BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High Performance Cloud
Upcoming SlideShare
Loading in...5
×
 

BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High Performance Cloud

on

  • 610 views

BreakingPoint and Juniper presentation "Practical Advice for Securing the High Performance Cloud" at the 2011 RSA Conference.

BreakingPoint and Juniper presentation "Practical Advice for Securing the High Performance Cloud" at the 2011 RSA Conference.

Statistics

Views

Total Views
610
Views on SlideShare
610
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High Performance Cloud BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High Performance Cloud Presentation Transcript

    • Practical Advice for Securing the High-Performance CloudFebruary 16th at 4:30 PM
    • You Deal With An IT Firestorm Every Day…
    • …And Now You Are Moving To The Cloud Can you stay compliant? Will it be secure? Will it remain high-performing?3
    • Market DYNAMICS 50% of the world’s workloads will be virtualized by 2012 –Gartner Virtualization is near de-facto architecture for clouds –GigaOM Security is a top concern for virtualization adoption –CDW Survey 37% of large enterprises expect to adopt IaaS (cloud) in the next year –Yankee Group
    • The Challenge & Opportunity 5
    • How IS virtualization Different Page 6
    • Virtualization/Cloud Security Challenges• Monitoring and auditing breaks – Physical security is blind to traffic – VMs can “move” to low trust zones• Continuous enforcement is very difficult – VM replicate on a click and sprawl – VM users can self provision – “Bad” configurations proliferate easily• Separation of duties is lost – Server, network boundaries are blurred – Unified administration gives too• Least privilege access policy enforcement is lost – VM access patterns can change with “migration” – Too much change means errors Page 7
    • Goal: Enable Cloud/Retain Control 1. VLANs offer no 1. Agents are very 1. Superior security granular security costly to manage 2. “Wire-line” perf 2. Physical FWs 2. Significant perf 3. Minimal are expensive degradation overhead 4. 10x cost reduction Page 8
    • The IDEAL MIX: Hypervisor-BASED Security 1. Using a custom kernel enforcement embeds into the ESX hypervisor in “fast path” mode 2. All packets flow through the hypervisor-embedded security engine Page 9
    • vGW & The Hypervisor-based ArchitectureEnterprise-grade VMware “VMsafe Certified” Protects each VM and the hypervisor Fault-tolerant architecture (i.e. HA) Virtual Center Security Design VM for VGW VM1 VM2 VM3Virtualization Aware “Secure VMotion” scales to ESX Host 1,000+ ESX Partner Server (IDS, SIM, “Auto Secure” detects/protects Syslog, Netflow) new VMs Packet Data THE vGW ENGINE ESX Kernal VMWARE DVFILTERGranular, Tiered Defense VMWARE VSWITCH OR CISCO 1000V Stateful firewall and integrated IDS Flexible Policy Enforcement – Zone, VM group, VM, Application, Port, HYPERVISOR Protocol, Security state
    • Traditional Cloud Validation Approach• 100-1000+ servers• $ Millions in software licenses• Multiple products with separate interfaces• Many disassociated reports Load• No security validation Balancer Application Traffic Test Software Router Firewall IPS Switch• High total cost of ownership Virtual or• Limited performance Physical• Doesn’t effectively stress SSL Server, infrastructure Accelerator Server• Inaccurate and error-prone Farm, Data• Complex and labor intensive Center
    • BreakingPoint’s Approach• Stresses infrastructure with mix of stateful application traffic• Validates performance/effectiveness under extreme load conditions• Validates the integrity of server transactions• Integrates security for ability to assess performance under attack
    • Questions and Answers13