VMware, Inc. (NYSE: VMW) today announced that global market research firm Forrester has named VMware a leader in The Forrester Wave™: Endpoint Security Software As A Service, Q2 20211.
“We are incredibly proud to be named a leader in The Forrester Wave™,” said Patrick Morley, senior vice president and general manager of VMware’s Security Business Unit. “Following the VMware acquisition of Carbon Black just 18 months ago, we set out to challenge the status quo of security and further the vision of creating a world safe from cyberattacks. We believe this recognition validates both our vision and commitment to our customers to help ensure security is an essential element of their business strategy and is at the core of their digital infrastructure.”
Today, VMware Carbon Black Cloud analyzes more than one trillion security events per day across millions of global endpoints. VMware aims to reduce the friction between IT security and operations, as noted by The Forrester Wave™. In addition to breaking down these siloes, VMware is focused on setting the industry standard for context-centric security that is built into cloud and user infrastructure. This accelerates detection and response of cyber threats to better empower VMware customers to stop emerging attacks.
Upon evaluation for The Forrester Wave™, VMware received the highest possible scores in the criteria of malicious behavior protection, threat hunting, detection efficacy, secure configuration management, mobile security, OS support, application control, enterprise customer base, partner ecosystem, zero-trust framework alignment, and corporate strategy.
According to The Forrester Wave™ report, “VMware offers a full portfolio of device security, digital workspace, and virtualization technologies and services supporting their vision to unify infrastructure, security, and IT management for their customer’s environments. Its primary endpoint security offering, Carbon Black Cloud offers SaaS-delivered threat prevention, device hardening, secure configuration, automatic attack detection, and threat hunting. Its integrations between access controls, device management, device security, network security, and applications allow for granular, risk-based security policies in support of a Zero-Trust strategy.”
For more such updates and perspectives around Digital Innovation, IoT, Data Infrastructure, AI & Cybsercurity, go to AI-Techpark.com.