Security for the Virtual Environment

485 views

Published on

Whether in a virtualised environment or on a physical network, the need for security against all types of threat
is real. This session will show how you can secure your virtual machines, applications and traffic, as well as
meet critical regulatory compliance requirements, by segregating virtual systems from each other as well as
from external threats. Check Point’s VPN-1 VE is the only solution that can inspect inter-VM traffic, protecting
against both internal and external threats with a single management interface to ensure consistent, efficient
security management.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
485
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • http://www.gartner.com/it/page.jsp?id=1322414http://www.eweek.com/c/a/Virtualization/Server-Virtualization-Adoption-Growing-Rapidly-Gartner-821995/
  • Why changeSeeing a push to reduce costs and maximise resource uterlisationWith a need for flexibilityAnd increased speed of deployment
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.‘Classical’ exploits are very real- if it’s a threat in the physical world, it’s likely a threat in the virtual.
  • Integration with VMware VMsafe™ network APIs in fast-path mode, enables security inspections to be processed in the hypervisor kernel. This integrating into the VMware hypervisor provides the transparency to prevent threats and attacks such as viruses, trojans and keyloggers from ever reaching a virtual machine.
  • Security for the Virtual Environment

    1. 1. Check Point Simplifies Cloud Security<br />
    2. 2. Agenda<br />1<br />4<br />2<br />3<br />5<br />Customer Drivers and Challenges<br />Solution Overview<br />Virtualization Use Scenarios<br />Packaging and Software Blades<br />Summary<br />
    3. 3. Server Virtualization Market Trends<br />Organizations with virtualized environments are asking for a simple solution to secure the Virtual Machines.<br /><ul><li>By 2012 half of the enterprise workload will be virtualized
    4. 4. 60% of IT Managers claim securing virtual machines is difficult</li></li></ul><li>The Drivers For Change<br />Reduce operational costs<br />Reusing and leveraging investment in technology <br />Maximizing resources<br />Reduce Datacenter footprint<br />Increased flexibility<br />Speed of deployment<br />Higher utilization of resources<br />Greener computing<br />Reduced power consumption<br />Maximizing Investment<br />
    5. 5. Virtualization Security Challenges<br />Inspect traffic between <br />Virtual Machines (VMs)<br />Secure new Virtual Machines automatically<br />Protection from external threats<br />Security Challenges<br /> in Virtual Environments<br />
    6. 6. Virtualization Security Challenges<br />Security Challenges<br /> in Virtual Environments<br />VM<br />VM<br />VM<br />Hypervisor<br />
    7. 7. Virtualization Security Challenges<br />Maintain zero-downtime during Virtual Machines live migration <br />Ensure Security in dynamic environments<br />Security Challenges in Virtual Environments (Data Center/Cloud)<br />
    8. 8. Introducing Check PointSecurity Gateway Virtual Edition (VE)<br />Unified Management for Physical and Virtual<br /> Best Virtual Security Gateway with the Software Blade Architecture <br /> Securing the Virtual Machines <br />Check Point Delivers Plug and Play Security for Public and Private Clouds<br />Starting at<br /> $2,000<br />Check Point <br />Security Gateway<br />Virtual Edition<br />Software <br />Blades<br />
    9. 9. Secure the Virtual Infrastructure <br /><ul><li>Seamless security within the Hypervisor
    10. 10. Integration with VMsafe technology
    11. 11. Audit configuration changes in the virtualization system</li></ul>Inter-VM Traffic Inspection Protects Virtual Machines <br />VE<br />VM<br />VM<br />Hypervisor<br />Hypervisor Connector<br />
    12. 12. Virtual Edition Features <br />VM<br />VM<br />VE<br />Best Security<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    13. 13. Flexible and extensible security</li></ul>VPN<br />Check Point Security Gateway Virtual Edition (VE)<br />Antivirus<br />Firewall<br />IPS<br />Hypervisor<br />Hypervisor Connector<br />Software <br />Blades<br />
    14. 14. Virtual Edition Features <br />VM<br />VM<br />VE<br />VMs Protection<br />Best Security<br />VM<br />VM<br /><ul><li>Plug and Play with no topology changes
    15. 15. Securing new VMs automatically
    16. 16. Zero-downtime during VMs live migration
    17. 17. Include Firewall, IPS, VPN and all other Software Blades.
    18. 18. Flexible and extensible security</li></ul>Inspecting Inter-VM Traffic<br />Hypervisor<br />Hypervisor Connector<br />
    19. 19. Virtual Edition Features <br />VM<br />VM<br />VE<br />VMs Protection<br />Best Security<br /><ul><li>Plug and Play with no topology changes
    20. 20. Securing new VMs automatically
    21. 21. Zero-downtime during VMs live migration
    22. 22. Include Firewall, IPS, VPN and all other Software Blades.
    23. 23. Flexible and extensible security</li></ul>Securing Dynamic Environments <br />Hypervisor<br />Hypervisor Connector<br />
    24. 24. Virtual Edition Features <br />Unified Management<br />Best Security<br />VMs Protection<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    25. 25. Flexible and extensible security
    26. 26. Plug and Play with no topology changes
    27. 27. Securing new VMs automatically
    28. 28. Zero-downtime during VMs live migration
    29. 29. Same management for Physical and Virtual
    30. 30. Running the management blades on a Virtual Machine </li></li></ul><li>Virtual Edition Features <br />VM<br />Unified Management<br />Best Security<br />VMs Protection<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    31. 31. Flexible and extensible security
    32. 32. Plug and Play with no topology changes
    33. 33. Securing new VMs automatically
    34. 34. Zero-downtime during VMs live migration
    35. 35. Same management for Physical and Virtual
    36. 36. Running the management blades on a Virtual Machine </li></ul>VM<br />Virtualizing the Management Systems <br />Hypervisor<br />Hypervisor Connector<br />
    37. 37. Virtualized Security Scenarios<br />Office in a Box<br />Use Security Gateway Virtual Edition (VE)with firewall, IPS, VPN and Software Blade to secure your office networks and assets<br />Hypervisor<br />Enterprise Security Gateways <br />Consolidate your Security Gateways deployment into a virtualized environment<br />VE<br /> VE<br /> VE<br /> VE<br />VE<br />Hypervisor<br />Secure the Virtual Environment<br />Use Security Gateway Virtual Edition to apply granular firewall and IPS policies for inter-VM traffic<br />Hypervisor Connector<br />Hypervisor<br />
    38. 38. Software Blades for Virtual Systems<br />From $2000<br />+<br />Firewall<br />SGVExxxx<br />Additional Software Blades can be added A-La-Carte <br /><ul><li>New containers for Security Gateway VE
    39. 39. Firewall with integrated Hypervisor protection
    40. 40. Based on number of physical cores </li></ul>Optional<br />
    41. 41. Summary<br />Unified Management for Physical and Virtual<br /> Best Virtual Security Gateway with the Software Blade Architecture <br /> Securing the Virtual Machines <br />Check Point Delivers Plug and Play Security for Public and Private Clouds<br />Starting at<br /> $2,000<br />Check Point <br />Security Gateway<br />Virtual Edition<br />Software <br />Blades<br />

    ×