealize Operations Manager, Workspace ONE, and NSX Now Available in the Learning Zone! appeared first on VMware Education & Certification.

Tackling the Top Threats in Cybersecurity with VMware TrustPoint

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Tackling the Top Threats in Cybersecurity with VMware TrustPoint
Mrz 312017
 

Searching for the term &#rsquo;cybersecurity&#rdquo; in your favorite search engine yields some interesting and somewhat alarming results. You will see advertisements from security vendors telling you not to become the &#rsquo;next target&#rdquo;. If you search within the U.S., the Department of Homeland Security website will likely show up. You may see yet another organization who just got hacked, maybe even for the second or third time in recent years.

Threats in the cyber world are showing up everywhere and every day. With the rise in bring-your-own (BYO) initiatives and workers using more devices for work, the most dangerous threats often show up on endpoints.

Organizations are struggling to get complete visibility of what is on their network to efficiently secure and manage their endpoints. An effective endpoint security and management strategy starts with a modern approach that can scale and respond quickly to today&#rsquo;s demands.

We introduced VMware TrustPoint to provide security and IT operations teams with complete endpoint visibility and control to secure and manage endpoints at speed and scale. Let us look at how TrustPoint can help tackle some of the most common cybersecurity threats trending in the enterprise today.

Tackling the Top Threats in Cybersecurity: Ransomware Example

Ransomware is a hot topic these days and for good reason. Hackers can essentially infect devices owned by users or organizations with ransomware, usually in the form of malicious code that disables access to files. The malicious actors then hold the user or organization at ransom until they meet demands, usually in the form of payment through bitcoin currency. This type of threat is very popular:

Nearly 50% of organizations had a ransomware attack between 2015 and 2016, per Osterman Research.

Because ransomware authors typically exploit endpoints running outdated software, enterprises can work to protect their network from ransomware by keeping software and patches up to date, something TrustPoint can help with.

Using TrustPoint, security and IT operations teams can simply ask a question, retrieve results in seconds and quickly act. For example, teams can use TrustPoint to query which endpoints are out of date with the latest patches from Microsoft Windows, Internet Explorer or any other application.

Unlike security tools with outdated architectures that rely on databases, TrustPoint is built on a modern communications platform which returns results in seconds from a live environment. Once the query completes, the security or IT team has the information they need to take the appropriate action to remediate the threat in real-time. In this example, IT can remotely distribute a patch across vulnerable endpoints.

Securing Unmanaged & BYO Endpoints

Having complete network visibility also helps security teams combat ransomware and other advanced threats. TrustPoint can quickly discover unmanaged endpoints and take actions to either gain control or prevent them from being a threat.

According to a recent SANS Institute report:

&#rsquo;You can prevent 80-90% of all known attacks by implementing and staying current on basic cyber hygiene.&#rdquo;

If you do not know how many IT assets are on your corporate network, how can you assess the impact of existing threats, like ransomware, and prevent IT assets from future threats? That is where a strong security hygiene strategy begins and what TrustPoint can help answer.

TrustPoint + AirWatch Together

The popularity of the Windows operating system (OS) in the enterprise created security and management challenges over the years, in part due to the traditional systems management approach forced upon IT. The release of Windows 10 signaled a shift from this traditional management approach to a mobile-first management approach called unified endpoint management (UEM).

Already the leader in enterprise mobility management (EMM), VMware AirWatch evolved into a platform that could not only secure and manage mobile device, but also Windows 10 endpoints. With AirWatch, organizations get the full benefit of a UEM platform to manage both mobile devices and desktops. Now with TrustPoint, organizations can extend the security and management of AirWatch-managed desktops.

Security and IT operations teams can find potential threats using TrustPoint, report them back to AirWatch and take action for automated compliance. Customers also benefit from having one vendor in VMware to secure and manage mobile, desktop and server environments.

Let us look at an example of the integration. An organization looks for unsigned applications on any Windows 10 device in its environment. Using TrustPoint, the security or IT operations team can run a query that will quickly find Windows 10 devices running these unsigned applications and tag them as compromised. Using AirWatch, the team defines a compliance policy to block VPN access from any compromised device. Any user using a device with an unsigned application will be blocked from connecting into the corporate network through VPN.

Security teams can take it a step further and set up different actions according to the various threat levels they define. This helps drive even stronger compliance and real-time threat containment across all endpoints in any environment.

The Next Era of Cybersecurity: It Is Time to Get Proactive

Other types of threats security teams need to focus on include rootkits, viruses, worms, trojans, adware and spyware. According to AV-Test:

Over 390,000 new malicious programs are registered every day.

Since viruses, worms, trojans and other types of malware have been around for decades, many organizations are still using tools from the &#lsquo;90s and 2000s to combat and remediate against old and new threats.

Signature-based security alone no longer helps, as 97% of malware is unique to a specific endpoint. Large organizations end up using dozens of point tools that cannot communicate with each other and do not provide a clear picture of overall security posture. TrustPoint can help address these inefficiencies.

Let&#rsquo;s say you identity a process as malicious and spreading through your environment, like a worm. Security teams can use TrustPoint to discover affected endpoints quickly by running a query that looks for a specific MD5 hash tied to the process. The team can then take action, such as quarantining the devices and then reimaging or uninstalling the app to bring the device back into compliance. You can further automate this process, so there is a continuous check for the malicious process.

We highlighted some of the top threats that cyber criminals use to expose enterprise organizations today. TrustPoint helps security and IT operations teams get visibility into their environment, so they can efficiently detect and remediate against these advanced threats and increase their security hygiene. With VMware ecosystem integrations, such as AirWatch, TrustPoint can give organizations a complete end-to-end security approach.

For more information on how TrustPoint can help you, visit vmware.com/products/trustpoint.html.

Because you liked this blog:

  • Mobile Leaks Are On the Rise: Should You Be Concerned?
  • New eBook: The Next 5 Big Things in Mobile Security
  • Bulletproof RDS: 30 Ways to Secure Remote Desktop Services

The post Tackling the Top Threats in Cybersecurity with VMware TrustPoint appeared first on VMware End-User Computing Blog.

vSphere 6.5 with RoCE (RDMA over Converged Ethernet) and Certification Suite

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für vSphere 6.5 with RoCE (RDMA over Converged Ethernet) and Certification Suite
Mrz 312017
 

With vSphere6.5, we introduced RDMA over Converged Ethernet (RoCE). RDMA over Converged Ethernet (RoCE) is a network protocol that allows remote direct memory access (RDMA) over an Ethernet network. RoCE dramatically accelerates communication between two network end-pointsleveraging DMA over convergedEthernet infrastructure.

RoCE is supported in two mode RoCE v1 and RoCE v2.

The RoCE v1 protocol is an Ethernet link layer protocol with Ethertype 0x8915, it means that the frame length limits of the Ethernet protocol apply – 1500 bytes for a regular Ethernet frame and 9000 bytes for a jumbo frame.

The RoCEv2 protocol exists on top of either the UDP/IPv4 or the UDP/IPv6 protocol.[2] The UDP destination port number 4791 has been reserved for RoCE v2. Since RoCEv2 packets are routable the RoCE v2 protocol is sometimes called Routable RoCE or RRoCE.

Following diagram shows the packet format for RoCEv1 and v2 protocols.

 

Today VMware is pleased to announce the RoCE (RDMA over Converged Ethernet) certification suite for vSphere 6.5. vSphere 6.5 certification suite allow Ethernet adapter vendor to certify their drivers and controllers in RoCE mode.

For detailed certification information, please refer here.

 

The post vSphere 6.5 with RoCE (RDMA over Converged Ethernet) and Certification Suite appeared first on VMware vSphere Blog.

Security Matters: Mac Hypervisor Edition

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Security Matters: Mac Hypervisor Edition
Mrz 302017
 

 

As I’m sure you noticed, we’ve delivered a flurry of patch-releasesfor Fusion and Workstation in the last few weeks. Want to know why? Because security matters.

More visibility

The Pwn2Own competition at the CanSecWest conference put a huge bounty on‘vmescape‘. They’re not the first to do this, and they won’t be the last. And I want to be clear up front, we’re delighted that they helped us make our products more robust, and more secure.

For those not following this closely, ‘vmescape’ is the challenge of executing code on a host machine, that originated on a virtual machine. In other words, you have to execute something on a virtual computer, that tricks thehypervisor, such as Fusion, Workstation, ESXi, etc, in to passing that code through to the host computer, effectively breaking out of the guest with the intent of controlling or damaging the host.

While the successful exploits themselves are interesting to note, the likelihood of this causing actual damage to you, in the real world is pretty small. Partly becauseofthe nature and complexity of the technology involved, and partly because of the bevy of unknowables of a real production system.Mike Foley, one of our foremost security gurus, notes:

“VM Escape is not the threat your security guy thinks it is. It’s really, really hard to do.”

Hard to do, but still imperative that we fix. And so we have. With an abundance ofgratitudeto our incredibly talented security team,working directly with our multi-discipline engineering teams, we think we’ve been on top of things.

Platform security iscritically important

Virtualization technology today is used more widely, and in morecritical systems than ever. With VMware having such a prominent footprint both on the desktop and in the data center, we take our role and responsibility in this very seriously.

While many of our Fusion & Workstation customers are considered ‘consumers’, (i.e. they have a single copy installed on their own personal machine), the majority of our customers are business, both small and large. Security for the end-user is important, but when we’re talking about corporate systems and virtual desktops that connect to those systems, the need for an air-tight virtualization stack becomes an imperative.

To that end,we’ve delivered 3 critical patches for bothFusion and Workstation (both Pro and Player), eachaddressing different security issues documented in ourSecurity Advisory announcements (which can be found here), all within the past 3 weeks.

We understand that this makes it tricky for you. Updating software is never fun – even if it’s fully automated – and we appreciate the anxiety we may have caused you, but I hope you agree, it was worth it

Collaboration is Key

We’re very proud of our engineering teams. Cross collaboration between them is critical whenaddressing complex issues, made more difficultby the need for rapid delivery. And of course while patchingis critical, maintaining ahigh level of product quality is something we refuse to compromise on.

We work directly with security researchers who demonstrate some pretty slick exploits at several security shows, and we’re keento see that trend continue. In this day-and-age, when breaches and data privacy issues are making mainstream headlines, we couldn’tdo this without the collaboration we get from thecommunity. We are immensely grateful to you.

Now, Secure yourself

It’s always important to stay up to date with security patches for all software you own/use/control. If your software hasn’t auto-updated already, get the latest patches [here]. And while we have your security attention, we recently came up with a nice little way to use Fusion and Workstation to help increase both your own security and privacy when dealing with online threats.

For this use case, we have a nice summary infographic and video, with more detailed writeups for safely surfing the Internet withFusion and Workstation[linked respectively].

The post Security Matters: Mac Hypervisor Edition appeared first on VMware Fusion Blog.

Security Matters: Mac Hypervisor Edition

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Security Matters: Mac Hypervisor Edition
Mrz 302017
 

 

As I’m sure you noticed, we’ve delivered a flurry of patch-releasesfor Fusion and Workstation in the last few weeks. Want to know why? Because security matters.

More visibility

The Pwn2Own competition at the CanSecWest conference put a huge bounty on‘vmescape‘. They’re not the first to do this, and they won’t be the last. And I want to be clear up front, we’re delighted that they helped us make our products more robust, and more secure.

For those not following this closely, ‘vmescape’ is the challenge of executing code on a host machine, that originated on a virtual machine. In other words, you have to execute something on a virtual computer, that tricks thehypervisor, such as Fusion, Workstation, ESXi, etc, in to passing that code through to the host computer, effectively breaking out of the guest with the intent of controlling or damaging the host.

While the successful exploits themselves are interesting to note, the likelihood of this causing actual damage to you, in the real world is pretty small. Partly becauseofthe nature and complexity of the technology involved, and partly because of the bevy of unknowables of a real production system.Mike Foley, one of our foremost security gurus, notes:

“VM Escape is not the threat your security guy thinks it is. It’s really, really hard to do.”

Hard to do, but still imperative that we fix. And so we have. With an abundance ofgratitudeto our incredibly talented security team,working directly with our multi-discipline engineering teams, we think we’ve been on top of things.

Platform security iscritically important

Virtualization technology today is used more widely, and in morecritical systems than ever. With VMware having such a prominent footprint both on the desktop and in the data center, we take our role and responsibility in this very seriously.

While many of our Fusion & Workstation customers are considered ‘consumers’, (i.e. they have a single copy installed on their own personal machine), the majority of our customers are business, both small and large. Security for the end-user is important, but when we’re talking about corporate systems and virtual desktops that connect to those systems, the need for an air-tight virtualization stack becomes an imperative.

To that end,we’ve delivered 3 critical patches for bothFusion and Workstation (both Pro and Player), eachaddressing different security issues documented in ourSecurity Advisory announcements (which can be found here), all within the past 3 weeks.

We understand that this makes it tricky for you. Updating software is never fun – even if it’s fully automated – and we appreciate the anxiety we may have caused you, but I hope you agree, it was worth it

Collaboration is Key

We’re very proud of our engineering teams. Cross collaboration between them is critical whenaddressing complex issues, made more difficultby the need for rapid delivery. And of course while patchingis critical, maintaining ahigh level of product quality is something we refuse to compromise on.

We work directly with security researchers who demonstrate some pretty slick exploits at several security shows, and we’re keento see that trend continue. In this day-and-age, when breaches and data privacy issues are making mainstream headlines, we couldn’tdo this without the collaboration we get from thecommunity. We are immensely grateful to you.

Now, Secure yourself

It’s always important to stay up to date with security patches for all software you own/use/control. If your software hasn’t auto-updated already, get the latest patches [here]. And while we have your security attention, we recently came up with a nice little way to use Fusion and Workstation to help increase both your own security and privacy when dealing with online threats.

For this use case, we have a nice summary infographic and video, with more detailed writeups for safely surfing the Internet withFusion and Workstation[linked respectively].

The post Security Matters: Mac Hypervisor Edition appeared first on VMware Fusion Blog.

Mrz 302017
 

You may have noticed that in the past couple weeks we’ve delivered a flurry of patch-releasesfor ourPersonal Desktop products.

More visibility

With competitions such as Pwn2Own at the CanSecWest conference putting huge bounty’s on‘vmescape‘, (which is to run code on the Host of a machine with a Hypervisor on it, likeFusion, Workstation, ESXi, etc, by executing code from within a virtual machine… to ‘break out’ of the VM, if you will), there’s been a lot of visibility regarding hypervisor security. We’re very happy that security teams around the world are doing their diligence to ‘jump throughRing-0‘ and doing the ‘white hat’ thing by disclosing that in a responsible manner.

While the exploits themselves are interesting to note, the likelihood of this causing actual damage in the real world is pretty small due to the nature and complexity of the technology involved, and certainly with respect to the effort and number of hoops to jump through to make this possible in a Proof Of Concept environment, let alone a ‘real world’ system with a bevy of unknowables. Mike Foley, one of our foremost security gurus, notes:

“VM Escape is not the threat your security guy thinks it is. It’s really, really hard to do.”

Hard to do, but it’s still up to us to fix it. With an abundance ofgratitudeto our incredibly talented security teamworking directly with our product engineering teams across several disciplines, we think we’ve been pretty on top of things.

Platform security iscritically important

Virtualization technology today is used more widely and for systems morecritical than ever, and with VMware having such a prominent footprint both on the desktop and in the data center, our role and responsibility in this space is not underestimated or overlooked.

While many of our customers are considered ‘consumers’, i.e. they have a single copy of Fusion or Workstation installed on their own personal machine and use it as a learning or productivity tool, the majority of our customers are business, both small and large. Security for the end-user is important, but when we’re talking about corporate systems and virtual desktops that connect to those systems, the need for an air-tight virtualization stack becomes an imperative.

To that end,we’ve delivered a succession of3 critical patches for bothFusion and Workstation (both Pro and Player), eachaddressing different security issues documented in ourSecurity Advisory announcements (which can be found here), all within the past 3 weeks.

Collaboration is Key

We’re very proud of our engineering teams, and the cross collaboration between them is critical whenaddressing issues like these with the utmost concernand rapid delivery. And of course while shipping a patch is critical, maintaining the high level of product quality that all of our customers have come to rely onis something we refuse to compromise on.

We work directly with security researchers who demonstrate some pretty slick exploits at several security shows, and we’re keento see that trend continue. In this day in age when breaches and data privacy issues are making mainstream headlines, we couldn’tdo this without the collaboration we get when working with the community and for that we are immensely grateful.

Now, Secure yourself

It’s always important to stay up to date with security patches for all software you own/use/control, but as an end user or as a business productivity user,running a virtualized operating system withFusion orWorkstation can increase both your own security and privacy when dealing with online threats.

For this use case, we have a nice summary infographic and video, with more detailed writeups for safely surfing the Internet withFusion and Workstation[linked respectively].

 

 

The post Hypervisor Security Matters appeared first on VMware Workstation Zealot.

Driving Digital Transformation

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Driving Digital Transformation
Mrz 302017
 

Due to user experience, innovation, and cloud adoption, digital transformation is no longer just a buzzword. It has fast become a necessity across all sectors and significantly impacts the growth planning and IT budgets of all organizations.

Research shows that IT leaders have more than doubled their focus on digital transformation strategies within the last year. This increase is driven in large part by fear and uncertainty. Many organizations fear becoming obsolete. They&#rsquo;re uncertain of what their industry will look like in three years, and they worry they&#rsquo;re not yet in the ranks of digital leaders.

What&#rsquo;s in Store for Customers in 2017

To overcome this fear, organizations are springing into action. This year, we can expect to see them prioritizing technology initiatives, including larger investments in infrastructure, resources, and software development. In addition, we can expect corresponding changes in IT resource and budget allocation.

For example, we know network virtualization opportunities are at an all-time high of US$10 billion. That&#rsquo;s good news for partners specializing in the VMware NSX® platform—and more opportunity awaits.

Instead of specific solutions, partners and customers are focusing on core set of business outcomes in 2017: accelerating business agility and innovation, delivering exceptional mobile experiences, and protecting brand reputation and customer trust. We are enabling partners to help their customers achieve these business outcomes through four strategic IT priorities.

Modernizing data centers. As enterprises deepen their digital transformation efforts, they&#rsquo;re leveraging VMware software-defined technology so they can quickly respond to and create new market opportunities. Through VMware Cross-Cloud Architecture™ and virtualization technologies, partners can help organizations:

  • Modernize infrastructure by software-defining compute, storage, and networking resources for efficiency and agility
  • Automate IT to streamline provisioning and deployment at a speed that keeps up with business demands
  • Run modern apps, whether cloud-native, web-scale, or open API-based, on an enterprise-grade platform

Integrating public clouds. Today&#rsquo;s digital transformation strategies increasingly include public cloud integration for greater agility and innovation. In fact, a VMware customer survey found that nearly 70 percent of enterprises foresee an ideal end state where they rely on multiple clouds. Partners can confidently help their customers:

  • Leverage VMware hybrid clouds by extending VMware vSphere®-based infrastructure to vSphere-based public clouds, where they can run apps with workload portability between on-premises infrastructure and the cloud
  • Manage multiple clouds with VMware vRealize® for multiple private and public vSphere-based clouds, or in the future, with VMware Cross-Cloud Services™ to manage any app or workload on any cloud

Empowering digital workspaces. Employees today rely on the ability to work anywhere, anytime, on devices of their choosing. They expect a mobile experience that meets—or exceeds—what they experience as consumers. We help partners enable exceptional mobile experiences for enterprises by using NSX, the VMware Workspace ONE™ enterprise platform, the VMware Horizon® virtual desktop infrastructure, the VMware AirWatch® enterprise mobility platform, and other solutions to:

  • Simplify application access and management by keeping apps, desktops, and data off the endpoints and secure in the data center or cloud
  • Unify endpoint management so IT can manage all apps and devices on a single platform, regardless of ownership—and with complete employee privacy
  • Virtualize apps and desktops, running them in secure data centers on-premises or in the cloud to ensure that only the user interface is transmitted beyond the firewall
  • Transform Windows delivery by giving IT centralized security controls through which they can easily manage all devices and user access on Windows 10

Transforming security. IT is challenged to secure interactions between users, apps, and data in a constantly shifting, digital business environment. And traditional network-perimeter security cannot address the increasing sprawl of applications and users. We help solve these security issues by providing a ubiquitous software layer across application infrastructure and endpoints. This approach provides deep visibility into and context for the interactions between users and applications. As a result, partners can help organizations:

  • Secure application infrastructure by using NSX to virtualize the network and implement micro-segmentation to align granular security controls to apps
  • Secure identity and endpoints with end-to-end visibility and control, from the user and endpoint device all the way into the app infrastructure within the data center or cloud
  • Streamline compliance through controls implemented at the software layer, which also deliver the visibility needed to demonstrate compliance

Get Ready to Help Customers Accelerate Digital Transformation

Working together, VMware and our partners are well positioned to add valuable insight to digital transformation conversations. But it&#rsquo;s not just about talking. It&#rsquo;s about delivering robust technology solutions needed to ease the concerns of customers across all sectors.

Be sure to visit Partner Central for more on how partners can help drive digital transformation in 2017 and beyond.

The post Driving Digital Transformation appeared first on Power of Partnership.

Sit Back, Relax, and Get to Know VMware vCloud Air Hybrid Cloud Manager

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Sit Back, Relax, and Get to Know VMware vCloud Air Hybrid Cloud Manager
Mrz 302017
 

As our many customers will attest, VMware vCloud Air Hybrid Cloud Manager (HCM) is an extremely powerful tool when it comes to extending your on-premises data center to the cloud and migrating VMs to and from the cloud. But in order to take full advantage of Hybrid Cloud Manager, you’ll first need to become acquainted with the interface and available settings. Don’t worry though, we’ve made that step easy.

 

Our VMware YouTube channel is an excellent destination for information and tutorials on many VMware solutions, including Hybrid Cloud Manager. Below is a list of recently released Hybrid Cloud Manager tutorials that we believe may be most helpful in getting up to speed with Hybrid Cloud Manager.

 

Deploying VMware’s Hybrid Cloud Manager Fleet
To start, let&#rsquo;s begin with an overview of Hybrid Cloud Manager fleet deployment using the capabilities found in vCloud Air Hybrid Cloud Manager.

 

 

This tutorial reviews the steps necessary to deploy the Hybrid Cloud Manager fleet after the initial Hybrid Cloud Manager deployment. The Hybrid Cloud Manager plugin allows you to easily deploy your VMs with only a few steps. With Hybrid Cloud Manager fleet successfully deployed, users are ready to take advantage of the myriad of exciting features.

 

Stretching a Layer 2 Network with Hybrid Cloud Manager
The communication between VMs at your local datacenter, and the VMs found within the vCloud Air environment is critical to the effective execution of enterprise workloads. Fortunately, with Hybrid Cloud Manager, users can easily stretch networks across datacenters and the cloud.

 

After following the steps highlighted in the video above, existing VMs will now be able to communicate within the same broadcast domain whether they be on-premises or within the vCloud Air environment.

 

Performing a Zero Downtime Migration within vCloud Air
The holy grail of VM migration – zero downtime. With Hybrid Cloud Manager and vMotion, users can easily migrate running VMs to vCloud Air without downtime, avoiding the usual disruptions often associated with cloud migrations.

 

 

Once the migration is complete, be sure to check the uptime of the VM that was moved – voila! no downtime!

Security Policy Migration Between NSX and vCloud Air
If migrating VMs is one dimension to be considered, securing those VMs is an important second. Hybrid Cloud Manager allows users to quickly transfer existing NSX security policies to vCloud Air. See the video below and follow along.

 

 

To stay up to date on the latest VMware vCloud Air videos and tutorials, subscribe to our YouTube page.

 

And as always, like VMware vCloud on Facebook of follow @vCloud on Twitter to join in on the conversation!

The post Sit Back, Relax, and Get to Know VMware vCloud Air Hybrid Cloud Manager appeared first on VMware vCloud.

Discover VMware Technology Network – Series 1

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Discover VMware Technology Network – Series 1
Mrz 302017
 

Discover VMTN is a blog series that will bring to light the features and functionality within the communities platform that are lesser known, but incredibly useful. This week we start with…

VMTN Global Forums by Language

VMware has offices in 20+ countries, vmware.com has 30+ localized sites, but last month, VMware Technology Network had only a few scatted forums dedicated to enabling peer-to-peer conversations for our global customers.

That gap has been filled with the launch of VMTN Global Forums.

Communities are an integral part of being a VMware customer. When a customer buys, deploys, or builds on a VMware product, they become a part of the VMware Technology Network, or as our bigger community ecosystem is sometimes called, the vCommunity. VMTN Global Forums by Language now provides a platform to share knowledge, resources, opinions, and gain support, for customers worldwide.

These Forums each have a committed moderator who regulates content to ensure that there is no third-party advertising, and that VMTN&#rsquo;s Code of Conduct is maintained. Check out our list of new Forums and their moderators:

French: @LucD ; @FranckRookie

Italian: @ldelloca

Polish: @inleo

Russian: @AntonVZhbankov

Spanish: @dquintana

Brazilian Portuguese: @rcporto

Japanese: @gowatana

Arabic: @MRoushdy

German: @wila ; @peetz ; @schepp ; @a.p.

Turkish: @ademyetim

Indonesian:@bayupw

So now it comes down to this… Did you deploy a VMware product today? How? Are you upgrading your vSphere from 5.5 to 6? Have you? Head to the forums and engage, whether it&#rsquo;s answering discussions or starting them – from where ever you are in the world.

The post Discover VMware Technology Network – Series 1 appeared first on VMTN Blog.

VMware Horizon Client for Windows 4.4 Updates

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für VMware Horizon Client for Windows 4.4 Updates
Mrz 302017
 

HGTV&#rsquo;s Chip Gaines has demolition day; I have launch day. Let&#rsquo;s walk through the VMware Horizon Client for Windows 4.4 updates:

  • Blast Extreme Support: All Horizon Clients now support our faster, more robust update to the Blast Extreme protocol. To take full advantage of it, your administrator will have to be running the latest Horizon agent in the virtual machine. Read more about Blast Extreme Adaptive Transport (or BEAT) here.
  • Aero Peek: We&#rsquo;ve also made remote applications behave more like native applications in Windows 10. We take advantage of Aero Peek to show the full application window when you hover over a running application in the taskbar.

  • Aero Peek: We&#rsquo;ve also made remote applications behave more like native applications in Windows 10. We take advantage of Aero Peek to show the full application window when you hover over a running application in the taskbar.

  • Remote Desktop Resolution: One last little present for you, we&#rsquo;ve added a resolution tip to show the resolution of remote desktop as you resize a virtual desktop window.

That was as satisfying as hitting a wall with a hammer, if I so say so myself. We&#rsquo;re racing to our next release; see you then!

Because you liked thtis blog:

  • Innovation in User Experience: A Closer Look at New Blast Extreme Protocol
  • Announcing VMware Horizon FLEX 1.10
  • VMware Horizon 7.1 Is GA! What&#rsquo;s New – Part 1

The post VMware Horizon Client for Windows 4.4 Updates appeared first on VMware End-User Computing Blog.

Mobile Leaks Are On the Rise: Should You Be Concerned?

 Allgemein, Knowledge Base, Updates, VMware, VMware Partner, VMware Virtual Infrastructure, vSphere  Kommentare deaktiviert für Mobile Leaks Are On the Rise: Should You Be Concerned?
Mrz 302017
 

Getting Things Done While on the Go

The big idea behind mobile technology is exactly that: it is mobile. Employees are no longer tied to a desk. We can now send that customer quote or fix that issue without a mad dash back to the office. We are accustomed to (and somewhat obsessed with) the immediacy of response, interaction and, of course, pictures of kittens.

Click to download our free eBook.

But in the rush to do anything at anytime, did we overlook security?

I do not think we meant to let it happen, but perhaps it just did. In the gold rush that occurred on the back of the emergence of the consumer app store, thousands of clever, innovative and effective apps and tools launched—an &#rsquo;app for that,&#rdquo; so to speak.

However, the speed to market and the hockey-stick adoption curve means that mobile leaks inevitably slipped through the cracks.

What Slipped Through?

The hard stuff mostly: security threats. Sure, passwords stopped displaying on screens. That’s what the “•” character is for, after all. Yet, in the rush to get apps and services to market, did developers really do enough? Did they implement complex password requirements, password expiry, certificate pinning, two-factor authentication or encrypted storage? The short answer is no.

None of these features make a sales tool quicker or the user interface slicker. Arguably, adding security features often presents a usability barrier that annoys users and inhibits productivity. It is somewhat understandable that eager developers might cut a corner or two to get their apps to market quicker and get demanding customers off their backs.

[Related Video: The Dawn of a New Era in Mobile Security]

Data & Mobile Leaks

This attitude created other problems. In 2016, researchers at Wandera uncovered more than 200 well-known apps and mobile websites that exposed sensitive consumer and enterprise information during 2016. The vulnerabilities were present in places you might not expect: more than 59% of all the leaks identified were from just three categories:

  1. News and sports
  2. Business and industry
  3. Shopping.

A further 28% were from another four:

  1. Travel
  2. Entertainment
  3. Lifestyle
  4. Technology

Wandera&#rsquo;s 2016 Mobile Leaks Report: App Leaks by Category

The research demonstrates that applications and websites used by employees could be exposing your company to risk. Are you confident that none of the services used in your mobile fleet are potentially leaking data?

How Did It Happen?

While not always powerful on its own, the nature of the data being leaked can often amount to giving malicious actors the keys to the kingdom. For example, a &#rsquo;man-in-the-middle attack&#rdquo; involves a malicious actor inserting themselves between the device and the web server to access unencrypted data. It can happen when a device is connected to an open Wi-Fi network, like those at a cafe, hotel or airport.

When a leaking site or app is used on such a connection, the unencrypted information can be harvested by the malicious actor. Depending on what is leaked, it could involve credit card theft, identity theft or even the reuse of login credentials to access a corporate network.

With this in mind, any employee with remote network access via their mobile device could be considered be a prized target for an attacker looking to access sensitive corporate data.

[Related: Wandera Shares Top 4 Mobile Security Lessons from 2016]

All Is Not Lost

Listen to this Echo ONE podcast: The Real Truth about Mobile Security.

The days where we had prescriptive, locked-down corporate IT devices are gone. The genie left its bottle quite some time ago, and re-capture seems impossible. So what now?

The answer might simply be awareness of the issue: to change perceptions a position of low confidence in overall app security. With that thought in mind, you can then tackle the problem by bolstering corporate security with a sensible set of device policy, transparent data protection, proactive security monitoring and reporting.

Think of those systems as the device and data “bodyguard.” They happily go around with you and don’t really question or intervene until they see something that puts you at risk. The digital bodyguard provides a safety net in a wild-west style landscape of deliberate criminal app activity, as well as the overlooked security fundamentals. Like a globally connected police force, an attack or vulnerability discovered on one side of the world can trigger a change of protection parameters for all the devices in its charge.

Clearly, tackling these problems will be an ongoing battle for organizations looking to reduce their risk exposure, but simply being aware of them can go a long way towards resolving them.

Because you liked this blog:

  • SlideShare: Gotta Secure Them All—Enterprise Apps
  • eBook: The 5 Next Big Things in Mobile Security
  • Infographic: 5 Red Flags Your EUC Environment Is Missing This

The post Mobile Leaks Are On the Rise: Should You Be Concerned? appeared first on VMware End-User Computing Blog.