Xceedium extends security capabilities to VMware vShield and vCloud
Posted on 29 August 2013.
Bookmark and Share
Xceedium is extending Xsuite’s security and audit capabilities to VMware vShield and vCloud. Customers using VMware’s software-defined datacenter tools and its Private Cloud and Hybrid Cloud environments can leverage Xsuite to address essential privileged user security and compliance requirements.


Xsuite already protects guest systems running in VMware vSphere along with the VMware management console. Xceedium is extending Xsuite access control, SSO, and graphical session recording capabilities to vCloud Director, vShield Manager, and vSphere Web Client. Unlike other solutions, Xsuite provides protection for both host systems running on the VMware hypervisor, and the vSphere and vCloud management consoles.

“This announcement extends Xceedium’s leading position in privileged identity management for VMware hybrid-cloud environments,” noted Xceedium CEO, Glenn C. Hazard. “We are pleased to have worked so closely with VMware to deliver this solution to the marketplace. We intend to continue this collaboration and quickly integrate Xsuite with VMware NSX and vCloud Hybrid Services (vCHS) as VMware makes software-defined datacenters a strategic imperative.”

In the wake of the NSA Snowden breach and similar breaches at commercial organizations, protecting infrastructure from the risks privileged users and systems administrators pose has become increasingly important. It has also spawned additional regulatory scrutiny and new security requirements for multiple industries including: FedGov/FISMA (NIST 800-53 revision 4), Retail/PCI DSS, and Energy/NERC Critical Infrastructure Protection (NERC/CIP). Xsuite is specifically designed to help organizations mitigate privileged user risks and address these regulatory mandates.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //