MapleSEC: VMware’s Chad Skipper sheds light on security measures

During a MapleSEC fireside chat, Jim Love, CIO of IT World Canada, welcomed Chad Skipper, global security technologist from VMware, for a conversation that delved into the complexities of modern cybersecurity and the solutions being developed to address them.

Visibility in the virtual battlefield

The discussion revolved around the concept of visibility within organizational networks, particularly focusing on the challenges faced in monitoring internal traffic or “east-west” movement. “If you can’t see it, you can’t protect it,” Skipper pointed out, underlining the critical need for comprehensive visibility inside virtualized infrastructures. Traditionally, network security solutions have focused on north-south traffic, ignoring the internal movements that often go unnoticed.

He also explained how VMware has integrated advanced detection technologies directly into its vSphere clusters, providing a vantage point for inspecting artifacts and detecting anomalies. By gaining visibility into 100 per cent of the internal traffic, VMware’s approach allows for real-time monitoring and detection of malicious activities, he said.

Spotting threat actors early

He emphasized the critical importance of early detection. Threat actors often remain hidden within an organization’s network for extended periods, exploiting various protocols like RDP, SMB Samba, Pass the Hash over Kerberos, and DNS. By leveraging VMware’s integrated technology, he noted, security teams can spot these anomalies and potential threats before significant damage occurs.

Operational efficiency and rapid response

Skipper said that one of VMware’s advantages is its operational efficiency. The security technology is seamlessly integrated into vSphere, requiring only a simple activation process. Security policies can be implemented swiftly, reducing false positives and enabling security teams to respond rapidly to potential threats.

The last piece of the security puzzle

While perimeter security remains vital, the conversation highlighted the fact that the battleground has shifted to internal network movements. Skipper emphasized that once a threat actor infiltrates an organization, lateral movement becomes their focus. VMware’s approach aims to illuminate this hidden battlefield, allowing for efficient segmentation and reducing the threat actors’ impact.

You can view the entire conversation here.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Breanna Schnurr
Breanna Schnurr
Breanna Schnurr is a recent journalism graduate of Toronto Metropolitan University. She loves writing about all things data, travel, tech, lifestyle and subculture. You can reach out to Breanna via [email protected].

Featured Articles

Empowering the hybrid workforce: how technology can build a better employee experience

Across the country, employees from organizations of all sizes expect flexibility...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders...

Thriving amid Canada’s tech talent shortage

With today’s tight labour market, rising customer demands, fast-evolving cyber threats...

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now