VMware IIJA Funds

Improve Cybersecurity and Incident Response with IIJA Funds

Secure your infrastructure from attacks that threaten government service delivery with VMware solutions that reduce your risk and help you maximize federal funds from #IIJA. Improve your defense and incident response with faster, more comprehensive detection to reduce the risk and likelihood of a successful attack.
Learn More >> 


Infrastructure Investment and Jobs Act at a Glance: 

  • 5-year bipartisan deal passed in 2021
  • Designates over $2 billion in funding for cybersecurity resiliency and innovation, including $1.3 billion for state and local governments
  • Funds awarded to states annually
  • Grant money begins to flow 2H FY23
  • IT teams at these agencies are looking for guidance on how to put the funds to use


Cybersecurity for Government Agencies
Government agencies can take advantage of the IIJA funds to create a plan of action and protect against, detect, respond to, and recover from cybersecurity threats. All while focusing on keeping essential citizen services up and running.
View the Resource >>


Operational Resiliency
Public sector organizations are turning to disaster recovery as a service (DRaaS), and more specifically VMware Cloud Disaster Recovery, to preserve data availability in the event of ransomware attacks and to recover their mission-critical workloads.
View the Product >>

Modernize Legacy Apps for Improved Security
Migrate or modernize traditional apps for cloud and speed the development and delivery of cloud native services that enhance agency workflows and capabilities to increase agility and transform citizen service delivery.
View the Resource >>


Benefits for State & Local Governments:

  • Faster Detection and Remediations

Quickly investigate and remediate security incidents throughout your multi-cloud environment.
View the Resource >>


  • Secure and Connect Workloads

Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.


  • Reduce Security Risks

Incorporate contextual awareness into access decisions and protect activities from breach and compliance risks.
View the Resource >>


  • Protect APIs — the New Endpoints

Increase app velocity and centrally manage, secure, connect and govern your clusters no matter where they reside.


  • Get to Production

Leverage a consistent and repeatable platform for seamless ‘push to prod’ across any infrastructure. Create a culture of automation that streamlines and simplifies getting software to users.


  • Cloud Native Endpoint Protection

Less frequent reimaging deploying our cloud native endpoint protection platform enables simplified operations and decreased risk of a data breach.