Monday, February 24, 2025
HomeCyber Security NewsVMware Workstation & Fusion Now Available for Free to All Users

VMware Workstation & Fusion Now Available for Free to All Users

Published on

SIEM as a Service

Follow Us on Google News

VMware has announced that its popular desktop hypervisor products, VMware Workstation and VMware Fusion, are now free to all users across various commercial, educational, and personal sectors.

The transition, effective November 11, 2024, marks a shift in VMware’s strategy to make these powerful virtualization tools more accessible to a broader audience.

Features & Support for the Free Version

Starting immediately, both VMware Workstation and VMware Fusion will no longer require paid subscriptions.

Previously available under a subscription or purchase model, these tools are now free of charge for everyone.

Attend a Free Webinar on How to Maximize Cybersecurity Program ROI

This change applies to personal and professional use, and the paid versions—Workstation Pro and Fusion Pro—will no longer be available for purchase.

VMware assures current customers with existing commercial contracts that their agreements will remain valid until the end of their respective terms.

These customers will continue receiving the same support and services stipulated in their contracts. However, once the current agreements expire, users will transition to the free version, which will no longer include paid support services.

Despite the shift to a free model, VMware confirms that all core features from the paid versions of Workstation and Fusion will still be available. Users can continue to rely on the tools they know and trust without compromising functionality.

For users accustomed to premium support, VMware will offer extensive online resources such as product documentation, knowledge base articles, and access to community forums.

While dedicated support ticketing will no longer be accessible after contract expiration, these free resources are designed to assist users in troubleshooting and optimizing their experience.

This change reflects VMware’s ongoing investment in its desktop hypervisors. The company is committed to continuing innovation, improving usability, and ensuring the stability of its products.

By expanding its user base, VMware hopes to gather more valuable feedback, drive further enhancements, and deliver even greater value to its growing community.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Smart Bed Security Flaw Lets Hackers Access Other Network Devices

A security researcher has uncovered critical vulnerabilities in Eight Sleep’s internet-connected smart beds, revealing...

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Smart Bed Security Flaw Lets Hackers Access Other Network Devices

A security researcher has uncovered critical vulnerabilities in Eight Sleep’s internet-connected smart beds, revealing...

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...