Developers: | VMware |
Date of the premiere of the system: | 2020/03/19 |
Branches: | Information technologies |
Technology: | ITSM - Management systems for IT service, cybersecurity - Information management and events in a security system (SIEM) |
VMware Secure State allows to correct violations in cloud configurations in real time using the automated protection of a configuration and instruments of monitoring of normative and legal compliance in cloud environments. It allows to prevent implementation of threats of information security with serious consequences for business.
2020: Pro-active risk reduction and automatic recovery within cloud environments
On March 19, 2020 the VMware company provided additional opportunities of VMware Secure State for pro-active risk reduction and automatic recovery within cloud environments.
Thanks to a possibility of VMware Secure State in real time to define threats and to liquidate their effects, customers can close a circuit of protection of cloud environments and provide compliance to requirements of the regulator proactively to reduce risks. VMware Secure State provides a flexible framework of disaster recovery which automates transactions in multicloud environments. As of March, 2020 the tool is in a stage a beta. This solution will promote cooperation of specialists in cloud security and DevOps-commands and formation of trust in process of gradual scaling of best practices. Service "from a box" provides the ready, in advance defined transactions and also opportunities for creation of the user procedures in the form of the code. Procedures can be used for selective recovery of resources on the basis of conditions, such as cloud accounts, regions or tags of resources, noted in VMware.
According to the developer, security experts will have the exhausting opportunities for general management by cloud risks. They can independently paketno or correct the errors which are available in configurations, or publish necessary procedures, thereby delegating responsibility for decision making to DevOps-commands. To prevent new errors in configurations, security experts can register rules for automatic correction of violations in real time. Thanks to approach of policy-as-code users can using API at the programming layer perform all procedures of recovery and integrate them into CI/CD pipeline. Regardless of what procedures were started, clients will retain the centralized control over process of recovery and changes in cloud resources.
2018: Description of opportunities of VMware Secure State
As of 2018 the solution VMware Secure State helps to reduce risks in multicloud environments. Allows to correct violations in cloud configurations in real time using the automated protection of a configuration and instruments of monitoring of normative and legal compliance in cloud environments. It allows to prevent implementation of threats of information security with serious consequences for business. VMware Secure State also provides:
- Obtaining reliable information about security: the solution indexes cloud assets and creates model of cloud infrastructure using which it is possible to reveal as the typical vulnerabilities inherent in any cloud, and the whole class of "the connected threats" which arise at the different levels of the interconnected cloud services. It provides the context information and visualizes "a chain of threats" for objects and their communications in a cloud.
- Detection in real time: the solution monitors all changes in a security system of cloud infrastructure in real time and also issues notifications on modification of objects and the related services which can be affected by these changes. VMware Secure State actively spreads the analytical information on security of configurations between security experts, engineers of a cloud and the DevOps commands.
- Continuous compliance to regulatory requirements: the solution includes available "from a box" monitors of normative legal compliance and preparation of the corresponding reports.