Show Filters
Filtering by Service Area: Security Infrastructure
Make the transition to a scalable, function-rich, and compliant multi-cloud environment.
VMware® Validated Design Compliance Kit for PCI DSS
The VMware Validated Design architecture strives to balance security and innovation without sacri...
Read More about VMware® Validated Design Compliance Kit for PCI DSS
VMware® Cloud Foundation Compliance Kit
This audit guide addressed the compliance and technical concerns associated with virtual environm...
VMware® Software-Defined Data Center
This Product Applicability Guide (PAG) provides an evaluation of VMware products that make up and...
VMware® Software-Defined Data Center (SDDC) Product Applicability Guide for PCI DSS
This Product Applicability Guide (PAG) evaluates VMware products that make up and support the Sof...
Read More about VMware® Software-Defined Data Center (SDDC) Product Applicability Guide for PCI DSS
VMware® (SDDC) Product Applicability Guide for NIST 800-171
This Product Applicability Guide (PAG) provides an evaluation of VMware products that make up and...
Read More about VMware® (SDDC) Product Applicability Guide for NIST 800-171
VMware® SDDC PAG for NIST 800-53 Rev. 4
In this Product Applicability Guide (PAG), Tevora provides an evaluation of VMware products that ...
This Product Applicability Guide (PAG) will provide an evaluation of VMware products that makeup ...
Moving your workload to the cloud can offer significant benefits such as extended functionality, ...
Critical Security Controls Assessment
Tevora’s Critical Security Control Assessment provides a point-in-time dashboard of the effecti...
Creating an End to End Cloud Security Strategy
https://www.youtube.com/watch?v=NOB0v7jX4Ko
Read More about Creating an End to End Cloud Security Strategy
The continuing growth and sophistication of endpoint attacks and the recent surge in remote work ...
Deploying AWS Marketplace Tools
The Amazon Web Services (AWS) Marketplace enables qualified AWS partners to market...
Creating Effective Security Dashboards
IntroductionThe advent of Security Information and Event Management (SIEM) tools more than a deca...
The Beginner’s Guide to Linux Hardening: Initial Configuration
Sometimes simpler is better, and when it comes to technology, simpler can also mean more secure. ...
Read More about The Beginner’s Guide to Linux Hardening: Initial Configuration
How to Secure Domain Controllers with Next-Gen Firewalls
One of the principal ways to increase the security of your network is using smaller subnetworks c...
Read More about How to Secure Domain Controllers with Next-Gen Firewalls