VMware NSX Advanced Threat Protection helps make it easier to protect your organization from ransomware. With just a few clicks, you can enable NSX features that detect and prevent malicious files from moving through North-South and East-West traffic on your gateway firewall. NSX Network Detection and Response collects traffic to uncover all threat movements, correlating and visualizing the complete campaign blueprint. Equipped with a detailed threat timeline across your network, your security teams can determine the scope of an attack and prioritize resources. By unlocking the highest possible fidelity insights, you're able to face the most challenging threats.
We hope you've enjoyed walking through NSX 4.1 Security in this TestDrive lab. Please stay tuned for future labs to learn more.
In this section we will walk through VMware NSX Advanced Threat Prevention platform features
This section talks about how to login and the pre-requisites before starting the Lab
Your enterprise can now deploy VMware NSX Security as a standalone security product, deploying it in an existing environment with no changes to your network. NSX 4.1 provides strong, multi-cloud, easy-to-operationalize network defenses that secure application traffic within and across clouds. NSX 4.1 makes it easier for you to enable Zero Trust application access across multi-cloud environments—so you can secure traffic across applications and individual workloads with security controls that are consistent, automated, attached to the workload, and elastic in scale.
In this section, we will learn about Tanzu Service Mesh (TSM)
This section will walk you through demo access methods and get you set up to perform the demo.
In order to complete a SASE Secure Access walkthrough, you need the following, all of which are provided for you herein:
This section briefly overviews SD-WAN Quality of Experience (QoE).
This section provides more insight into SD-WAN Orchestrator's role in VMWare Secure Access.
Here're a couple key points:
To perform this part of the demo, you need:
Now we'll begin to enter the world of Secure Access.
Here are a few important notes on the benefits of Workspace ONE Tunnel.