IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

AttackIQ teams with VMware to offer expert advice on network security

AttackIQ's realistic adversary emulations will help VMware NSX clients test the efficacy of their network defenses

VMware app splash screen on a computer screen

AttackIQ‌ ‌has announced its collaboration with VMware to help VMware NSX clients better assess‌‌ ‌‌their‌‌ ‌‌network‌‌ ‌‌security‌‌ ‌‌controls. 

VMware's NSX security product line includes two solutions for network security: a VMware NSX service-defined Firewall to protect east-west network traffic and VMware NSX Advanced Threat Prevention for ‌distributed‌ ‌IDS/IPS ‌and‌ ‌advanced‌ ‌malware‌ ‌analysis.

In line with the globally accessible MITRE AT&CK‌ ‌framework, AttackIQ's Security Optimization platform can simulate the post-breach behavior of adversaries and constantly validate an organization's defenses through a library of adversary emulation scenarios.

Using AttackIQ and VMware NSX together gives security teams comprehensive, data-driven control over their security program. The combined solution allows for automated testing so organizations can identify issues and adjust security controls before an incident occurs.

"The outcome is that the organization's security controls work as intended, resources are aligned to address the most important threats, and the organization maximizes its return on investment," explained AttackIQ.

"While traditional penetration testing and red teaming can provide useful insights into security control effectiveness, their infrequent scheduling and limited scope fail to provide holistic, up-to-the minute data during security proof of values," said Chad Skipper, global security technologist at VMware.

Related Resource

Protecting your dispersed workforce

Cyber security in the new normal

how to protect remote workersDownload now

"AttackIQ will enable VMware NSX customers to proactively validate NSX Advanced Threat Prevention controls against emulated adversary behaviors, with the end result being increased confidence in their cybersecurity performance."

Commenting on its offering, AttackIQ said it approaches its solutions with an "assume breach" mindset, taking into account there is no question of if but when an intruder can breach a‌ ‌perimeter‌ ‌defense.

"As we have seen from supply-chain and ransomware intrusions, organizations need to assume breach and adopt advanced security capabilities to prevent successful attacks," said Carl Wright, AttackIQ CCO. 

"VMware is one of the world's leading security providers, and we are excited to work with the VMware team to elevate our mutual customer's security program performance."

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022
CIAM buyer’s guide
Whitepaper

CIAM buyer’s guide

6 Jun 2022

Most Popular

FCC commissioner urges Apple and Google to remove TikTok from app stores
data protection

FCC commissioner urges Apple and Google to remove TikTok from app stores

29 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022