Search Results for "NSx benchmark"

New Benchmark Audit Highlights VMware NSX Platform’s Ability to Deliver a “DMZ Anywhere” Audit conducted by Coalfire confirms VMware NSX supports DMZ principles, allowing for maximum security and visibility to the network   Westminster, CO – January 4, 2017– Co...
Coalfire Publishes New Benchmark Audit of VMware NSX-T Micro-Segmentation for Microservices, Containers and Virtual Machines Audit conducted by Coalfire confirms effectiveness of NSX-T platform to provide security through micro-segmentation in both traditional virtualizatio...
First Micro-Segmentation Benchmark Report Validates VMware NSX Capabilities Enable a Zero-Trust Model WESTMINSTER, Colo. – September 21, 2016 – Coalfire, an independent cyber risk management advisor and assessor, is today publishing an industry-first Micro-segmentatio...
Press Releases For media inquiries, please contact: luminacoalfire@luminapr.com 212.239.8594 For brand guide and logo, visit our Press Kit page. Press Releases For media inquiries, please contact: luminacoalfire@luminapr.com 212.239.8594 For brand guide and...
Coalfire to Showcase New Reference Architecture Guides at VMworld 2014 Guides to provide reference on current PCI and FedRAMP regulations SAN FRANCISCO- Aug. 21, 2014 - Coalfire, an independent information technology governance, risk and compliance (IT GRC) firm toda...
Get access to contract vehicles and benefit from our comprehensive solutions and services, including: Cyber Automation, Engineering, and Orchestration Compliance and Advisory Cyber Program Management and Operations Technical Security Assessments services We are also ab...
One of the most important reference tools that companies use to establish and evaluate their internal controls is the Committee of Sponsoring Organizations' (COSO) Internal Control - Integrated Framework.  Initially published in 1992 (the 1992 Framework), the COSO framew...
Password hashes are an everyday part of life in Coalfire Labs. Barring any other low-hanging fruit, it’s not uncommon for a penetration test to hinge on recovering a plaintext password from one of these hashes. Whether it’s NTLM hashes from Active Directory, NetNTLMv2 from Re...
Coalfire’s Top Five IT Security Predictions for 2013 Independent IT GRC auditor compiles list of trends for the new year Louisville, Colo. – Jan. 3, 2013 – As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecuri...
Part Two in a Series Other Post in the Series: Part One: A Cyber Engineering Primer: System Compliance and Hardening Part Three: A Cyber Engineering Primer: Vulnerability Management Lifecycle Cybersecurity practitioners sometimes forget to define and explain the te...