VMware | June 17, 2022
VMware Inc. a leading innovator in enterprise software, today announced it has been positioned as a Leader in three recent IDC MarketScape reports related to the Unified Endpoint Management (UEM) space:
IDC MarketScape: Worldwide Unified Endpoint Management Software 2022 Vendor Assessment
IDC MarketScape: Worldwide Unified Endpoint Management Software for Apple Devices 2022 Vendor Assessment
IDC MarketScape: Worldwide Unified Endpoint Management Software for Ruggedized/Internet of Things Device Deployments 2022 Vendor Assessment
The evaluated solution, VMware Workspace ONE, enables customers to automate management and security for all endpoints (including mobile, desktops, AR/VR, and mission-critical frontline devices) running any OS (including iOS/iPadOS, Android, Windows 10/11, macOS, Linux, and Chrome OS) and any app, across diverse use cases, all from an integrated digital workspace platform.
The UEM vendor assessment report states, “Workspace ONE addresses a broad range of device types and use cases across vertical industries, from traditional mobility management to modern Windows PC and Mac management and IoT device management. The UEM component of Workspace ONE is also part of a broader product portfolio from VMware's end-user computing group, including VMware Horizon desktop virtualization, endpoint and application analytics, and endpoint security based on technology acquired in the purchase of Carbon Black. VMware made a number of improvements and advancements in Workspace ONE in 2021, including augmented management capabilities for Apple's macOS devices, as well as Windows management.”
“As organizations evolve to support a hybrid workplace, they must establish an engaging and more secure experience across all devices. VMware Workspace ONE supports this mission by enabling customers to automate management of every device for any use case. This latest recognition from the IDC MarketScape reflects our continued drive to provide a single solution for our customers that can help IT secure a fully distributed workforce.”
Shankar Iyer, senior vice president and general manager, End-User Computing, VMware
To access an excerpt from the “IDC Marketscape: Worldwide Unified Endpoint Management Software 2022 Vendor Assessment” (doc #US48325122, May 2022), click here. An excerpt of the “IDC MarketScape: Worldwide Unified Endpoint Management Software for Apple Devices 2022 Vendor Assessment” (doc #US48325222, May 2022) report is available here. An excerpt of the “IDC MarketScape: Worldwide Unified Endpoint Management Software for Ruggedized/Internet of Things Device Deployments 2022 Vendor Assessment” (doc #US48325322, May 2022) report is available here.
About IDC MarketScape:
IDC MarketScape vendor assessment model is designed to provide an overview of the competitive fitness of ICT (information and communications technology) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. The framework also provides technology buyers with a 360-degree assessment of the strengths and weaknesses of current and prospective vendors.
VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact.
Scale Computing | January 27, 2022
Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, announced that its HC3 for Video Surveillance has been selected as a finalist in TechTarget’s Storage Magazine and SearchStorage.com’s annual Products of the Year Awards for 2021. TechTarget named Scale Computing’s HC3 Video Surveillance, a Milestone validated solution, as a finalist in the Hyperconverged & Composable Infrastructures category.
In its announcement, SearchStorage highlighted that Scale Computing’s HC5250D-V appliance “is purpose-built to be the infrastructure for video management systems and building automation systems. The product combines the high availability, simplicity, and scalability of Scale Computing's popular HC3 family. Video surveillance is one of the most prevalent edge uses, and this product fits into a small footprint.”
There is a growing need for edge computing to support an application-driven world as technology continues to extend its way into every part of the business. The need for video surveillance implementations are critical to business security and monitoring, and traditional video management systems simply aren’t enough for organizations today. We are committed to delivering innovative solutions, like video surveillance and HC3 Edge technology, to bring simple, available, and affordable infrastructure for applications in places where IT resources are impossible.”
Jeff Ready, CEO and co-founder of Scale Computing
Organizational demands for video surveillance and security systems continue to evolve to ensure assets, facilities, and people are protected. Scale Computing solves the challenge and complexity of virtualization deployments of video surveillance and access control applications for both customers and systems integrators alike. Verified to run on the most popular VMS solutions including Milestone, Digital Watchdog, and Axis, the HC3 Video Surveillance solution combines the scalability, simplicity, and high availability of Scale Computing’s HC3 family.
This news follows exciting award wins for the company, including:
Scale Computing’s HC3 Video Surveillance named a winner for the 2021 CRN Tech Innovator Awards in the Edge Computing category.
Scale Computing named on CRN’s 2021 Edge Computing 100 list.
Winner in both the Edge Computing category and the Converged/Hyperconverged Infrastructure category, of the 2021 CRN Annual Report Card (ARC) Awards. This is the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner.
Scale Computing HC3 received two TrustRadius 2021 Top Rated Awards, in Hyperconverged Infrastructure and Server Virtualization.
Scale Computing received a 5-Star rating in CRN’s 2021 Partner Program Guide.
The Storage Magazine 2021 Products of the Year Awards recognizes winners in five categories: Backup and Disaster Recovery Hardware, Software and Services; Cloud Storage; Disk and Disk Subsystems; Hyperconverged and Composable Infrastructures, and Storage System and Application Software. All enterprise storage products were judged based on technological innovation, performance, ease of integration, ease of use and manageability, functionality, and value.
About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform.
VMware Inc. | April 28, 2022
VMware Inc. (NYSE: VMW) today announced that the Defense Information Systems Agency (DISA) has added the Security Technical Implementation Guide (STIG) for VMware NSX® to the Department of Defense (DoD) Cyber Exchange.
The updated DISA STIG outlines the installation requirements, security policies and controls for deploying VMware NSX within the Department of Defense and other federal agencies. The STIG will also help provide a vetted, more secure baseline for non-DoD entities to measure their security posture.
Across the public sector, agencies are navigating accelerated innovation alongside the journey to Zero Trust security. As the threat landscape evolves, the release of DISA's STIG for VMware NSX will empower agencies to leverage VMware's advanced network virtualization and security platform to better protect and manage their multi-cloud environments. With VMware NSX, we are helping customers modernize their cloud networks to deliver apps faster while also protecting against today’s threats.”
Jennifer Chronis, vice president, public sector, VMware.
The STIG requirements confirm VMware NSX implementation is consistent with DoD cybersecurity policies, standards, architectures, security controls and validation procedures, when applicable NIST SP 800-53 cybersecurity controls are applied to all systems and architectures. The DISA STIG for VMware NSX provides guidance on configuring various components of an NSX environment, including the NSX Manager, Gateway Router, Distributed Firewall, and Gateway Firewall.
The latest version of NSX joins VMware vSphere and VMware vSAN for which DISA has previously released STIGs. To view the official STIG, visit the DoD Cyber Exchange Public website and view the STIG release memo for VMware NSX.
Multi‑Cloud for Mission Success
Earlier this month, VMware announced the findings of a study on how government agencies are scaling the use of multi-cloud environments. The study, titled “Multi-cloud Is The New Frontier Of Government IT," conducted by Forrester Consulting, found that while the move to multi-cloud is a priority, agencies face challenges in supporting growing cloud environments, including compliance standards, data security and upskilling employees.
VMware | February 09, 2022
As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and private cloud deployments vulnerable to attacks that target Linux-based workloads.
VMware, Inc. released a threat report titled “Exposing Malware in Linux-based Multi-Cloud Environments.” Key findings that detail how cybercriminals are using malware to target Linux-based operating systems include:
Ransomware is evolving to target Linux host images used to spin workloads in virtualized environments;
89 percent of cryptojacking attacks use XMRig-related libraries; and
More than half of Cobalt Strike users may be cybercriminals, or at least using Cobalt Strike illicitly.
Cybercriminals are dramatically expanding their scope and adding malware that targets Linux-based operating systems to their attack toolkit in order to maximize their impact with as little effort as possible. Rather than infecting an endpoint and then navigating to a higher value target, cybercriminals have discovered that compromising a single server can deliver the massive payoff and access they’re looking for. Attackers view both public and private clouds as high-value targets due to the access they provide to critical infrastructure services and confidential data. Unfortunately, current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and private cloud deployments vulnerable to attacks on Linux-based operating systems.”
Giovanni Vigna, senior director of threat intelligence at VMware
As malware targeting Linux-based operating systems increases in both volume and complexity amid a rapidly changing threat landscape, organizations must place a greater priority on threat detection. In this report, the VMware Threat Analysis Unit (TAU) analyzed the threats to Linux-based operating systems in multi-cloud environments: ransomware, cryptominers, and remote access tools.
Ransomware Targets the Cloud to Inflict Maximum Damage
As one of the leading breach causes for organizations, a successful ransomware attack on a cloud environment can have devastating consequences.(2) Ransomware attacks against cloud deployments are targeted, and are often combined with data exfiltration, implementing a double-extortion scheme that improves the odds of success. A new development shows that ransomware is evolving to target Linux host images used to spin workloads in virtualized environments. Attackers are now looking for the most valuable assets in cloud environments to inflict the maximum amount of damage to the target. Examples include the Defray777 ransomware family, which encrypted host images on ESXi servers, and the DarkSide ransomware family, which crippled Colonial Pipeline’s networks and caused a nationwide gasoline shortage in the U.S.
Cryptojacking Attacks Use XMRig to Mine Monero
Cybercriminals looking for an instant monetary reward often target cryptocurrencies using one of two approaches. Cybercriminals either include wallet-stealing functionality in malware or they monetize stolen CPU cycles to successfully mine cryptocurrencies in an attack called cryptojacking. Most cryptojacking attacks focus on mining the Monero currency (or XMR) and VMware TAU discovered that 89 percent of cryptominers used XMRig-related libraries. For this reason, when XMRig-specific libraries and modules in Linux binaries are identified, it is likely evidence of malicious cryptomining behavior. VMware TAU also observed that defense evasion is the most commonly used technique by cryptominers. Unfortunately, because cryptojacking attacks do not completely disrupt the operations of cloud environments like ransomware, they are much more difficult to detect.
Cobalt Strike Is Attackers’ Remote Access Tool of Choice
In order to gain control and persist within an environment, attackers look to install an implant on a compromised system that gives them partial control of the machine. Malware, webshells, and Remote Access Tools (RATs) can all be implants used by attackers in a compromised system to allow for remote access. One of the primary implants used by attackers is Cobalt Strike, a commercial penetration testing and red team tool, and its recent variant of Linux-based Vermilion Strike. Since Cobalt Strike is such a ubiquitous threat on Windows, the expansion out to the Linux-based operating system demonstrates the desire of threat actors to use readily available tools that target as many platforms as possible.
VMware TAU discovered more than 14,000 active Cobalt Strike Team Servers on the Internet between February 2020 and November 2021. The total percentage of cracked and leaked Cobalt Strike customer IDs is 56 percent, meaning that more than half of Cobalt Strike users may be cybercriminals, or at least using Cobalt Strike illicitly. The fact that RATs like Cobalt Strike and Vermilion Strike have become a commodity tool for cybercriminals poses a significant threat to enterprises.
“Since we conducted our analysis, even more ransomware families were observed gravitating to malware targeting Linux-based systems, with the potential for additional attacks that could leverage the Log4j vulnerabilities,” said Brian Baskin, manager of threat research at VMware. “The findings in this report can be used to better understand the nature of this malware and mitigate the growing threat that ransomware, cryptomining, and RATs have on multi-cloud environments. As attacks targeting the cloud continue to evolve, organizations should adopt a Zero Trust approach to embed security throughout their infrastructure and systematically address the threat vectors that make up their attack surface.”
The VMware Threat Analysis Unit (TAU) helps protect customers from cyberattacks through innovation and world-class research. TAU is composed of malware analysts, reverse engineers, threat hunters, data scientists, and intelligence analysts at VMware. To understand how to detect and prevent attacks that bypass traditional, file-centric, prevention strategies, TAU focuses on techniques that were once the domain of advanced hackers and are now moving downstream into the commodity attack market. The team leverages real-time big data, event streaming processing, static, dynamic and behavioral analytics, and machine learning.
TAU applied a composition of static and dynamic techniques to characterize various families of malware observed on Linux-based systems based on a curated dataset of metadata associated with Linux binaries. All the samples in this dataset are public and therefore they can be easily accessed using VirusTotal or various websites of major Linux distributions. TAU collected more than 11,000 benign samples from several Linux distributions, namely, Ubuntu, Debian, Mint, Fedora, CentOS, and Kali. TAU then collected a dataset of samples for two classes of threats, namely ransomware and cryptominers. Finally, TAU collected a dataset of malicious ELF binaries from VirusTotal that were used as a test malicious dataset. TAU started collecting the dataset in June 2021 and concluded in November 2021.
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the company’s 2030 Agenda.