Protect applications in the virtual datacenter from network-based threats with VMware vShield App, part of the VMware vShield family. Get deep visibility into network communications and enforce granular policies with security groups. Eliminate hardware and policy sprawl with a cost-effective solution.
Protect your applications against internal network-based threats and reduce the risk of policy violations within the corporate security perimeter using application-aware firewalls with deep packet inspection and connection control based on source and destination IP addresses. Because VMware vShield App plugs directly into VMware vSphere you can create and manage policies that adapt to dynamic cloud environments.
As a hypervisor-based application-aware firewall solution, VMware vShield App installs on each VMware vSphere host and controls and monitors all traffic between virtual machines using business-relevant policies. Apply these policies to logical, dynamic application boundaries instead of physical boundaries.
Eliminate blind spots
Define and enforce granular policies for all traffic between applications, increasing visibility into traffic while helping to eliminate detours to physical firewalls.
Maintain change-aware protection
Ensure network topology changes do not impact application security with continuous firewall protection for virtual machines as they migrate from host to host.
Accelerate IT compliance
Get increased visibility and control over virtual machine network security with the logging and auditing controls you need to demonstrate compliance with internal policies and external regulatory requirements.
Secure business-critical applicationProduct Highlights
Easily support application belonging to different trust levels on the same virtual datacenter The hypervisor-level firewall in VMware vShield ensures that proper segmentation and trust zones are enforced for all application deployments.
- Increase visibility and control over network communications between virtual machines
- Eliminate the need for dedicated hardware and VLANs to separate different security groups
- Optimize hardware resource utilization while maintaining strong security
- Simplify compliance with comprehensive logging of all virtual machine network activity