Your SlideShare is downloading. ×

Security for the Virtual Environment

552
views

Published on

Whether in a virtualised environment or on a physical network, the need for security against all types of threat is real. This session will show how you can secure your virtual machines, applications …

Whether in a virtualised environment or on a physical network, the need for security against all types of threat is real. This session will show how you can secure your virtual machines, applications and traffic, as well as meet critical regulatory compliance requirements, by segregating virtual systems from each other as well as from external threats. Check Point's VPN-1 VE is the only solution that can inspect inter-VM traffic, protecting against both internal and external threats with a single management interface to ensure consistent, efficient security management.

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
552
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
46
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • http://www.gartner.com/it/page.jsp?id=1322414http://www.eweek.com/c/a/Virtualization/Server-Virtualization-Adoption-Growing-Rapidly-Gartner-821995/
  • Why changeSeeing a push to reduce costs and maximise resource uterlisationWith a need for flexibilityAnd increased speed of deployment
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.‘Classical’ exploits are very real- if it’s a threat in the physical world, it’s likely a threat in the virtual.
  • Integration with VMware VMsafe™ network APIs in fast-path mode, enables security inspections to be processed in the hypervisor kernel. This integrating into the VMware hypervisor provides the transparency to prevent threats and attacks such as viruses, trojans and keyloggers from ever reaching a virtual machine.
  • Transcript

    • 1. Check Point Simplifies Cloud Security
    • 2. Agenda
      1
      4
      2
      3
      5
      Customer Drivers and Challenges
      Solution Overview
      Virtualization Use Scenarios
      Packaging and Software Blades
      Summary
    • 3. Server Virtualization Market Trends
      Organizations with virtualized environments are asking for a simple solution to secure the Virtual Machines.
      • By 2012 half of the enterprise workload will be virtualized
      • 4. 60% of IT Managers claim securing virtual machines is difficult
    • The Drivers For Change
      Reduce operational costs
      Reusing and leveraging investment in technology
      Maximizing resources
      Reduce Datacenter footprint
      Increased flexibility
      Speed of deployment
      Higher utilization of resources
      Greener computing
      Reduced power consumption
      Maximizing Investment
    • 5. Virtualization Security Challenges
      Inspect traffic between
      Virtual Machines (VMs)
      Secure new Virtual Machines automatically
      Protection from external threats
      Security Challenges
      in Virtual Environments
    • 6. Virtualization Security Challenges
      Security Challenges
      in Virtual Environments
      VM
      VM
      VM
      Hypervisor
    • 7. Virtualization Security Challenges
      Maintain zero-downtime during Virtual Machines live migration
      Ensure Security in dynamic environments
      Security Challenges in Virtual Environments (Data Center/Cloud)
    • 8. Introducing Check PointSecurity Gateway Virtual Edition (VE)
      Unified Management for Physical and Virtual
      Best Virtual Security Gateway with the Software Blade Architecture
      Securing the Virtual Machines
      Check Point Delivers Plug and Play Security for Public and Private Clouds
      Starting at
      $2,000
      Check Point
      Security Gateway
      Virtual Edition
      Software
      Blades
    • 9. Secure the Virtual Infrastructure
      • Seamless security within the Hypervisor
      • 10. Integration with VMsafe technology
      • 11. Audit configuration changes in the virtualization system
      Inter-VM Traffic Inspection Protects Virtual Machines
      VE
      VM
      VM
      Hypervisor
      Hypervisor Connector
    • 12. Virtual Edition Features
      VM
      VM
      VE
      Best Security
      • Include Firewall, IPS, VPN and all other Software Blades.
      • 13. Flexible and extensible security
      VPN
      Check Point Security Gateway Virtual Edition (VE)
      Antivirus
      Firewall
      IPS
      Hypervisor
      Hypervisor Connector
      Software
      Blades
    • 14. Virtual Edition Features
      VM
      VM
      VE
      VMs Protection
      Best Security
      VM
      VM
      • Plug and Play with no topology changes
      • 15. Securing new VMs automatically
      • 16. Zero-downtime during VMs live migration
      • 17. Include Firewall, IPS, VPN and all other Software Blades.
      • 18. Flexible and extensible security
      Inspecting Inter-VM Traffic
      Hypervisor
      Hypervisor Connector
    • 19. Virtual Edition Features
      VM
      VM
      VE
      VMs Protection
      Best Security
      • Plug and Play with no topology changes
      • 20. Securing new VMs automatically
      • 21. Zero-downtime during VMs live migration
      • 22. Include Firewall, IPS, VPN and all other Software Blades.
      • 23. Flexible and extensible security
      Securing Dynamic Environments
      Hypervisor
      Hypervisor Connector
    • 24. Virtual Edition Features
      Unified Management
      Best Security
      VMs Protection
      • Include Firewall, IPS, VPN and all other Software Blades.
      • 25. Flexible and extensible security
      • 26. Plug and Play with no topology changes
      • 27. Securing new VMs automatically
      • 28. Zero-downtime during VMs live migration
      • 29. Same management for Physical and Virtual
      • 30. Running the management blades on a Virtual Machine
    • Virtual Edition Features
      VM
      Unified Management
      Best Security
      VMs Protection
      • Include Firewall, IPS, VPN and all other Software Blades.
      • 31. Flexible and extensible security
      • 32. Plug and Play with no topology changes
      • 33. Securing new VMs automatically
      • 34. Zero-downtime during VMs live migration
      • 35. Same management for Physical and Virtual
      • 36. Running the management blades on a Virtual Machine
      VM
      Virtualizing the Management Systems
      Hypervisor
      Hypervisor Connector
    • 37. Virtualized Security Scenarios
      Office in a Box
      Use Security Gateway Virtual Edition (VE)with firewall, IPS, VPN and Software Blade to secure your office networks and assets
      Hypervisor
      Enterprise Security Gateways
      Consolidate your Security Gateways deployment into a virtualized environment
      VE
      VE
      VE
      VE
      VE
      Hypervisor
      Secure the Virtual Environment
      Use Security Gateway Virtual Edition to apply granular firewall and IPS policies for inter-VM traffic
      Hypervisor Connector
      Hypervisor
    • 38. Software Blades for Virtual Systems
      From $2000
      +
      Firewall
      SGVExxxx
      Additional Software Blades can be added A-La-Carte
      • New containers for Security Gateway VE
      • 39. Firewall with integrated Hypervisor protection
      • 40. Based on number of physical cores
      Optional
    • 41. Summary
      Unified Management for Physical and Virtual
      Best Virtual Security Gateway with the Software Blade Architecture
      Securing the Virtual Machines
      Check Point Delivers Plug and Play Security for Public and Private Clouds
      Starting at
      $2,000
      Check Point
      Security Gateway
      Virtual Edition
      Software
      Blades