VMware Carbon Black Cloud Workload
A security solution for protecting workloads in virtualized environments by integrating security into the virtualization layer.
Category | Workload Protection |
---|---|
Last page update | 19 days ago |
Pricing Details | Contact for pricing details. |
Target Audience | IT administrators and security professionals managing virtualized environments. |
VMware Carbon Black Cloud Workload is designed to protect workloads in virtualized environments by integrating security directly into the virtualization layer. This solution ensures that security is intrinsic to the virtualization environment, providing built-in protection for virtual machines.
The technical architecture involves deploying an on-premises OVF or OVA template for the Carbon Black Cloud Workload appliance, which connects to the vCenter Server through a registration process. Once registered, the appliance deploys the Carbon Black Cloud Workload Plug-in, collecting inventory data from the vCenter Server and displaying it on the plug-in's Inventory tab and the Carbon Black Cloud console. This setup allows for one-click installation of Carbon Black on virtual machines, enabling comprehensive monitoring and protection of data center workloads from a single console.
Key operational considerations include ensuring the environment meets specific requirements, such as running supported versions of VMware vCenter Server, ESXi, and VMware Tools. For example, virtual machines must have VMware Tools version 11.2 or later, and only 64-bit architectures are supported. The Carbon Black Cloud Workload appliance itself requires 4 GB of memory, 41 GB of storage (thick provisioned), and 4 vCPUs per vCenter Server.
Limitations include the need for careful firewall configuration to allow communication with the prod.cwp.carbonblack.io
domain over TCP port 443. Additionally, the solution assumes familiarity with VMware vSphere, including ESXi, vCenter Server, and VMware Tools, which can be a barrier for less experienced administrators. The solution also requires adherence to specific browser and operating system compatibility, which can add mild complexity to the deployment and management process.