Expensive to Retrieve

VMware’s Price Revolution: How Broadcom’s Changes Are Reshaping Mid-Market IT Strategy

Feeling Renewal Pain

Bottom Line: Broadcom’s acquisition of VMware has triggered dramatic price increases of 800-1,500% for many customers, forcing mid-market organizations to urgently evaluate alternatives like Microsoft Hyper-V to maintain cost-effective virtualization infrastructure.

Since Broadcom acquired VMware in November 2023, the virtualization landscape has undergone seismic shifts that are particularly devastating for small and medium-sized enterprises (SMEs). What began as a strategic acquisition has evolved into a pricing revolution that’s forcing thousands of mid-market organizations to fundamentally reconsider their IT infrastructure strategies.

The Scale of the Price Shock

The numbers are staggering. Some customers report price increases ranging from 800% to 1,500%, while some organizations face even more dramatic hikes. AT&T claimed Broadcom offered them a 1,050% price increase, transforming their annual VMware costs from manageable to prohibitive overnight. For context, these aren’t modest adjustments—they represent a complete overhaul of the economic equation that made VMware attractive to mid-market clients.

The pricing transformation isn’t just about higher numbers. Broadcom has fundamentally restructured how VMware products are sold and licensed. The company eliminated approximately 8,000 individual product SKUs, consolidating them into just two primary bundled offerings: VMware Cloud Foundation (VCF) and vSphere Foundation. This consolidation forces customers to purchase entire suites rather than selecting specific components they actually need.

The Mid-Market Squeeze

Mid-market organizations are caught in a particularly painful position. Unlike enterprise customers who might already use multiple VMware products and could potentially benefit from bundling, smaller companies typically relied on standalone solutions like vSphere Essentials Plus—which Broadcom has now discontinued. These organizations suddenly find themselves forced into enterprise-grade bundles that include features like NSX networking and vSAN storage they never requested or needed.

The new core minimums compound the problem. Starting April 2025, VMware enforces a minimum 72-core license subscription for products like vSphere Standard, up from the previous 16-core minimum. For organizations running smaller deployments or edge locations, this means paying for licenses that far exceed their actual needs. It’s like being forced to buy a truck when you only need a bicycle.

The transition from perpetual licenses to subscription-only models adds another layer of financial pressure. Many mid-market companies relied on the predictable, one-time costs of perpetual licenses that could be amortized over several years. The new subscription model transforms capital expenditures into ongoing operational costs, fundamentally altering budget planning and cash flow management.

We’ve actually run into instances where Broadcom is quoting OVER published list price for clients that they feel they can extort with a higher cost.

The Search for Alternatives

Faced with these dramatic changes, mid-market organizations are actively exploring alternatives, with Microsoft Hyper-V emerging as the most compelling option for many. The appeal is both strategic and economic.

Cost Advantages: Hyper-V is included with Windows Server licenses at no additional cost, providing immediate relief from VMware’s pricing pressure. For organizations already invested in Microsoft’s ecosystem, this represents enormous potential savings. While enterprises might need additional management tools like System Center Virtual Machine Manager, the base virtualization capabilities come without separate licensing fees.

Technical Maturity: Modern Hyper-V has evolved far beyond its early limitations. Windows Server 2025 includes significant enhancements to GPU partitioning for AI workloads and improved scalability that now supports up to 24TB of host memory—actually surpassing VMware in some specifications. Features like Live Migration, high availability clustering, and robust security through Shielded VMs provide enterprise-grade capabilities that match much of what VMware offers.

Integration Benefits: For organizations running Windows-centric environments, Hyper-V offers seamless integration with Active Directory, Group Policy, and Azure cloud services. This tight integration often translates to simplified management and reduced administrative overhead compared to managing separate VMware infrastructure alongside Microsoft systems.

Migration Feasibility: While migrating from VMware to any alternative requires careful planning, Hyper-V’s similarities in core virtualization concepts make the transition more approachable than some alternatives. Many organizations are discovering that their Windows-based workloads migrate relatively smoothly to Hyper-V environments.

Strategic Considerations for Mid-Market Leaders

The decision to migrate away from VMware shouldn’t be taken lightly, but the current pricing environment makes exploration essential. Organizations should conduct thorough assessments of their current VMware usage, identifying which features are truly necessary versus those that could be replaced with alternative solutions or eliminated entirely.

The migration window is critical. Existing VMware customers still operating under older support agreements have time to plan, but that window is closing. Organizations should begin testing alternatives immediately, even if they ultimately decide to remain with VMware under new terms.

For many mid-market companies, this crisis presents an unexpected opportunity to modernize their infrastructure approach. Some are discovering that moving workloads to public cloud platforms or adopting hybrid strategies provides better economics than either VMware or on-premises alternatives.

Looking Forward

Broadcom’s transformation of VMware reflects a deliberate strategy to focus on larger, more profitable customers while shedding smaller accounts. For mid-market organizations, this reality demands urgent action. The days of affordable, flexible VMware solutions for smaller deployments appear to be ending permanently.

The good news is that alternatives like Hyper-V have matured significantly and can now handle most workloads that previously required VMware. Combined with cloud-native solutions and modern infrastructure approaches, mid-market organizations have viable paths forward—but only if they act decisively.

The virtualization landscape is experiencing its most significant disruption in decades. Organizations that move quickly to evaluate and implement alternatives will be best positioned to maintain cost-effective, capable infrastructure. Those who delay risk being trapped in unsustainable licensing agreements that could constrain their growth and innovation for years to come.

The revolution is here. The question isn’t whether change is coming—it’s whether your organization will lead or follow in responding to it.

Microsoft confirms KB5036893 and KB5036892 patches break VPNs

Microsoft’s recent patches, KB5036893 and KB5036892, released April 9th, 2024, has been impacting VPNs for both Windows 10 and Windows 11 machines.

This issue affects all currently supported versions of Windows: Windows 10 21H2 and 22H2; Windows 11 versions 21H2, 22H2, and 23H2; and Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, and 2022.

Microsoft is working on a fix, but it seems to be impacting VPN connections backed by TPM certificates.

To uninstall the update, press the Start button and search for ‘Settings’. On the screen that appears, click on ‘Windows Update’ and find and tap on the ‘Update history’ option. Here, you will see a list of installed updates. If you are on Windows 11, find the KB5036893 update and uninstall it. However, those on Windows 10 will have to find and uninstall the KB5036892 update.

Alternatively, Use the command DISM /online /get-packages to find the name of the April update package (specifically the LCU “cumulative” package) and use the DISM/Remove-Package command line option to begin the uninstall process. Detailed instructions are listed at the bottom of Microsoft’s KB5036893 support page.

VDI infrastructure

Virtual Desktop Infrastructure (VDI) adding security to your organization

Virtual desktop infrastructure (VDI) has many benefits (among them):

  • A scalable infrastructure: Virtual desktops have become more appealing due to the cloud. By using adaptable infrastructure to provide resources as needed, the consolidation of the full VDI desktop infrastructure onto a host server lowers overall costs because businesses don’t have to purchase or maintain the necessary hardware.
  • Management structure: The virtual desktop infrastructure allows administrators to patch, maintain, and modify all virtualized desktops simultaneously. As a result, there is no need to repair and maintain the entire network of desktop computers on an individual basis. Moreover, in the event of a major disruption, the data center has all information backed up and supported.
  • Enhanced Security: VDI desktop services allow organizations to preserve and protect their sensitive information because the data isn’t stored on the users’ individual devices but within the data center. If the employee’s laptop, desktop, or other device is compromised, the hacker cannot access the organization’s data. Of course, the effectiveness of the security will depend upon the IT team’s vigilance regarding system management, and the authentication process for the remote users has to be rigid and scrupulously maintained.
  • Improved user experience. Employees are allowed to use the device of their choice in the manner of their choice, making the remote working experience easier and more convenient.
  • Lower cost. The overheads for maintaining legacy hardware will be lowered considerably due to the reduced need to upgrade and maintain in-office hardware.

Our team, in conjunction with our skilled engineers at GCSIT, can help your organization plan, procure, implement and support your VDI solution.

VMware code execution flaw CVE-2021-21972

There is a newly disclosed code-execution vulnerability in VMware vCenter.  VMware was quick to release a patch (within a day) and it can be found here.

The severity of this vulnerability as well as the fact that there are exploits available for both Windows and Linux servers, kicked off a flurry of mass scanning for vulnerable vCenter Servers.

Code execution, no authorization required

CVE-2021-21972 allows hacker with no authorization to upload files to vulnerable vCenter servers that are publicly accessible over port 443, researchers from security firm Tenable said. Successful exploits will result in hackers gaining unfettered remote code-execution privileges in the underlying operating system. The vulnerability stems from a lack of authentication in the vRealize Operations plugin, which is installed by default.

The flaw has received a severity score of 9.8 out of 10.0 on the Common Vulnerability Scoring System Version 3.0. Mikhail Klyuchnikov, the Positive Technologies researcher who discovered the vulnerability and privately reported it to VMware, compared the risk posed by CVE-2021-21972 to that of CVE-2019-19781, a critical vulnerability in the Citrix Application Delivery Controller

Ransomware and the impact to your business

Everyday, you read another story about how a company has been hit by a ransomware attack, which potentially can disrupt your business, services to your clients and livelihood of your employees.

Just last week it was announced another company, Forward Air, was hit by a ransomware attack, which disrupted services and impacted revenue.  This attack was attributed to a group “Hades”.  Forward Air, a trucking company from Tennessee, posted revenues of $1.4 billion in  2019 and employs more than 4300.

The ransomware note, resembles a similar note used by another ransomware group known as “REvil”, also known as “Sodin”.

Hades Tor site

 

This is a Sodinokibi variant that was first seen in early 2019.  Sodinokibi is what is known as ransomware-as-a-service, basically a software package which is catered by underground vendors to threat actors providing them a ransomware platform tool.

Companies are limited in their ability to defend against this type of exploitation, especially if they do not have full time IT staff or contracted Managed Service Providers that focus on security.  Your organization must follow the following guidelines to help mitigate your exposure:

  • Patch aggressively so vulnerabilities are eliminated and access routes are contained
  • Enable endpoints with tools that automatically detect and respond to infections before they become systemwide
  • Enable network threat intelligence tools to detect anomalies in your network traffic
  • Make sure emails are screened for malicious payloads and links
  • Minimize access levels by employees to perform their job functions

If you have been hit by ransomware, or just want to assess your company’s state of preparedness, reach out to us to discuss your needs.

LMJ is a full service Managed Service Provider, with offices in Alaska and California.

 

secure data center

Cyber-security Training can save the day!

So you have secured your business.

Firewall, VPN for work from home, radius authenticated WiFi or perhaps an RDS gateway for remote desktops.  Anti-virus is up to date, patching is top notch, SaaS applications locked up with two-factor authentication.

What about educating your workforce?  Although Phishing is only the 5th most common primary cause of security incidents (per the Verizon 2020 Data Breach Report), following Denial-of-Service (DoS), data loss, Command and Control, or misdelivery of email/data – when it comes to data breaches Phishing is still number one.

Without a solid training plan for your employees, your business is at greater risk to have data compromised.

Top areas to look out for:

  • Social Engineering
  • Stolen Credentials
  • Malware (usually delivered via email)

According to Verizon, Phishing is the first step in about 20% of security incidents and plays a role in another 30% of secondary steps to gain access to your information.

Highlights by Sector

Financial and Insurance:

  • 1,509 incidents, 448 with confirmed data disclosure
  • What did they target, Web Applications, Miscellaneous Errors and Everything Else
    represent 81% of breaches
  • External to company (64%), Internal (35%), Partner (2%), Multiple (1%) (breaches)
  • Financial motive (91%), Espionage (3%), Grudge (3%) (breaches)
  • What did they get- Personal data (77%), Other (35%), Credentials (35%), Bank (32%)
    (breaches)
  • How do they solve the problem -Implement a Security Awareness and Training Program (CSC 17),
    Boundary Defense (CSC 12), Secure Configurations (CSC 5, CSC 11)

Healthcare:

  • 798 incidents, 521 with confirmed data disclosure
  • Miscellaneous Errors, Web Applications and Everything Else
    represent 72% of breaches.
  • External (51%), Internal (48%), Partner (2%), Multiple (1%) (breaches)
  • Financial motive (88%), Fun (4%), Convenience (3%) (breaches)
  • What did they get – Personal data (77%), Medical (67%), Other (18%), Credentials (18%)
    (breaches)
  • How do they solve the problem – Implement a Security Awareness and Training Program (CSC 17),
    Boundary Defense (CSC 12), Data Protection (CSC 13)

But my company is too small for someone to try and get our data!

While differences between small and medium-sized businesses (SMBs) and large organizations remain, the movement toward the cloud and its myriad web-based tools, along with the continued rise of social attacks, has narrowed the dividing line between the two.

As SMBs have adjusted their business models, the criminals have
adapted their actions to keep in step and select the quickest and easiest path to their victims.

Contact us to get more information on our security practice and how you can have your team trained on cyber-security awareness.