<span id="tltxb"></span>
<span id="tltxb"><dl id="tltxb"></dl></span> <span id="tltxb"><dl id="tltxb"></dl></span>
<strike id="tltxb"></strike>
<span id="tltxb"></span>
<span id="tltxb"></span>
<strike id="tltxb"></strike><span id="tltxb"><dl id="tltxb"><del id="tltxb"></del></dl></span><span id="tltxb"></span>

Intrinsic Security

Protect Your Apps and Data?with Intrinsic Security

Leverage your infrastructure to provide adaptive protection for your apps and data, regardless of their location or movement, and seamlessly secure your data centers, clouds, and endpoints so your users have the flexibility and freedom to work as they wish.

Download Infographic

Leverage Your Infrastructure to Secure Your Business

Build security into your infrastructure to turn points of vulnerability into points of security control. More effectively detect and respond to threats and expand visibility and controls to harden infrastructure and keep emerging threats at bay. VMware Intrinsic Security dramatically simplifies and strengthens your approach to security across any app, any cloud, and any device.


Secure east-west network traffic through segmentation, access, and traffic inspection.

Virtualize your entire security stack and gain protection that's intrinsic to your infrastructure— so you can mitigate risk, ensure compliance, and lower costs while vastly simplifying the operational model of firewalling every workload.

Mitigate public cloud security and compliance risks.

Get real-time insight into cloud resources, misconfigurations, threats, and change activity. Graphically visualize resource relationships and investigate issues. Prioritize findings based on risk, automatically remediate issues, and collaborate with developers.


Protect workloads from advanced threats through embedded security in the hypervisor.

Improve application security without compromising availability and performance with automated threat monitoring and response to changes in app behavior.

Secure the endpoint through intelligent system hardening and adaptive prevention.

Consolidate multiple endpoint security capabilities, simplifying your security stack for faster and more effective security operations, and improving endpoint performance.


Harden device posture and user authentication with device-aware access management.

Ensure only the right users and compliant devices have access to apps by continuously tracking device state, user details, and authentication context.

What is Intrinsic Security? 

Simplify and Focus Your Security Strategy

Organizations traditionally build infrastructure for general purpose use. Security teams are then tasked with protecting that infrastructure, the apps that will run on it, and the devices that will access it. The result is layers of complexity and enterprise security that's general rather than specific— too many products, too many tools, too many interfaces, too many agents. Security doesn’t need a new product, but a new approach.

Hear How the Cloud is Reshaping Cybersecurity
Security Needs to be Built-in, not Bolted-on

Security Needs to be Built-in, not Bolted-on

Bolting on security means too many products, agents, and policy sets.

Build security into your infrastructure for an intrinsic security solution that helps you operate faster and more effectively, without relying on additional products, agents, interfaces, tools, or management overhead. Gain the context and visibility to better control security policies across heterogenous environments for protection that adapts to your business.

Download Cybersecurity Insights Report

Unified, not Siloed

Security has been siloed for far too long, making it difficult to get a holistic view of threats and what you're trying to protect.

Security needs to be a team sport. Leveraging your infrastructure for security not only increases visibility into workloads and connectivity, but also fosters integrated defenses and active collaboration across IT and Security teams to keep emerging threats at bay.

Get the SANS Perspective

Context-centric, not Threat-centric

Security has become centered around chasing threats and not understanding enough about the applications and infrastructure – what needs to be protected in the first place. And that has made security too reactive and too focused on yesterday's attacks.? ?

Architecting security into your infrastructure unlocks unprecedented visibility across apps, users and devices and allows you to focus your defenses, instead of reactively chasing an ever-growing spectrum of threats.

Read about Distributed IDS/IPS with NSX

Transform?Your Enterprise Security Solutions 

User, Application & Endpoint Security for Your Digital Workspace

Deliver predictive and automated security for users, apps and endpoints across your digital workspace with a modern, cloud-native enterprise security platform.

More on Workspace Security

Modernize Network Security Across Data Centers and Clouds

Protect workloads across your multi-cloud environments with network security policies specific to every application. Leverage the industry’s first purpose-built distributed firewall to secure and inspect east-west network traffic with consistent policy and fine grain control.

More on Network Security

Secure Applications in Virtualized and Cloud Environments

Embed threat detection and response into the virtualization layer, giving you greater visibility and intelligence into your applications, data, and infrastructure to proactively protect against breaches.

More on Workload Security

Mitigate Public Cloud Risk

Strengthen security and compliance posture across your public cloud environments. Gain real-time visibility into security configurations and threats to keep pace with the dynamic nature of cloud and avoid risky misconfigurations known to cause security breaches.

More on Cloud Security

Rely on Industry-Specific Security Solutions 

Achieve better security and compliance in regulated industries with VMware products and solutions.

Financial Services

Reduce risk and streamline compliance with industry-leading hybrid cloud, SDDC, and digital workspace solutions.

State & Local Government

Address compliance, identity management, threat detection, and remediation across devices, apps, and networks.


Streamline security and compliance by delivering always-available access to electronic medical records.

Higher Education

Support limitless learning with modern, mobile, and secure IT solutions.


Secure today’s digital classrooms with software-defined server, desktop, networking, and identity-based security solutions.

Federal Government

Take a software-defined approach to security that maximizes visibility, context, and control of interactions between users, apps, and data.


Safely embrace IoT, deliver 24/7 uptime, and secure the delivery of data and applications globally.


Strengthen cybersecurity across retail platforms while helping to ensure PCI compliance.

Access VMware Security Advisories 

VMware maintains various programs and practices to ensure that security is standardized through all facets of our products and cloud services. To see a list of reported vulnerabilities, or sign up to receive advisories via email, visit the VMware Security Advisories page.