Your SlideShare is downloading. ×
0
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Security for the Virtual Environment
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security for the Virtual Environment

566

Published on

Whether in a virtualised environment or on a physical network, the need for security against all types of threat is real. This session will show how you can secure your virtual machines, applications …

Whether in a virtualised environment or on a physical network, the need for security against all types of threat is real. This session will show how you can secure your virtual machines, applications and traffic, as well as meet critical regulatory compliance requirements, by segregating virtual systems from each other as well as from external threats. Check Point's VPN-1 VE is the only solution that can inspect inter-VM traffic, protecting against both internal and external threats with a single management interface to ensure consistent, efficient security management.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
566
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
47
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • http://www.gartner.com/it/page.jsp?id=1322414http://www.eweek.com/c/a/Virtualization/Server-Virtualization-Adoption-Growing-Rapidly-Gartner-821995/
  • Why changeSeeing a push to reduce costs and maximise resource uterlisationWith a need for flexibilityAnd increased speed of deployment
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.
  • Virtualization is part of the IT strategy; NOT a security solutionVirtualization introduces a lack of visibility and potential vulnerabilities into a networkHypervisor attacks are “myths” – no real threats operationally, yet. And we’ll talk a little more about this and how to we’re going to help stay a few steps ahead of this potential/hypothetical threat.‘Classical’ exploits are very real- if it’s a threat in the physical world, it’s likely a threat in the virtual.
  • Integration with VMware VMsafe™ network APIs in fast-path mode, enables security inspections to be processed in the hypervisor kernel. This integrating into the VMware hypervisor provides the transparency to prevent threats and attacks such as viruses, trojans and keyloggers from ever reaching a virtual machine.
  • Transcript

    • 1. Check Point Simplifies Cloud Security<br />
    • 2. Agenda<br />1<br />4<br />2<br />3<br />5<br />Customer Drivers and Challenges<br />Solution Overview<br />Virtualization Use Scenarios<br />Packaging and Software Blades<br />Summary<br />
    • 3. Server Virtualization Market Trends<br />Organizations with virtualized environments are asking for a simple solution to secure the Virtual Machines.<br /><ul><li>By 2012 half of the enterprise workload will be virtualized
    • 4. 60% of IT Managers claim securing virtual machines is difficult</li></li></ul><li>The Drivers For Change<br />Reduce operational costs<br />Reusing and leveraging investment in technology <br />Maximizing resources<br />Reduce Datacenter footprint<br />Increased flexibility<br />Speed of deployment<br />Higher utilization of resources<br />Greener computing<br />Reduced power consumption<br />Maximizing Investment<br />
    • 5. Virtualization Security Challenges<br />Inspect traffic between <br />Virtual Machines (VMs)<br />Secure new Virtual Machines automatically<br />Protection from external threats<br />Security Challenges<br /> in Virtual Environments<br />
    • 6. Virtualization Security Challenges<br />Security Challenges<br /> in Virtual Environments<br />VM<br />VM<br />VM<br />Hypervisor<br />
    • 7. Virtualization Security Challenges<br />Maintain zero-downtime during Virtual Machines live migration <br />Ensure Security in dynamic environments<br />Security Challenges in Virtual Environments (Data Center/Cloud)<br />
    • 8. Introducing Check PointSecurity Gateway Virtual Edition (VE)<br />Unified Management for Physical and Virtual<br /> Best Virtual Security Gateway with the Software Blade Architecture <br /> Securing the Virtual Machines <br />Check Point Delivers Plug and Play Security for Public and Private Clouds<br />Starting at<br /> $2,000<br />Check Point <br />Security Gateway<br />Virtual Edition<br />Software <br />Blades<br />
    • 9. Secure the Virtual Infrastructure <br /><ul><li>Seamless security within the Hypervisor
    • 10. Integration with VMsafe technology
    • 11. Audit configuration changes in the virtualization system</li></ul>Inter-VM Traffic Inspection Protects Virtual Machines <br />VE<br />VM<br />VM<br />Hypervisor<br />Hypervisor Connector<br />
    • 12. Virtual Edition Features <br />VM<br />VM<br />VE<br />Best Security<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    • 13. Flexible and extensible security</li></ul>VPN<br />Check Point Security Gateway Virtual Edition (VE)<br />Antivirus<br />Firewall<br />IPS<br />Hypervisor<br />Hypervisor Connector<br />Software <br />Blades<br />
    • 14. Virtual Edition Features <br />VM<br />VM<br />VE<br />VMs Protection<br />Best Security<br />VM<br />VM<br /><ul><li>Plug and Play with no topology changes
    • 15. Securing new VMs automatically
    • 16. Zero-downtime during VMs live migration
    • 17. Include Firewall, IPS, VPN and all other Software Blades.
    • 18. Flexible and extensible security</li></ul>Inspecting Inter-VM Traffic<br />Hypervisor<br />Hypervisor Connector<br />
    • 19. Virtual Edition Features <br />VM<br />VM<br />VE<br />VMs Protection<br />Best Security<br /><ul><li>Plug and Play with no topology changes
    • 20. Securing new VMs automatically
    • 21. Zero-downtime during VMs live migration
    • 22. Include Firewall, IPS, VPN and all other Software Blades.
    • 23. Flexible and extensible security</li></ul>Securing Dynamic Environments <br />Hypervisor<br />Hypervisor Connector<br />
    • 24. Virtual Edition Features <br />Unified Management<br />Best Security<br />VMs Protection<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    • 25. Flexible and extensible security
    • 26. Plug and Play with no topology changes
    • 27. Securing new VMs automatically
    • 28. Zero-downtime during VMs live migration
    • 29. Same management for Physical and Virtual
    • 30. Running the management blades on a Virtual Machine </li></li></ul><li>Virtual Edition Features <br />VM<br />Unified Management<br />Best Security<br />VMs Protection<br /><ul><li>Include Firewall, IPS, VPN and all other Software Blades.
    • 31. Flexible and extensible security
    • 32. Plug and Play with no topology changes
    • 33. Securing new VMs automatically
    • 34. Zero-downtime during VMs live migration
    • 35. Same management for Physical and Virtual
    • 36. Running the management blades on a Virtual Machine </li></ul>VM<br />Virtualizing the Management Systems <br />Hypervisor<br />Hypervisor Connector<br />
    • 37. Virtualized Security Scenarios<br />Office in a Box<br />Use Security Gateway Virtual Edition (VE)with firewall, IPS, VPN and Software Blade to secure your office networks and assets<br />Hypervisor<br />Enterprise Security Gateways <br />Consolidate your Security Gateways deployment into a virtualized environment<br />VE<br /> VE<br /> VE<br /> VE<br />VE<br />Hypervisor<br />Secure the Virtual Environment<br />Use Security Gateway Virtual Edition to apply granular firewall and IPS policies for inter-VM traffic<br />Hypervisor Connector<br />Hypervisor<br />
    • 38. Software Blades for Virtual Systems<br />From $2000<br />+<br />Firewall<br />SGVExxxx<br />Additional Software Blades can be added A-La-Carte <br /><ul><li>New containers for Security Gateway VE
    • 39. Firewall with integrated Hypervisor protection
    • 40. Based on number of physical cores </li></ul>Optional<br />
    • 41. Summary<br />Unified Management for Physical and Virtual<br /> Best Virtual Security Gateway with the Software Blade Architecture <br /> Securing the Virtual Machines <br />Check Point Delivers Plug and Play Security for Public and Private Clouds<br />Starting at<br /> $2,000<br />Check Point <br />Security Gateway<br />Virtual Edition<br />Software <br />Blades<br />

    ×