VMware doesn't intend for AppDefense to operate alone. The service directly interacts with other VMware products,...
such as vSphere 6.5 and vCenter, and also offers the ability to integrate its VMware application monitoring technology with third-party endpoint and security information and event management tools. These third-party tools use VMware AppDefense features and functionality, which will enable users to continue using familiar tools rather than adding AppDefense as a separate security tool.
VMware has announced five major integrations to launch AppDefense. These integrations include IBM's QRadar security analytics platform -- added through the IBM Security App Exchange -- RSA's NetWitness Suite, Carbon Black's Reputation Service, SecureWorks' Cloud Guardian products and Puppet Enterprise. Integration of VMware application monitoring with additional third-party tools might become available in the future as AppDefense becomes more established.
Such integration will enable third-party tools to provide better security insight into the behaviors and dependencies of each virtualized workload, as well as automated response and remediation capabilities in the face of unexpected or unplanned application behaviors. As an example, SecureWorks' Counter Threat Platform (CTP) will use VMware application monitoring to understand the importance and criticality of any variations from an application's intended state. This can help CTP end unusual behaviors before they seriously damage the application or the enterprise.
Dig Deeper on Using monitoring and performance tools with VMware
Related Q&A from Stephen J. Bigelow
Microsoft Hyper-V on Windows comes with advanced protection schemes, including several virtualization-based security features the company introduced ... Continue Reading
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center ... Continue Reading
Some enterprises avoid the public cloud due to its multi-tenant nature and data security concerns. Learn what data separation is and how it can keep ... Continue Reading