VMware has announced that it will integrate its VMware NSX(TM) network virtualisation with its mobility solutions, AirWatch by VMware and VMware Horizon, to allow mobile users to benefit from the hybrid cloud with added security.

The combination will help in creating an individualised virtual network which will allow users or groups to access only specific applications within the data centre which they are permitted to use.

The combined solutions will prevent users from accessing or seeing other applications within the data centre which they are not authorised to see, which will help in minimising security threats.

It will provide a network micro segmentation within data centre to address the security challenges of a traditional gateway VPNs, which gives over provisioned access to users.

VMware vice president of product management and CTO, End-User Computing Noah Wasmer said, "VMware is a driving force in helping to evolve security inside the data center through micro-segmentation with VMware NSX, and on the device level through capabilities such as per-application VPN.

"Today we are bringing the power of these two solutions together to deliver the ability to implement a fully-segmented virtualised data centre network that meets the unique challenges presented by today’s mobile end users."

Traditionally, organisations give access to could data centres through a secure VPN gateway connection, which can allow users to unlimited access.

The unlimited access can be exploited by modern hackers by using loopholes in the perimeter-centric defence mechanism.
VMware said that with different types of devices being used in the organisations, it requires IT to prevent the over-provisioned access challenge to provide secure, restricted access to only the resources to which users are entitled.

IT department can create an effective firewall for each virtual desktop at VM level by deploying VMware NSX with Horizon, which can prevent the spread of threats from desktop to server as well as desktop to desktop.

IT department can also implement security policy based on individual users or groups.