{"id":3012,"date":"2019-01-14T09:09:06","date_gmt":"2019-01-14T14:09:06","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=3012"},"modified":"2021-07-08T11:10:11","modified_gmt":"2021-07-08T15:10:11","slug":"security-virtualization","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/","title":{"rendered":"Security through Virtualization"},"content":{"rendered":"\n<p>We tend to <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2017\/06\/the_faa_is_argu.html\">talk<\/a> a <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2008\/06\/security_throug_1.html\">lot<\/a> about security through obscurity. But what about security through virtualization?<\/p>\n\n\n\n<p>I&#8217;ve been thinking about both security and virtualization quite a bit lately. I also had the privilege of visiting <a href=\"https:\/\/www.vmware.com\/\">VMware<\/a>&#8216;s HQ in Palo Alto with <a href=\"https:\/\/techfieldday.com\/\">Tech Field Day<\/a> <strong>twice<\/strong> last year. That&#8217;s interesting because VMware is using their place as the virtualization layer between infrastructure and applications as a secure control point to reduce attack surfaces. But before we dig into that, we need to zoom out a bit and take in some needed context.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"> Virtual Networks<\/h2>\n\n\n\n<p>I&#8217;ve seen <a href=\"https:\/\/www.pscp.tv\/w\/1OyKAyPBWoWKb\">the future of networking<\/a> and it&#8217;s virtual. Of course, so&#8217;s the past. That&#8217;s kind of what the whole OSI model thing was trying to help us with. And it&#8217;s why basically every network engineer has practice drawing physical AND logical diagrams.<\/p>\n\n\n\n<p>What&#8217;s actually new is the growing levels of abstraction and automation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Business Fabrics<\/h2>\n\n\n\n<p>What&#8217;s also new is the drastically increasing relevance of technological infrastructure to organizations of all sizes and shapes. As early as 2011 Forbes had declared that <a href=\"https:\/\/www.forbes.com\/sites\/techonomy\/2011\/11\/30\/now-every-company-is-a-software-company\">every company is a software company<\/a>. More recently, Thompson Reuters stated that <a href=\"https:\/\/blogs.thomsonreuters.com\/answerson\/all-companies-are-technology-companies-now\/\">all companies are technology companies<\/a>. And the trend of executives working to raise their organizations&#8217; <a href=\"https:\/\/www.mckinsey.com\/business-functions\/strategy-and-corporate-finance\/our-insights\/raising-your-digital-quotient\">digital quotient<\/a> to succeed during this <a href=\"http:\/\/www.oecd.org\/going-digital\/\">digital revolution<\/a> shows no signs of slowing down.<\/p>\n\n\n\n<p>But what the heck does &#8216;going digital&#8217; have to do with virtual networks?<\/p>\n\n\n\n<p>As rapidly as technology is evolving, there appears to be one immutable constant. That universal need is connectivity. The network is the most fundamental layer of any infrastructure and that&#8217;s simply not changing.<\/p>\n\n\n\n<p>The demands placed upon that network and the scale of its importance to the mission of your organization, however, are changing. Now we need more than a collection of devices that forward frames. Even more than a collection of networks that connect to each other. We need a network platform that connects all the things and is easy to manage. <\/p>\n\n\n\n<p>When you combine a ubiquitous network fabric with identity and policy controls and then layer on consistent device and application controls, you approach the nirvana of a true business fabric. A holistic technology platform upon which to conduct your business. Well, mostly. For this to really work, you need visibility <strong>and<\/strong> control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">On Visibility &amp; Control<\/h2>\n\n\n\n<p>Automation and abstraction are hot right now. That&#8217;s why everything is &#8220;Software Defined&#8221; these days. You&#8217;ve got SD dash network, WAN, security, perimeter&#8230; Heck, even the whole data center can be software defined.<\/p>\n\n\n\n<p>But why?<\/p>\n\n\n\n<p>What are we really talking about when we throw out terms like virtualization and abstraction or disaggregation and automation? <strong>Why<\/strong> do we want everything software defined?<\/p>\n\n\n\n<p>It&#8217;s all about visibility and control.<\/p>\n\n\n\n<p>We want to put things into the infrastructure (provisioning\/control) and get things out of the infrastructure (telemetry\/visibility). And we want to do this as efficiently and effectively as possible. In other words, I shouldn&#8217;t have to manually log into multiple devices to find out what VLAN is provisioned, nor to provision it when we find that it&#8217;s missing.<\/p>\n\n\n\n<p>We also want: Control over what hardware and software we use in our infrastructure. Visibility into where all of our workloads currently live across all of our pods and clouds. Control of who can change what, anywhere in the infrastructure. Visibility of policy and intent violations that occur anywhere across the organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Virtually Secure<\/h2>\n\n\n\n<p>All of this visibility and control across a cohesive business fabric does wonders for our security posture.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-shortcode\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/VMwareSecurity?ref_src=twsrc%5Etfw\">@VMwareSecurity<\/a> says the problems with Security are that it is bolted on, reactive, fragmented, asymmetric, and infrastructure-centric. Hard to disagree. <a href=\"https:\/\/twitter.com\/hashtag\/XFD1?src=hash&amp;ref_src=twsrc%5Etfw\">#XFD1<\/a><\/p>&mdash; \ud83c\udf35 \u1455\u157c\u1587I\u1515 G\u1587\u144c\u144e\u15eaE\u15f0\u15e9\u144e\u144e (@ChrisGrundemann) <a href=\"https:\/\/twitter.com\/ChrisGrundemann\/status\/1073281529600602113?ref_src=twsrc%5Etfw\">December 13, 2018<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Imagine having a single, virtual network that connects all of your applications and all of your users &#8211; no matter where they live physically. Now imagine that within this virtual network you have full visibility of all those endpoints plus complete control over how they connect.<\/p>\n\n\n\n<p>This is security through virtualization. Embed security into the network. Embed the network into the cloud. Leverage network virtualization to push security functions closer to the applications they protect. Use connectivity to enforce policy&#8230; You get it.<\/p>\n\n\n\n<p>It&#8217;s a powerful vision that only a couple companies seem poised to really deliver on. I&#8217;ve written previously about <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2018\/secure-multicloud-networking-contrail\/\">Juniper&#8217;s approach<\/a>, which they are now calling &#8220;Secure Automated Multicloud.&#8221; Their advantage, of course, is that they are a networking company with a ton of domain expertise gained over many years. But what about VMware?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Virtualizing for Security<\/h2>\n\n\n\n<p>VMware&#8217;s obvious advantage when it comes to building a secure business fabric is their unique position as the virtualization layer across compute and mobile. They own <a href=\"https:\/\/www.vmware.com\/products\/esxi-and-esx.html\">the software<\/a> that sits between infrastructure and applications in the datacenter. And with <a href=\"https:\/\/www.vmware.com\/products\/workspace-one.html\">Workspace ONE<\/a> (which replaced Airwatch) they own the software that sits between users and applications on our personal devices as well.<\/p>\n\n\n\n<p>By being the abstraction layer itself, VMware can provide exceptional visibility and control almost by default. This is obviously not lost on them as they have been building a suite of products to capitalize:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"924\" height=\"532\" src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17.png\" data-orig-src=\"http:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17.png\" alt=\"Security through Virtualization\" class=\"lazyload wp-image-3015\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27924%27%20height%3D%27532%27%20viewBox%3D%270%200%20924%20532%27%3E%3Crect%20width%3D%27924%27%20height%3D%27532%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-100x58.png 100w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-150x86.png 150w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-300x173.png 300w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-500x288.png 500w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-608x350.png 608w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-700x403.png 700w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-768x442.png 768w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17-900x518.png 900w, https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-06-10.17.17.png 924w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 924px) 100vw, 924px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Digging In<\/h2>\n\n\n\n<p>As I mentioned above, I got to see VMware present on their vision for security though virtualization twice last year. The first was at <a href=\"https:\/\/techfieldday.com\/appearance\/vmware-presents-at-networking-field-day-17\/\">Network Field Day 17<\/a> back in January. The follow up was at the very first <a href=\"https:\/\/techfieldday.com\/appearance\/vmware-presents-at-security-field-day-1\/\">Security Field Day<\/a> just last month. Nice bookends for 2018!<\/p>\n\n\n\n<p>Now it&#8217;s your turn to dig into the videos from those events (at the links right above) to get a deeper understanding of why I&#8217;m so excited about VMware right now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We tend to talk a lot about security through obscurity. <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3016,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[836,23,24,844],"tags":[887,888,402,855,859,619,866,853,901,898,899,902],"class_list":["post-3012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking","category-sdn","category-security","category-techfieldday","tag-cybersecurity","tag-infosec","tag-juniper","tag-nfd17","tag-nsx","tag-sdn","tag-security","tag-tech-field-day","tag-virtual-network","tag-virtualization","tag-vmware-2","tag-xfd1"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security through Virtualization (brought to you by VMware) ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security through Virtualization (brought to you by VMware) ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"We tend to talk a lot about security through obscurity. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-14T14:09:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T15:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"Security through Virtualization\",\"datePublished\":\"2019-01-14T14:09:06+00:00\",\"dateModified\":\"2021-07-08T15:10:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/\"},\"wordCount\":919,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/5950280902_c82439d10d_b.jpg\",\"keywords\":[\"cybersecurity\",\"infosec\",\"Juniper\",\"NFD17\",\"NSX\",\"SDN\",\"Security\",\"Tech Field Day\",\"virtual network\",\"Virtualization\",\"VMware\",\"XFD1\"],\"articleSection\":[\"Networking\",\"SDN\",\"Security\",\"TechFieldDay\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/\",\"name\":\"Security through Virtualization (brought to you by VMware) ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/5950280902_c82439d10d_b.jpg\",\"datePublished\":\"2019-01-14T14:09:06+00:00\",\"dateModified\":\"2021-07-08T15:10:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/5950280902_c82439d10d_b.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/5950280902_c82439d10d_b.jpg\",\"width\":1024,\"height\":768,\"caption\":\"security virtualization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2019\\\/security-virtualization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security through Virtualization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\\\/\\\/chrisgrundemann.com\",\"https:\\\/\\\/www.facebook.com\\\/chris.grundemann\",\"http:\\\/\\\/instagram.com\\\/chrisgrundemann\",\"www.linkedin.com\\\/in\\\/cgrundemann\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security through Virtualization (brought to you by VMware) ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/","og_locale":"en_US","og_type":"article","og_title":"Security through Virtualization (brought to you by VMware) ~ Chris Grundemann","og_description":"We tend to talk a lot about security through obscurity. ...","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2019-01-14T14:09:06+00:00","article_modified_time":"2021-07-08T15:10:11+00:00","og_image":[{"width":1024,"height":768,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","type":"image\/jpeg"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"Security through Virtualization","datePublished":"2019-01-14T14:09:06+00:00","dateModified":"2021-07-08T15:10:11+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/"},"wordCount":919,"commentCount":2,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","keywords":["cybersecurity","infosec","Juniper","NFD17","NSX","SDN","Security","Tech Field Day","virtual network","Virtualization","VMware","XFD1"],"articleSection":["Networking","SDN","Security","TechFieldDay"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/","name":"Security through Virtualization (brought to you by VMware) ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","datePublished":"2019-01-14T14:09:06+00:00","dateModified":"2021-07-08T15:10:11+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","width":1024,"height":768,"caption":"security virtualization"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2019\/security-virtualization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Security through Virtualization"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2019\/01\/5950280902_c82439d10d_b.jpg","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-MA","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/3012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=3012"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/3012\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/3016"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=3012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=3012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=3012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}