{"id":26129,"date":"2019-03-15T19:21:00","date_gmt":"2019-03-15T19:21:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/"},"modified":"2019-03-15T19:21:00","modified_gmt":"2019-03-15T19:21:00","slug":"exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/","title":{"rendered":"Exec: How SDN, SD-WAN, security fit in VMware&#8217;s strategy"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2015\/08\/vmware-hq-photo-100611136-large.3x2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>It has been just 10 months since Tom Gillis became <a href=\"https:\/\/www.networkworld.com\/article\/3340259\/vmware-s-transformation-takes-hold.html\">VMware<\/a>&#8216;s senior vice president and general manager of its networking and security business, and in that time he has overseen <a href=\"https:\/\/www.networkworld.com\/article\/3340259\/vmware-s-transformation-takes-hold.html\">some major changes<\/a> in the company\u2019s core products.<\/p>\n<p>Most recent is a <a href=\"https:\/\/www.networkworld.com\/article\/3346017\/vmware-preps-milestone-nsx-release-for-enterprise-cloud-push.html\">milestone release of the company\u2019s NSX-T Data Center<\/a> software, making it VMware\u2019s primary networking platform for organizations looking to support multivendor cloud-native applications, <a href=\"https:\/\/www.networkworld.com\/article\/3261113\/why-a-bare-metal-cloud-provider-might-be-just-what-you-need.html?nsdr=true\">bare-metal<\/a> workloads as well as the growing hybrid and multi-cloud worlds.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Also see <a href=\"https:\/\/www.networkworld.com\/article\/3236448\/lan-wan\/what-to-consider-when-deploying-a-next-generation-firewall.html\">What to consider when deploying a next generation firewall<\/a>. | Get regularly scheduled insights by <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">signing up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<p>Gillis\u2019s group also rolled out a new <a href=\"https:\/\/www.networkworld.com\/article\/3230457\/what-is-a-firewall-perimeter-stateful-inspection-next-generation.html?nsdr=true\">firewall<\/a> \u2013 the <a href=\"https:\/\/www.networkworld.com\/article\/3359242\/vmware-firewall-takes-aim-at-defending-apps-in-data-center-cloud.html\">Service-defined Firewall<\/a>\u2014VMware says protects enterprise applications inside <a href=\"https:\/\/www.networkworld.com\/article\/3223692\/what-is-a-data-centerhow-its-changed-and-what-you-need-to-know.html\">data centers<\/a> or clouds. There <a href=\"https:\/\/www.networkworld.com\/article\/3302357\/vmware-has-edge-ai-blockchain-ambitions.html?nsdr=true\">have been other key additions<\/a>, too, including an expanded relationship with <a href=\"https:\/\/www.prnewswire.com\/news-releases\/att-bridging-5g-and-sd-wan-with-vmware-sd-wan-by-velocloud-for-a-new-layer-of-control-at-the-edge-300800353.html\" rel=\"nofollow\">AT&amp;T around its SD-WAN<\/a> offering.<\/p>\n<p>Leaning on his previous executive experiences&nbsp; \u2013 general manager of Cisco&#8217;s security technology business, CEO of Bracket Computing, vice president of marketing at IronPort Systems and others \u2013 Gillis is tasked with keeping VMware squarely in front of cloud, security and enterprise computing.<\/p>\n<p>He recently talked with <em>Network World<\/em> senior editor Michael Cooney about some of the company\u2019s key networking and security directions and a big competitor, Cisco:<\/p>\n<p><strong>Cooney: Coming up on your year anniversary with VMware \u2013 what have been some of the biggest networking and security challenges you\u2019ve addressed or hope still to address?<\/strong><\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>Gillis: NSX-T is a very big deal for us. We have hundreds of engineers developing that software, and fully decoupling NSX from ESX was a big job. In the end we want to blur the lines between public and <a href=\"https:\/\/www.networkworld.com\/article\/2159885\/cloud-computing-gartner-5-things-a-private-cloud-is-not.html\">private cloud<\/a> with the idea changing the notion of what the data center can be in the future. Our APIs let customers and developers have the public-cloud experiences everywhere, where we set a baseline of policies that define who gets to talk to who, that lets them easily implement a modern, secure cloud native application that can be replicated from a desktop to a mainframe. It\u2019s a different model for how to more effectively run a data center.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<p>Another challenge is positioning VMware in the security space much more than we have in the past. We already have <a href=\"https:\/\/www.networkworld.com\/article\/3247672\/what-is-microsegmentation-how-getting-granular-improves-network-security.html\">microsegmentation<\/a> and other security tools in NSX network virtualization overlay, and we are looking to build on that.&nbsp; A key part of that advance is the Layer-7-based approach to cybersecurity which uses the known good attributes of applications that is found in the new Service-defined Firewall. This is something we can do uniquely and is what customers will see us do more of.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p><strong>Let\u2019s talk about VMware\u2019s SDN strategy.&nbsp; How has it changed\/evolved in past couple years?<\/strong><\/p>\n<p>NSX is pure <a href=\"https:\/\/www.networkworld.com\/article\/3209131\/what-sdn-is-and-where-its-going.html\">SDN<\/a>. My take on SDN is that it has mostly hit the mainstream, and it is in various stages of deployment. SDN is definitely transformative, and it has changed the way customers have to think and organize. One of the biggest challenges is changing the skill of a traditional network engineers in an SDN of software environment.&nbsp; It\u2019s more about defining policies, and who gets to talk to who. And the network people are more involved in that type of programming now and going forward.<\/p>\n<p><strong>How does VMware\u2019s SDN strategy differ from Cisco\u2019s?<\/strong><\/p>\n<p>The challenge that Cisco has is that while they are really good at fabric management especially in environments with thousands of switches, but those switches have no inherent knowledge of applications. Cisco uses an agent to handle application awareness and policy enforcement in its [Application Centric Infrastructure] world.&nbsp; That still requires a switch, which to me isn\u2019t very efficient in an all software-defined-networking world.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p>We are strictly software and have application awareness regardless of the hardware you are running. This makes our implementation particularly useful for multi-cloud workloads. Basically we focus on the network overlay [the virtual environment] and let customers do what they want in underlay [the physical network environment]. As we\u2019ve matured <a href=\"https:\/\/www.networkworld.com\/article\/3346017\/vmware-preps-milestone-nsx-release-for-enterprise-cloud-push.html\">NSX<\/a>, we have tightened the relationship between those worlds. Going forward, customers will see us do more &nbsp;to simplify communications between the SDN layer and the underlay technology.<\/p>\n<p><strong>What\u2019s going on with VMware in the SD-WAN arena?<\/strong><\/p>\n<p>We see <a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\">SD-WAN<\/a> as a critical way to stitch together the power of local compute and the data center.&nbsp; Our focus is very much toward tying SD-WAN to the cloud.&nbsp; Customers don\u2019t need to backhaul remote traffic to the data center any more. They can support applications and traffic from whatever destination they want, all managed via the cloud. What we are focusing on for the future is developing better QoS and more automated features for SD-WAN customers.<\/p>\n<aside class=\"fakesidebar\">\n<p><strong>More about SD-WAN<\/strong><\/p>\n<\/aside>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3367742\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nIt has been just 10 months since Tom Gillis became VMware&#8217;s senior vice president and general manager of its networking and security business, and in that time he has overseen some major changes in the company\u2019s core products.Most recent is a milestone release of the company\u2019s NSX-T Data Center software, making it VMware\u2019s primary networking platform for organizations looking to support multivendor cloud-native applications, bare-metal workloads as well as the growing hybrid and multi-cloud worlds.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26130,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[812,762,307],"class_list":["post-26129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-center","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exec: How SDN, SD-WAN, security fit in VMware&#039;s strategy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exec: How SDN, SD-WAN, security fit in VMware&#039;s strategy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-15T19:21:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Exec: How SDN, SD-WAN, security fit in VMware&#8217;s strategy\",\"datePublished\":\"2019-03-15T19:21:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\"},\"wordCount\":854,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg\",\"keywords\":[\"Data Center\",\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\",\"name\":\"Exec: How SDN, SD-WAN, security fit in VMware's strategy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg\",\"datePublished\":\"2019-03-15T19:21:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg\",\"width\":620,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Center\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Exec: How SDN, SD-WAN, security fit in VMware&#8217;s strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exec: How SDN, SD-WAN, security fit in VMware's strategy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Exec: How SDN, SD-WAN, security fit in VMware's strategy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-15T19:21:00+00:00","og_image":[{"width":620,"height":413,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Exec: How SDN, SD-WAN, security fit in VMware&#8217;s strategy","datePublished":"2019-03-15T19:21:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/"},"wordCount":854,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg","keywords":["Data Center","Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/","url":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/","name":"Exec: How SDN, SD-WAN, security fit in VMware's strategy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg","datePublished":"2019-03-15T19:21:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy.jpg","width":620,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/exec-how-sdn-sd-wan-security-fit-in-vmwares-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Center","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/"},{"@type":"ListItem","position":3,"name":"Exec: How SDN, SD-WAN, security fit in VMware&#8217;s strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26129"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26130"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}