Featured
CISOs: How to Maintain your Security (and Sanity) in a Hybrid Cloud World

CISOs: How to Maintain your Security (and Sanity) in a Hybrid Cloud World

The cloud isn’t going anywhere.  By 2020, Forbes says 83 percent of enterprise workloads will be in the cloud . Gartner agrees, stating that by 2021, over 75 percent of midsize and large organizations w ill have adopted a multiclo...
Read More
Application Visibility in Incident Response: How to Keep Unchecked Workload Sprawl In Check!

Application Visibility in Incident Response: How to Keep Unchecked Workload Sprawl In Check!

Just a few years ago, migrating to cloud was not a priority IT choice for enterprises. Today, the IT landscape is changing rapidly, and cloud is now becoming the preferred method of accessing and delivering technology because of i...
Read More
Cloud Security: Do you know how big your blast radius is?

Cloud Security: Do you know how big your blast radius is?



If you don’t know how big your blast radius is, that’s just a ticking time bomb... waiting to go off. Cloud transforms your blast radius of an attack exponentially and it is imperative that you understand and respond appropriately...
Read More
vArmour and VMware Team for DevOps and Continuous Compliance

vArmour and VMware Team for DevOps and Continuous Compliance

I am so excited about the global momentum we’ve built with large organizations around our collaboration announcement with VMware to provide continuous compliance on NSX-T.  The DevOps world has shifted from periodic to continuous ...
Read More
Introducing 'Semi-Serious Security' Video Series

Introducing 'Semi-Serious Security' Video Series

“ Semi-Serious Security” is vArmour's new spontaneous and informal video podcast series where we interview cybersecurity professionals from around the world in a fun and relaxed way. Our mission is to increase the conversation aro...
Read More
Azure Case Study:  How vArmour is helping a large organization with their multicloud project

Azure Case Study: How vArmour is helping a large organization with their multicloud project

If you’re one who pays attention to financial news, you may have recently heard that Microsoft has surpassed Apple to become (at the date of this blog post) the world’s most valuable company in terms of market cap. Twenty-four mon...
Read More
vArmour Named a 2019 Distinguished Vendor by TAG Cyber Security

vArmour Named a 2019 Distinguished Vendor by TAG Cyber Security

We are proud to announce that TAG Cyber Security has selected vArmour as a Distinguished Vendor in the 2019 TAG Cyber Security Annual. We are honored to be included in this exclusive list, validating our approach to hybrid-cloud s...
Read More
Unpacking Containerization Part 2: vArmour, Containers, and DevSecOps

Unpacking Containerization Part 2: vArmour, Containers, and DevSecOps


DevSecOps is a philosophy of software development that understands security risks in a holistic manner. The software AND infrastructure should hardened against threats, and the ownership of security is shared between product manag...
Read More
Unpacking Containerization Part 1: Defining Container Technology and Its Benefits

Unpacking Containerization Part 1: Defining Container Technology and Its Benefits


Containers are exploding in popularity and are becoming the preferred method for deploying applications. In this four-part Unpacking Containerization blog series, we will explain the benefits of containers, the challenges of conta...
Read More
Customers Love Us on Gartner Peer Insights!

Customers Love Us on Gartner Peer Insights!

If you haven’t heard, customers love us on Gartner Peer Insights! What is Gartner Peer Insights? You can think of Peer Insights like Gartner’s version of Yelp for enterprise IT software. It’s where IT professionals leave anonymous...
Read More
New Features in App Explorer for Application Visibility

New Features in App Explorer for Application Visibility





vArmour is excited to announce its newest addition to the App Explorer visibility solution for critical applications - the Microsoft SQL Security Risk Report. This detailed report provides deeper insight into the configuration, de...
Read More
Are you ready for GDPR?

Are you ready for GDPR?

With just weeks to go until the General Data Protection Regulation (GDPR) becomes enforceable on May 25, most global companies are racing to prepare. They all want to avoid the substantial fines (up to four percent of revenue) and...
Read More
Building Cyber-Resilience

Building Cyber-Resilience

laughing
What a year we’ve seen! In addition to the continued ‘Mega Breaches’ we’ve seen increasing evidence that software complexity means there is no such thing as ‘Secure Code’. We’ve seen huge holes in common protocol implementations (...
Read More
Microsegmentation for Consolidation - Journey of a Legal Enterprise Customer

Microsegmentation for Consolidation - Journey of a Legal Enterprise Customer

As the head of World Wide Professional Services at vArmour, I have had the honor of working with some of the largest companies in the world across finance, telco and healthcare to help them in their journey towards microsegmentati...
Read More
Cloud Security Predictions for 2018

Cloud Security Predictions for 2018


Considering it’s the season for annual predictions, I asked a few of the leaders and experts at vArmour to tell us what they think 2018 will bring. Since we spend our time at vArmour helping our customers secure their clouds and h...
Read More
Securing Enterprise Applications and Data: vArmour Approach

Securing Enterprise Applications and Data: vArmour Approach


The diverse nature of today’s corporate networks demand a security response that’s no longer fixated on data center hardware and perimeter defenses, or the accumulation of extensive suites of security products. Instead, security n...
Read More
vArmour Named SINET 16 Innovator Award Winner For Second Time

vArmour Named SINET 16 Innovator Award Winner For Second Time

The Security Innovation Network (SINET) has selected vArmour as a SINET 16 Innovator for the second time in the last 3 years. We were proud to have first won this in 2015, and beyond proud to be named a winner again this year, val...
Read More
vArmour Policy Automation: Intent-Based, Simple and Safe

vArmour Policy Automation: Intent-Based, Simple and Safe


Policy automation is a rather broad term. Both policy and automation could mean many things to many people. In network security, policy is often viewed in terms of firewall (or firewall-like) rules, which in theory are manifestati...
Read More
vArmour’s Marketing department wins 2017 Stevie Award!

vArmour’s Marketing department wins 2017 Stevie Award!

vArmour’s Marketing team was recently recognized with the 2017 Stevie Award for Marketing Department of the Year. Led by CMO Eva Tsai, the team is infused with her DNA: smart, analytical, resourceful, and agile. Eva and her team e...
Read More
Turning Customers Into Partners: vArmour & Marketo

Turning Customers Into Partners: vArmour & Marketo

A business’s success is determined, in part, by its ability to connect with its customers. Marketing lives and dies by how well they can relate to customers in ways that reflect their aims and challenges. vArmour takes pride in ho...
Read More
This Is The Age Of Microsegmentation

This Is The Age Of Microsegmentation


Microsegmentation has taken center stage! Gartner just issued a report titled “Comparing Products for Microsegmentation in Virtualized Data Centers,” concluding that microsegmentation has become a top priority for security control...
Read More
Segmentation: The Chokehold for Malware

Segmentation: The Chokehold for Malware

This past week, the world braced itself for WannaCry 2.0 when the Petya malware infected over 12,000 machines in around 65 countries, including the United States. News outlets stumbled through misinformation as security researcher...
Read More
What are you really securing - Containers only or your entire cloud?

What are you really securing - Containers only or your entire cloud?


As microservice based applications continue to grow in significance, many organizations are finding themselves in the middle of grassroots efforts to build out new container based environments that are simple, scalable, and secure...
Read More
Real-world Healthcare Customer Case: WannaCry

Real-world Healthcare Customer Case: WannaCry

Network defenders are no strangers to worms or ransomware, but last Friday’s unprecedented, global cyber incident was caused by a lethal combination of both kinds - an aggressive worm that spread in parallel inside local networks ...
Read More
Riding the Wave of New Cybersecurity Regulations with Stateful Segmentation

Riding the Wave of New Cybersecurity Regulations with Stateful Segmentation

Despite the fact that we often view regulations as preventative measures designed to protect individuals, enterprises, or governments, the truth is that a large percentage of regulations are actually enacted in response to things ...
Read More
Application-Aware Microsegmentation on Cisco ACI

Application-Aware Microsegmentation on Cisco ACI


The best enterprise infrastructures today are Agile - this means that they are programmable and automated, with full insight and visibility into every layer of the environment to ensure that the infrastructure stays dynamic and co...
Read More
Achieving End-to-End Multi-Cloud Security with vArmour DSS + SD-WAN

Achieving End-to-End Multi-Cloud Security with vArmour DSS + SD-WAN



If you’ve attended any of the various open networking or SDN-centric industry events in the past few years, you may have recently noticed a shift in what folks are talking about and which booths have some of the most prominent dis...
Read More
Securing User Access Into the Cloud Data Center

Securing User Access Into the Cloud Data Center


IT organizations are faced with the growing problem of the adoption and integration of disparate technologies. The exponential increase in connected devices and IOT has driven the need to support BYOD and enhanced user access and ...
Read More
Collaborating with Customers: Adam Savage from the University of Waterloo

Collaborating with Customers: Adam Savage from the University of Waterloo

The vArmour Customer Partnership Program offers customers a unique opportunity to meet our executive and R&D teams to share their knowledge, insights and success, which in turn help shape the direction of our product. We recen...
Read More
Tom August, CISO at John Muir Health Discusses Risk Planning on RSAC TV

Tom August, CISO at John Muir Health Discusses Risk Planning on RSAC TV

At this year’s RSA Conference in San Francisco, Tom August, Chief Information Security Officer at John Muir Health met with Sara Peters, Senior Editor at Dark Reading to discuss healthcare risk assessment and planning. The intervi...
Read More
Desert Research Institute Visits vArmour HQ

Desert Research Institute Visits vArmour HQ


Our goal at vArmour is to keep our customers at the core of our business… to be a customer-centric organization that learns from our customers and their experiences. We periodically invite key customers to spend a day at our Mount...
Read More
How vArmour Adds Value in Your Migration to Cisco ACI

How vArmour Adds Value in Your Migration to Cisco ACI

I was recently speaking to a customer in the critical infrastructure segment who planned to migrate from a legacy Cisco Data Center network to Cisco Nexus 9K and eventually ACI. This customer’s systems were hyper-sensitive, highly...
Read More
Creating Success Criteria for Service Providers

Creating Success Criteria for Service Providers

Service providers today face some interesting challenges. Regardless of their size, or which vertical or horizontal segment they see as their dominant market, they still have to meet certain criteria in order to remain competitive...
Read More
5 Reasons Why vArmour DSS and Cisco ACI are Better Together for the Modern Data Center

5 Reasons Why vArmour DSS and Cisco ACI are Better Together for the Modern Data Center

The Cisco ACI architecture is based upon a Spine and Leaf network fabric where all connections are point-to-point and fully meshed, delivering great performance and resiliency.  A great advantage of the Spine and Leaf model is a c...
Read More
When an OS Vulnerability Undermines Your Entire Security Stack - The Case for Control Independence

When an OS Vulnerability Undermines Your Entire Security Stack - The Case for Control Independence

In our last blog about agents - The Problem with Agents (as a Primary Means of Security Policy Enforcement) - our CTO Marc Woolward called out several areas in which the effectiveness of an agent as a means of security control is ...
Read More
Simple, Scalable, Secure Cyber Deception: Introducing vArmour DSS Deception

Simple, Scalable, Secure Cyber Deception: Introducing vArmour DSS Deception

"It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts." -Sherlock Holmes Deception for cybersecurity: On the rise One of the great fortun...
Read More
The Problem with Agents - as a Primary Means of Security Policy Enforcement

The Problem with Agents - as a Primary Means of Security Policy Enforcement

In earlier blogs, I talked about the differences between microsegmentation approaches , and the fundamental differences to look out for. One of the differences I mentioned is whether: 1) Controls are independent of the workload or...
Read More
[Video] CTO of Education Networks of America on Protecting Our Kids’ Data

[Video] CTO of Education Networks of America on Protecting Our Kids’ Data

Our nation’s schools, colleges, and universities are responsible for our country’s most precious assets— our children. In addition to their physical security, these organizations are also charged with the task of keeping our stude...
Read More
[Video] Head of Infrastructure of Equens on the Importance of Proactive Cloud Security

[Video] Head of Infrastructure of Equens on the Importance of Proactive Cloud Security

Of all the customers I meet, those in financial services are undergoing one of the most significant shifts when it comes to the digitization of their industry, replacing their brick and mortar locations that see hundreds of custom...
Read More
A New Cloud Security Unicorn Will Rise From The Cybersecurity Ashes

A New Cloud Security Unicorn Will Rise From The Cybersecurity Ashes

After a boisterous 2015, 2016 looks gloomy for the cybersecurity industry as the market correction and uncertain macro economic environment set in. Last year, investors on Sand Hill Road poured $3.8 billion into security startups,...
Read More
Preparing For Application-Layer Security Vulnerabilities

Preparing For Application-Layer Security Vulnerabilities



We have seen a steady stream of attacks over the last few years, many of which resulted in monumental losses of data and embarrassment for organizations. But not all breaches are attributed to an organizational mistake. Take for e...
Read More
Security Architectures for Cloud Data Centers

Security Architectures for Cloud Data Centers



Organizations are entering the first phase of microsegmentation architectures: the act of deploying security policies across scale-out data center networks in order to separate diverse workloads, collapse legacy physical zones, an...
Read More