AttackIQ teams with VMware to offer expert advice on network security
AttackIQ's realistic adversary emulations will help VMware NSX clients test the efficacy of their network defenses
AttackIQ has announced its collaboration with VMware to help VMware NSX clients better assess their network security controls.
VMware's NSX security product line includes two solutions for network security: a VMware NSX service-defined Firewall to protect east-west network traffic and VMware NSX Advanced Threat Prevention for distributed IDS/IPS and advanced malware analysis.
In line with the globally accessible MITRE AT&CK framework, AttackIQ's Security Optimization platform can simulate the post-breach behavior of adversaries and constantly validate an organization's defenses through a library of adversary emulation scenarios.
Using AttackIQ and VMware NSX together gives security teams comprehensive, data-driven control over their security program. The combined solution allows for automated testing so organizations can identify issues and adjust security controls before an incident occurs.
"The outcome is that the organization's security controls work as intended, resources are aligned to address the most important threats, and the organization maximizes its return on investment," explained AttackIQ.
"While traditional penetration testing and red teaming can provide useful insights into security control effectiveness, their infrequent scheduling and limited scope fail to provide holistic, up-to-the minute data during security proof of values," said Chad Skipper, global security technologist at VMware.
RELATED RESOURCE
"AttackIQ will enable VMware NSX customers to proactively validate NSX Advanced Threat Prevention controls against emulated adversary behaviors, with the end result being increased confidence in their cybersecurity performance."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Commenting on its offering, AttackIQ said it approaches its solutions with an "assume breach" mindset, taking into account there is no question of if but when an intruder can breach a perimeter defense.
"As we have seen from supply-chain and ransomware intrusions, organizations need to assume breach and adopt advanced security capabilities to prevent successful attacks," said Carl Wright, AttackIQ CCO.
"VMware is one of the world's leading security providers, and we are excited to work with the VMware team to elevate our mutual customer's security program performance."
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
-
Securing your network in every direction with zero trustWhitepaper Webinar on the evolution of network security
-
Turning your log and incident data into real-time security insightsWhitepaper Integrate multiple data sources for a comprehensive security view
-
Do more with less: Optimizing servers with HPE to maximize VMware licensingWhitepaper Your trusted guide through the changes in the virtualization market
-
The impact of generative AI on businessWhitepaper Optimal and speedy GenAI computing performance
-
Fortify your future with HPE ProLiant Servers powered by IntelWhitepaper Enhance your security and manage your servers more effectively
-
Getting value from generative AIWhitepaper Become more productive and pursue innovation
-
The Gorilla Guide To… How HPE ProLiant Gen11 servers powered by Intel deliver trusted securityWhitepaper How systems, software, and connections are protected
-
Tech brief security bundleWhitepaper By Hewlett Packard Enterprise