VMware and Vera Delivers Real-Time Data Security Across Devices
PALO ALTO, CA: Vera has stepped into a strategic partnership with VMWare to offer data security, control and policy management across physical, virtual and cloud-hosted environments. Vera provides data security, classification and control across the end-user computing environment for completing VMware’s vision, besides offering in-depth visibility into user behavior.
"For the first time, business around the world can successfully manage devices, users, applications, and security across physical and virtual environments at the click of a button. Never before has there been a solution that enables 360-degree security for data at rest, data in motion, and data in use, until now," says Ajay Arora, CEO, Vera.
VMware's unified application management platform combines Vera seamlessly with existing workflows presenting users with highest levels of security without compromising on productivity. The 2 companies work towards delivering real-time data security for every user and device, in every organization. Major functionalities include:
Streamlining security for IT and end users: VMware’s customers can simplify the deployment and management of advanced security solutions across any device without impacting the user experience. The security status of any business can be improved by realizing deployment, configuration, and compliance monitoring.
Securing end user computing, from the desktop to the data: Vera enhances the data security of VMware customers with strong encryption, tracking capabilities and simple security audits for information — in rest, in-motion, and in-use forms; without storing customer data. Access to confidential information can be revoked or changed at any time through user or company-managed policies.
Centralized insight into usage, events, and access: Monitoring and management of data security is simplified across the enterprise. Storage and content-agnostic platform delivers detailed, real-time logging, alerts and usage data across devices; allows security team to detect potential data breaches based on data usage and policy-compliance. In case of suspicious data loss, confidential information is identified, isolated and locked down immediately.
By Dr. John Bates, CTO, Intelligent Business Operations &...
By Denise Zabawski, CIO, Nationwide Childrens Hospital
By Cynthia Weaver, A.V.P of IT, Walbridge
By Kris Lappala, CIO, Kiewit
By Sherry Aaholm, VP & CIO, Cummins [NYSE:CMI]
By Leo Casusol, CIO, Liquidity Services
By Joe Fuller, VP/CIO, Dominion Enterprises
By Dennis Fiszer, CCO, HUB International
By David Butler, Sr. Director, Digital Customer Experience,...
By Mark Jacobsohn, SVP, Booz Allen Hamilton
By Miguel Gamino, CIO & Executive Director-Department of...
By Jonathan Reichental, CIO, City of Palo Alto
By Pam Puetz, VP & HR Services, First American Financial...
By Aref Matin, CTO, Ascend Learning
By Jim Sills, CIO/Cabinet Secretary, State of Delaware
By Jesse Laver, Vice President Global Sector Development,...
By Andy Newsom, CIO, CSL Behring
By Jason Cook, CISO, BT Americas [NYSE:BT]
By Jim Grubb, VP Marketing & Chief Demonstration Officer, Cisco
By Don Lindsey, VP and CIO, Tallahassee Memorial HealthCare