|By Business Wire||
|February 20, 2014 12:21 PM EST||
Rapid7, a leading provider of IT security data and analytics software and services, today announced that Rapid7 Nexpose interoperates with the VMware NSX network virtualization platform to provide insight into threats and advanced risk management capabilities for virtualized environments. Rapid7 and VMware enable organizations to realize the value of Rapid7’s advanced security services across the software-defined data center while supporting customers’ speed and agility requirements.
“Rapid7 is committed to simplifying and improving security, enabling our customers to maximize the productivity of their teams,” said Lee Weiner, Senior Vice President of Products and Engineering at Rapid7. “Nexpose and VMware NSX enable teams to automate many network management processes, without sacrificing visibility into network risk.”
The VMware NSX network virtualization platform is the next major advancement in the software-defined data center. VMware NSX delivers a completely new operational model for networking and security, in effect a hypervisor for the network, to allow data center operators to provision network and security services at the same speed at which they provision computer resources. This enables organizations to rapidly deploy applications and services.
Nexpose and VMware NSX enable organizations to maximize these efficiency gains, while enhancing the visibility they need to effectively manage risk. Working with VMware NSX, Nexpose can perform scans directly through the hypervisor, reducing network bandwidth requirements and impact to virtual machines. Nexpose is capable of identifying and scanning virtual machines, regardless of network segment, ensuring security teams don’t need to be aware of changes to the network topology that might impact security measures.
“Organizations need to be agile, with the flexibility to quickly deploy and modify applications and all associated networking and security services on-demand,” said Hatem Naguib, Vice President, Networking and Security at VMware. “Our collaboration with Rapid7 enables security and IT teams to deliver enhanced productivity and agility to the organization, while managing vulnerability risk.”
Combining Nexpose and VMware NSX simplifies and automates many of the traditional challenges with current vulnerability assessment methods. This is a critical step towards real-time vulnerability and risk management with the following benefits:
- Real-time visibility through continuous discovery and vulnerability assessment of virtual machines on the network, regardless of network segmentation and topology.
- Reduced administration costs through automatic setup and configuration of Nexpose, without the need for dedicated security resources.
- Real-time protection of virtual assets through a centralized management console that integrates Nexpose risk data and enables users to implement security controls directly, including quarantining risky machines.
- Increased scanning performance through minimized network bandwidth and reduced impact on virtual machine as scanning is done directly through the hypervisor.
To learn more about the solution, please contact us at [email protected].
Rapid7's IT security solutions deliver visibility and insight that help you make informed decisions, create credible action plans, and monitor progress. They simplify risk management by uniquely combining contextual threat analysis with fast, comprehensive data collection across your users, assets, services and networks, whether on premise, mobile or cloud-based. Rapid7's simple and innovative solutions are used by more than 2,500 enterprises and government agencies in more than 65 countries, while the Company's free products are downloaded more than one million times per year and enhanced by more than 200,000 members of its open source security community. Rapid7 has been recognized as one of the fastest growing security companies by Inc. Magazine and as a "Top Place to Work" by the Boston Globe. Its products are top rated by Gartner and SC Magazine. For more information about Rapid7, please visit http://www.rapid7.com.
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
May. 30, 2015 06:30 AM EDT Reads: 3,265
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, discussed how developers are extremely well-poised to perform tasks critical for securing the application – provided that certain key obstacles are overcome. Arthur Hicken has been involved in automating various practices at Parasoft for almost 20 years. He has worked on projects including database dev...
May. 30, 2015 06:00 AM EDT Reads: 2,909
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at ...
May. 30, 2015 05:30 AM EDT Reads: 4,097
There has been a lot of discussion recently in the DevOps space over whether there is a unique form of DevOps for large enterprises or is it just vendors looking to sell services and tools. In his session at DevOps Summit, Chris Riley, a technologist, discussed whether Enterprise DevOps is a unique species or not. What makes DevOps adoption in the enterprise unique or what doesn’t? Unique or not, what does this mean for adopting DevOps in enterprise size organizations? He also explored differe...
May. 30, 2015 05:30 AM EDT Reads: 3,690
The emergence of cloud computing and Big Data warrants a greater role for the PMO to successfully manage enterprise transformation driven by these powerful trends. As the adoption of cloud-based services continues to grow, a governance model is needed to orchestrate enterprise cloud implementations and harness the power of Big Data analytics. In his session at Cloud Expo, Mahesh Singh, President of BigData, Inc., discussed how the Enterprise PMO takes center stage not only in developing the app...
May. 30, 2015 04:30 AM EDT Reads: 2,710
Cloud Foundry open Platform as a Service makes it easy to operate, scale and deploy application for your dedicated cloud environments. It enables developers and operators to be significantly more agile, writing great applications and deliver them in days instead of months. Cloud Foundry takes care of all the infrastructure and network plumbing that you need to build, run and operate your applications and can do this while patching and updating systems and services without any downtime.
May. 30, 2015 04:30 AM EDT Reads: 3,629
Are your Big Data initiatives resulting in Big Impact or Big Mess? In her session at Big Data Expo, Penelope Everall Gordon, Emerging Technology Strategist at 1Plug Corporation, shared her successes in improving Big Decision outcomes by building stories compelling to the target audience – and her failures when she lost sight of the plotline, distracted by the glitter of technology and the lure of buried insights. The cast of characters includes the agency head [city official? elected official?...
May. 30, 2015 04:30 AM EDT Reads: 3,427
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
May. 30, 2015 04:30 AM EDT Reads: 5,552
Storage administrators find themselves walking a line between meeting employees’ demands to use public cloud storage services, and their organizations’ need to store information on-premises for security, performance, cost and compliance reasons. However, as file sharing protocols like CIFS and NFS continue to lose their relevance, simply relying only on a NAS-based environment creates inefficiencies that hurt productivity and the bottom line. IT wants to implement cloud storage it can purchase a...
May. 30, 2015 04:30 AM EDT Reads: 2,903
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust...
May. 30, 2015 04:15 AM EDT Reads: 1,044
After a couple of false starts, cloud-based desktop solutions are picking up steam, driven by trends such as BYOD and pervasive high-speed connectivity. In his session at 15th Cloud Expo, Seth Bostock, CEO of IndependenceIT, cut through the hype and the acronyms, and discussed the emergence of full-featured cloud workspaces that do for the desktop what cloud infrastructure did for the server. He also discussed VDI vs DaaS, implementation strategies and evaluation criteria.
May. 30, 2015 04:00 AM EDT Reads: 4,641
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core...
May. 30, 2015 03:30 AM EDT Reads: 5,402
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
May. 30, 2015 03:00 AM EDT Reads: 5,815
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
May. 30, 2015 02:00 AM EDT Reads: 6,194
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a b...
May. 30, 2015 01:00 AM EDT Reads: 2,017