Business outcomes of the VMware approach

VMware helps customers to transform government data centers, in order to increase efficiency, expand into the cloud, and support shared services. The VMware approach is to leverage virtualization and a hyperconverged infrastructure (HCI) to build an agile, service-oriented data center that is standardized, centralized, and hybrid cloud-ready through the following methods:

  • Reducing the data center footprint, hardware, and operating costs to optimize the data center
  • Building a best-in-class private cloud that bi-directionally extends to the public cloud with only required resources
  • Consolidating IT systems, functions, and services across multiple organizations to support shared service models
  • Supporting cloud-native application development and platforms, in addition to legacy applications
  • Increasing efficiency and agility, and improving IT service levels with a faster, on-demand delivery of IT resources
  • Reinvesting savings into app development and agility

The following are the VMware solution approaches for different use cases:

  • Reduces the total threat attack surface with a comprehensive and modern security platform:
    • VMware approach: Enable a software-defined security and governance framework by applying a ubiquitous software layer across application infrastructure and endpoints that are independent of the underlying physical infrastructure:
      • Decouple security functions from the underlying physical infrastructure and place protections closer to data/workloads across the entire IT environment 
      • Embed intrinsic security across the data center and cloud infrastructure
      • Mitigate risk and improve security posture
      • Reduce operational complexity
  • Serves and protects with IoT:
    • VMware approach: VMware offers an enterprise-grade, IoT device management and monitoring solution that addresses the challenges agencies face to onboard, manage, monitor, and secure their IoT use cases, from the edge to the cloud. There's just one console to configure, secure, manage, and monitor IoT infrastructure. The benefits of the VMware approach are as follows:
      • Reduces complexity
      • Improves reliability
      • Transforms security
      • Innovates faster and accelerates ROI
  • Builds new capabilities, operating models, and services, including the following:
    • Smart buildings
    • National defense: Improving asset tracking and supply chain management; network-centric warfare, which provides shared awareness of the battlefield via cameras, infrared sensors, detectors, drones, and satellites
    • Fleet telematics: The use of sensors to remotely monitor the location, performance, and behavior of vehicles within a fleet
    • Monitoring weather and atmospheric conditions
    • Enhancing safety and public health
    • Smart cities
  • Developing e-government and security frameworks to achieve digital citizenship:
    •  VMware approach: VMware helps governments to modernize IT with digitization from data centers to end user devices by automating every layer of IT infrastructure. This abstraction enables the full visibility and control of system components programmatically across the life cycle, strengthening security, increasing efficiency, and supporting modern frameworks, now and in the future:
      • Improves the cost and quality of public service delivery
      • Delivers new capabilities
      • Speeds up innovation
      • Maintains citizen trust, data security, and privacy
  • Adopts a zero-trust security model:
    • VMware approach: Enables software-defined networking to segment and isolate networks and control lateral movements inside the data center. It embeds networks in the hypervisor layer, to attach network, automation, and security services to policy-driven workflows that move with the workload or application, enabling a layered, defense-in-depth approach to security:
      • Expands network protection to applications and data
      • Ensures that security policies move with the application
      • Systematically enforces policies through automation and orchestration across individual workloads
      • Exercises the capabilities of least-privilege and unit-level trust across the network
      • Contains a lateral spread of attacks
      • Reduces errors and inefficiencies
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.185.123