vmware, networking revolution

VMware: The Networking Revolution, Multi-Cloud Strategies, and Mapping the Future

  • By
  • October 12, 2016
0 Comment

Over the last several months Rajiv Ramaswami, EVP and GM of Networking and Security has told about how VMware NSX is driving cloud networking for the customers. Having missed Rajiv’s videos, you can always find the information in this review.

The Second Inning of a Nine-Inning Game: NSX Use Cases and the Networking Revolution

The software-defined networking revolution flows over more and more companies, including VMware vmware, networking revolutionthat is at the forefront of this revolution. Rajiv notes that today networking industry is becoming more disaggregated than ever. If firstly it used to build everything – from chips to systems to software and services, now the situation is constantly changing.

VMware customers from all corners of the globe are driving the rapid adoption of NSX as a key enabler to the cloud, and three use cases are arising as main applications of NSX:

  • micro-segmentation,
  • IT automation,
  • disaster recovery.

VMware’s vision continues to exist helping customers automate and secure workloads in the cloud, both in VMware private cloud environments and in containers or on non-VMware hypervisors in the private and public cloud. Despite of where these workloads are being run, NSX is able to help secure those workloads in very fine grain network policing, as well as automate them.

VMware NSX Is Becoming Critical to Multi-Cloud Strategies

vmware, multiple-cloud strategiesIn the second video, Rajiv discusses some of the customers that use NSX to manage multiple private and public cloud. He says there is one of the largest banks in the world that is using NSX as a basis to create extremely large private clouds. “They have those in production today, and they’re with us on a journey to extend NSX into the public cloud,” notes Rajiv.

Rajiv also talks about the success of a smaller customer in the media industry that’s using NSX to aggregate multiple public clouds inherited through some acquisitions. VMware NSX is allowing them to manage security, automation, and continuity across two data centers using a single, private cloud.

Furthermore, these customers are driving consistency of policy from their data centers to their branch offices by extending NSX to all their sites.

Mapping the Future of VMware NSX

vmware, mapping the futureRajiv says that they are continually trying to solve their customers’ problems. As part of this continued commitment, VMware recently acquired Arkin, a leader in software-defined data center security and operations.

When customers deploy NSX, their common wish is to achieve two things. Firstly, they want to have visibility into which applications are talking to which within the data center, while the second thing is ‘day two’ operations support following deployment.

In order to manage these customer imperatives, VMware integrated Arkin into the vRealize® Automation™ suite, the product given a new name – VMware® vRealize® Network Insight™.

This acquisition will undoubtedly bring big, positive changes for NSX and customers. As Rajiv notes “the combination of vRealize Network Insight along with NSX is a great thing for customers. It helps them understand what they have in their data centers, and it provides them with visibility and operational support for their deployments.”

 

This recap was originally published by VMware Education and Certification Blog

Comments
* The most recent comment are at the top

Interesting posts

CompTIA CYSA+ CS0-002 – Enumeration Tools Part 1

1. Enumeration Tools (OBJ 1.4) Enumeration tools. In this lesson, we’re going to talk about some of the enumeration tools that we’re going to experience as we’re trying to enumerate our networks. Now, what exactly is enumeration? Well, enumeration is the process to identify and scan network ranges and hosts that belong to the target… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 3

6. Scheduling and Constraints (OBJ 1.3) Scheduling and constraints. In this lesson, we’re going to talk about scheduling and constraints. So the first question I have for you is, how often should you scan? Well, this is going to be determined based on your internal risk management decisions of your organization. If you have a… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 2

4. Scanner Types (OBJ 1.3) Scanner types. In this lesson, we’re going to talk about the different ways you can configure your scanner. Now, different scanners have different capabilities. Some are going to be passive, some are going to be active, and some are going to be active with particular configurations that we’re going to… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 1

1. Identifying Vulnerabilities (OBJ 1.3) Identifying vulnerabilities. In this lesson, we’re going to talk about the importance of identifying vulnerabilities. And the way we do this is through a vulnerability assessment. Now, it is really important to identify vulnerabilities so that you can then mitigate those vulnerabilities. Remember, every vulnerability in your system represents a… Read More »

CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 2

4. Hardening and Patching (OBJ 1.3) Hardening and patching. In this lesson we’re going to talk about two key terms. And I know I’ve used these words before, but we’ve never really defined them. These are hardening and patching. Now, when I talk about system hardening, this is the process by which a host or… Read More »

CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 1

1. Mitigating Vulnerabilities (Introduction) In this section of the course, we’re going to cover how to analyze output from vulnerability scanners. We’re going to stay in domain one in this section of the course, but we are going to cover multiple objectives this time, including objective 1213 and one four. Now, objective one two states… Read More »

img