VMware-logo

VMware - Security

  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Media

Details

VMware offers powerful solutions for managing and modernizing your business systems and applications in the cloud. They provide services for private, public, and hybrid cloud infrastructures and also offer app modernizations and enhanced security protections to keep your business function in the cloud protected, stable, and secure. 

The security options available from VMware include:

Intrinsic Security
Simplify security by leveraging your infrastructure to protect apps and data from endpoint to cloud.

AppDefense
Workload protection embedded in the hypervisor and distributed across your entire environment

NSX Distributed IDS/IPS​
Advanced threat detection engine purpose-built to detect lateral threat movement on east-west network traffic

NSX Intelligence
Distributed analytics engine that provides automated security policy recommendations & audit trail of security policies

SecureState
Real-time insights for proactively managing cloud security and compliance risks

Workspace ONE
Digital workspace platform that enables Zero Trust

VMware Carbon Black Cloud
Cloud-native endpoint protection platform that helps prevent, detect, and respond to cyberattacks

VMware Carbon Black EDR
On-premises endpoint detection and response (EDR) for threat hunting and incident response

VMware Carbon Black App Control
On-premises app control and critical infrastructure protection

Features

Pricing Model
  • Monthly subscription per user
  • Yearly subscription per user
  • Metered per minute
  • Monthly site license
  • Yearly site license
  • Flat fee
  • Monthly subscription
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Target Company Size
  • Startup
  • Small-to-Medium Business
  • Enterprise
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
  • Account Manager
Mobile Apps Offered
  • None
  • iOS
  • Android
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars
Compatible Operating System(s)
  • Windows
  • iOS
  • Linux
  • Mac
  • Android
Deployment
  • Hosted/Cloud
  • On-Premise
  • Mobile
Mobile friendly?
  • Yes
  • No
Price
  • 1 - Inexpensive
  • 2
  • 3 - Moderate
  • 4
  • 5 - Expensive
Features
  • 1 - Limited features
  • 2
  • 3 - Moderate
  • 4
  • 5 - Full featured
Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?

The Essential Guide to Spam Control

What you need to know about managing junk messages.
Loading Reviews..