• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Next Generation Security Platforms Will Enable Clouds To ...
 

Next Generation Security Platforms Will Enable Clouds To ...

on

  • 493 views

 

Statistics

Views

Total Views
493
Views on SlideShare
493
Embed Views
0

Actions

Likes
0
Downloads
11
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • As vendors come up with new methods of protecting their customers, their technologies should be included in the tests. Protection Networks using cloud-based technologies are currently prohibited from the traditional Anti-Virus/Anti-Malware testing methodologies. Trend Micro’s Smart Protection Network uses in-the-cloud reputation technologies to block threats at their source and therefore should be included in any new testing methodologies.

Next Generation Security Platforms Will Enable Clouds To ... Next Generation Security Platforms Will Enable Clouds To ... Presentation Transcript

  • Next Generation Security Platforms Will Enable Clouds To Fulfill Their Promise John Maddison SVP Trend Micro June 7 th 2010
  • Cloud Security Business Model Scalable Subscription Service Model Cross Selling Opportunities
  • 3 Types Of Cloud Security Security from The Cloud Security for The Cloud Security in The Cloud 1 2 3
  • Threat Environment Evolving Threat of Volume Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) 1 By 2015 233,000,000 Per Year
  • Crimeware Driving the Threat Environment
    • Complex
    • High Volume
    • Short Life Cycle
    1 PROFIT DRIVEN SOPHISTICATED Web Botnets Spyware Spam Worms Complexity MULTIPLYING 5,490,960 1985 1995 2007 Malware Sample Collection Growth 2005
  • Cloud Client Architecture Now Required Threat Protection Databases 50 Signatures Per Day Past Threat Protection Databases 50,000 Signatures Per Day Today Threat Protection Databases (CORRELATION) Reputation Queries Tomorrow Files URLs IP’s Files Files URLs IP’s 1
  • Threat Protection vs. Detection TARGET LINKS & ATTACHMENTS INTERNET REMOVABLE MEDIA FILE TRANSFERS EMAIL WEBSITES THREATS THREATS THREATS WEB REPUTATION EMAIL REPUTATION FILE REPUTATION SPAM
  • The $30B (IDC) Security Market Will Shift to the Cloud 3
  • Baseline Security Moving To The Cloud
    • Small Business
    • All Security Solutions - Cloud Client Enabled
    • Option for Cloud Management
    • Enterprise
    • All Security Solutions - Cloud Client Enabled
    • Option for Local Cloud
    1
  • Data Center Being Upgraded
    • Consolidation & Virtualization
    • Virtual Desktop Infrastructure
    • Private, Public & Hybrid Cloud
    • Data Protection
    • Compliance
    2
  • Datacenter-hosted Virtual Desktop Infrastructure
    • User Operating environment
    • Virtual machine on an central server
    • Accessed from existing hardware
    • or a thin client
    • Can be accessed from anywhere
      • Home PC over VPN
      • BYOC
    • Analysts view:
    • Gartner:
    • “ [VDI] will undergo an explosive growth...“
    • Enterprise strategy group:
    • ” 60% of enterprises have a VDI strategy“
    • Forrester:
    • “ three-quarters of firms now have client
    • virtualization on their IT agenda for the next
    • 12 months“
    2
  • Traditional Security Causes Resource Contention
    • The “9-AM problem”
      • Multiple users log in and get updates at the same time
    • Scheduled scans
      • Adds significant load to the endpoint
      • Multiplied by number of VMs
    Cumulative system load Customers had to completely disable Security in their VDI environments!
  • Security Needs to Align with the New Infrastructure
    • Detects whether endpoints are physical or virtual
      • With VMware View
      • With Citrix XenDesktop
    • Serializes updates and scans per VDI-host
      • Controls the number of concurrent scans and updates per VDI host
      • Maintains availability and performance of VDI host
      • Faster than concurrent approach
    • Leverages Base-images to further shorten scan times
      • Pre-scans and white-lists VDI base-images
      • Prevents duplicate scanning of unchanged files on a VDI host
      • Further reduces impact on the VDI host
  • Deep Security Architecture
  • Key Security Practices
    • Protecting Virtualized Environments & Ensuring Compliance
    • Securing the Public Cloud without Losing Control
    • Managing Traditional and Virtual Desktop Infrastructure (VDI) Security
    2
  • SaaS Market 2010 - $2B (IDC) 3
  • SaaS Basic’s
    • Hosted
    • Hybrid SaaS
    • Market Coverage
    • Segment Focus
    • Adding Value
    3
  • Hosted Solutions For Small Businesses 3 In-the-Cloud Gateway Network Servers Endpoint Off Network Hosted Email Security Web Application Scanning Hosted Endpoint (WFBS-S) Hosted Web Security (WFBS-S)
  • Hybrid SaaS Solutions For Enterprises 3 Web Services On-Premise Part Cloud Part Pre-Filter For Emails Central Policy Outbound Email Compliance Internal Vulnerability Scanning
  • Reseller Management Tools 3
    • Reseller Console
    • Manage Customer Profiles
    • License Management
    • Manage Policy
    • Consolidated Reporting
    Customer 1 Customer 2 Customer N
  • Key Reseller Take-Aways
    • Differentiated Cloud Security Offerings
    • Data Center Security Practices
    • Scalable, Multiple SaaS Offerings with Reseller Management
  •