Network Security Engineer at Tatva networks pvt ltd
Real User
2020-01-07T06:27:00Z
Jan 7, 2020
We are a solution provider and this is one of the products that we implement for our customers. Some people have requirements for this type of solution, such as setting up a VPN or using a remote connection. It will give them a mechanism for authentication.
They have two deployment models for this solution. The first is the full package endpoint, on-premises solution. This gives the customer all of its security features, like the ability to lock down servers. This is a resource-heavy deployment. The second type of deployment is the SVM (Security Virtual Machine) solution. This is a virtual appliance. We install it to allow communication between all of the virtual machines and the management, also. This deployment will not give the customer all of the features available in the full package. The choice between deployment models is based on the environment, with a focus on performance. If the server is facing the internet then we do not recommend using the SVM. On the other hand, if this server has restricted access then we recommend deploying the SVM solution. Our deployment is on-premises in our hospital's data center.
Virtualization Security Software ensures the protection of virtualized environments by providing comprehensive security measures tailored for virtual machines and hypervisors.
This software addresses the unique security challenges posed by virtual environments, including vulnerabilities in virtual machines and potential exploits in hypervisor layers. It maximizes security for virtual networks, storage, and applications, ensuring robust protection against threats. Users appreciate the...
We use Sophos Virtualization Security for our management team only.
We use Sophos virtual appliance for remote access to our application and for VPN.
We are a solution provider and this is one of the products that we implement for our customers. Some people have requirements for this type of solution, such as setting up a VPN or using a remote connection. It will give them a mechanism for authentication.
They have two deployment models for this solution. The first is the full package endpoint, on-premises solution. This gives the customer all of its security features, like the ability to lock down servers. This is a resource-heavy deployment. The second type of deployment is the SVM (Security Virtual Machine) solution. This is a virtual appliance. We install it to allow communication between all of the virtual machines and the management, also. This deployment will not give the customer all of the features available in the full package. The choice between deployment models is based on the environment, with a focus on performance. If the server is facing the internet then we do not recommend using the SVM. On the other hand, if this server has restricted access then we recommend deploying the SVM solution. Our deployment is on-premises in our hospital's data center.