Built in (East-West) firewall for vSphere workloads
Back when IT infrastructure was smaller and less complex, and cybercrime was less prevalent, it was possible to insert a small number of edge firewalls between the outside world and the organization to protect the organizations’ infrastructure from external attackers — up to a point. Even then, the edge firewall would not protect an organization against a malicious insider.
These days, cybercrime is big business. Many organizations are too big and juicy a target to attackers to rely solely on edge firewalls for network security. Once attackers get past the edge firewall, they can move laterally in the organization’s IT infrastructure with a great deal of freedom. Attackers use this freedom to move from low-value, lightly-defended assets that they have compromised to high-value assets such as databases of personal information or intellectual property stores
This link is no longer active! Please contact the person or organisation that shared it with you.