everythingpossible - Fotolia
VMware doesn't intend for AppDefense to operate alone. The service directly interacts with other VMware products, such as vSphere 6.5 and vCenter, and also offers the ability to integrate its VMware application monitoring technology with third-party endpoint and security information and event management tools. These third-party tools use VMware AppDefense features and functionality, which will enable users to continue using familiar tools rather than adding AppDefense as a separate security tool.
VMware has announced five major integrations to launch AppDefense. These integrations include IBM's QRadar security analytics platform -- added through the IBM Security App Exchange -- RSA's NetWitness Suite, Carbon Black's Reputation Service, SecureWorks' Cloud Guardian products and Puppet Enterprise. Integration of VMware application monitoring with additional third-party tools might become available in the future as AppDefense becomes more established.
Such integration will enable third-party tools to provide better security insight into the behaviors and dependencies of each virtualized workload, as well as automated response and remediation capabilities in the face of unexpected or unplanned application behaviors. As an example, SecureWorks' Counter Threat Platform (CTP) will use VMware application monitoring to understand the importance and criticality of any variations from an application's intended state. This can help CTP end unusual behaviors before they seriously damage the application or the enterprise.
Dig Deeper on Using monitoring and performance tools with VMware
Related Q&A from Stephen J. Bigelow
Get to know VMware vSphere's Admission Control tool and use it to reserve the resources necessary for VM failover with cluster resource calculations ... Continue Reading
Use heartbeats, VM monitoring and application monitoring to fully examine the causes of VM unresponsiveness. Adjust sensitivity levels to focus on ... Continue Reading
Combine Distributed Resource Scheduler and vSphere High Availability to design balanced failover clusters. Pay attention to affinity rules, which can... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.