VMware, Inc. (NYSE: VMW), today launched the new VMware Service-defined Firewall, an innovative approach to internal firewalling that reduces the attack surface for on-premises and cloud environments with security that is an intrinsic part of the infrastructure. Through the proven capabilities of VMware NSX and VMware AppDefense, the VMware Service-defined Firewall combines unprecedented application visibility and understanding of known good application behavior with intelligent, automated and adaptive firewalling capabilities to help better protect apps, data and users.
“Intrinsic security is different than integrated security,” said Tom Gillis, senior vice president and general manager, networking and security business unit, VMware. “Integrated security repackages existing solutions, such as taking a traditional firewall and making it a blade in a data center switch. It doesn’t fundamentally change the firewall. Intrinsic security takes advantage of the unique attributes that are built in to the virtualization platform, allowing us to create very new and unique security services. The new VMware Service-defined Firewall is focused on internal network firewalling and changes the game by validating known good application behavior, rather than chasing threats.”
The idea of focusing on the known good behavior of an application has been tried before, but the challenge has always been in getting a complete understanding of the application. Some solutions have installed agents in the guest to accomplish this, but agent-based solutions add complexity and have limited appeal because if an attacker gets root, which provides complete control of a host, they can simply bypass the agent. In addition, as applications have become more distributed, security needs to be distributed too. It’s impractical to hairpin east-west traffic to a hardware device or a virtual instantiation of it for inspection.
The VMware Service-defined Firewall solution takes a completely different approach to firewalling that focuses on assets that enterprises know well—applications they themselves have deployed—rather than scrutinizing the unknown. This solution works on bare metal, VM and container-based application environments, and will support hybrid cloud environments such as VMware Cloud on AWS and AWS Outposts in the future. Enterprises can use this solution as their sole firewall solution for their internal needs. The VMware Service-defined Firewall is unique in the following ways:
Application Verification Cloud: VMware’s position in the host allows the Service-defined Firewall to gain a deep understanding of an application and its 100’s or even 1,000’s of microservices through all their variations over time. Using machine intelligence from millions of VMs globally, the solution’s Application Verification Cloud builds an accurate map of the intended “known good” state of the application. Once a verified understanding of known good application behavior is established, the solution can generate adaptive security policies for the Service-defined Firewall solution that is layer 7 capable and can perform full stateful inspection.
Protected from the Guest: The Service-defined Firewall solution leverages VMware’s intrinsic ability to inspect the guest OS and application without being resident in the guest. This means that even if an attacker gains root access, they cannot bypass the Service-defined Firewall solution. The Service-defined Firewall solution can also detect and block malicious traffic on the network. Beyond that, this system can introspect the guest itself and identify and stop any malicious behavior within the OS or application at run time. This unique capability is equivalent to a new approach to network firewalling and host IPS.
Distributed in Software: the traditional approach to hardware firewalling requires “hairpinning” traffic out of the virtual environment and into a hardware appliance for scanning. This is inefficient and difficult to scale, particularly for modern applications that have many components or services that run across many servers and can often span different clouds. Based entirely in software, the VMware Service-defined Firewall is highly distributed which means it runs wherever the application runs, across clouds. This means policies can be consistently enforced without complex hairpinning of traffic across cloud environments.
“Protecting our applications and patient data is critical, and anything we do to improve security ultimately impacts patient safety. One of the biggest security challenges we face is staying ahead of threats due to the proliferation of applications and the rapid pace at which our applications are now changing,” said Christopher Frenz, Assistant Vice President of Information Security at Interfaith Medical Center. “We trust VMware to provide us with effective solutions for securing our applications and we are really pleased to see the approach VMware is taking in pushing the envelope on internal firewalling with the Service-defined Firewall.”
VMware Service-Defined Firewall Stands Up to Real-World Attack Scenarios
To validate the effectiveness of the VMware Service-defined Firewall, VMware teamed with Verodin, a leader in enabling organizations to measure, manage, and improve their cybersecurity effectiveness. VMware leveraged Verodin’s Security Instrumentation Platform (SIP) to validate that the VMware Service-Defined Firewall can effectively identify and stop threats whether they are known or unknown. While running the solution in both Detect and Prevent mode, the VMware Service-Defined Firewall detected or prevented 100 percent of the malicious attacks used in the Verodin test sequence.
“Defenders are tasked with securing business-critical applications they don’t operationally own or control. Rapid application development and the rising complexity of distributed and hybrid environments further increase the difficulty of securing these applications exponentially,” said Christopher Key, CEO at Verodin. “Verodin SIP provides organizations with the evidence required to prove that their controls are delivering the desired protection in real-world production environments. “These tests performed using Verodin SIP demonstrate the VMware Service-Defined Firewall’s ability to reduce the attack surface with minimal effort. Common attacker tactics and techniques become increasingly difficult to execute when the infrastructure itself is enforcing known-good application behavior and communications.”
Read the full report here: https://go.verodin.com/vmware-service-defined-firewall/