Get adaptive and cost-effective security services within a single management framework for securing virtual datacenters and cloud environments at all levels —host, network, application, data and endpoint— with VMware vShield.
vShield products include:
VMware vShield App: Protects applications in the virtual datacenter against network-based threats
VMware vShield App with Data Security: Adds to vShield App Sensitive Data Discovery across virtualized resources
VMware vShield Edge: Enhances protection for the virtual datacenter perimeter
VMware vShield Endpoint: Improves performance by offloading key antivirus and anti-malware functions to a security virtual machine, eliminating the antivirus agent footprint in virtual machines
VMware vShield Manager: Security management framework included with all vShield products
VMware vShield Bundle: Includes all vShield products – vShield App with Data Security, vShield Edge, vShield Endpoint and vShield Manager
Security and Virtualization
Gain insights on how virtualization affects IT security and learn how to secure deployment of VMware products from the Technical Resource Center.
Build a Business Case for Virtualization Security
Download this presentation to show how VMware vShield products can help your company secure your cloud deployments.
Gain Trust in your Cloud with VMware vShield
Reduce complexity with a unified security and compliance policy management framework for consistent implementation of corporate security policies across VMware and third party solutions. Role based access control provides a clear separation of workflow for Virtual Infrastructure and security administrators.
Secure applications and virtual machines with adaptive trust zones, which securely isolate applications with different trust levels, and quarantine virtual machines that may have been compromised.
Discover sensitive data to accelerate compliance by continuous assessment of IT compliance state and automated remediation of issues across virtual and physical infrastructure. Continuous dynamic discovery and classification of sensitive business information reduces risk and accelerates IT compliance.