Your SlideShare is downloading. ×
0
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
vShield Suite
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

vShield Suite

1,389

Published on

High level overview about vShield Suite of products.

High level overview about vShield Suite of products.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,389
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
76
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. vShield
  • 2. VMware® vShield is a suite of security virtual appliances built for protecting virtualized datacenters from attacks and misuse
    vShield Components
    vShield Manager
    vShield Zones
    vShield App
    vShield Edge
    vShield End Point
  • 3. vShield Manager
    The vShield Manager is the centralized network management component of vShield suite and is installed from OVA as a virtual machine by using the vSphere Client.
    Using the vShield Manager user interface, administrators install, configure, and maintain vShield components
  • 4. vShield Zones
    • vShield Zones, included with the vShield Manager, provides firewall protection for traffic between virtual machines
    • 5. vShield App
    vShield App is an interior, vNIC‐level firewall that allows you to create access control policies regardless of network topology. A vShield App monitors all traffic in and out of an ESX host, including between virtual machines in the same port group. vShield App includes traffic analysis and container‐based policy creation.
    • vShield Edge
    vShield Edge provides network edge security and gateway services to isolate the virtual machines in a port group, vDS port group, or Cisco® Nexus 1000V.
    Common deployments of vShield Edge include in the DMZ, VPN Extranets, and multi‐tenant Cloud environments where the vShield Edge provides perimeter security for Virtual Datacenters (VDCs).
    • vShield End Point
    vShield Endpoint delivers an introspection‐based antivirus solution. vShield Endpoint uses the hypervisor to scan guest virtual machines from the outside without a bulky agent
  • 6.
  • 7. vShield Zones
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Firewall Rules
  • 13. vShield App
    vShield App is an interior, vNIClevel firewall that allows you to create access control policies regardless of network topology. A vShield App monitors all traffic in and out of an ESX host, including between virtual machines in the same port group. vShield App includes traffic analysis and container‐based policy creation.
  • 14. vShield App
    VMware vShield App, part of the VMware vShield family of virtualization security products, protects as applications in the virtual datacenter from network based threats. vShield App gives organizations deep visibility into network communications between virtual machines and enables granular policy enforcement with security groups. The solution also eliminates the hardware and policy sprawl associated through traditional measures, resulting in a cost-effective solution that helps customers to go beyond the limitations of physical security.
  • 15. Key Benfits
    Increase visibility and control over network communications between virtual machines.
    Eliminate the need for dedicated hardware
    and VLANs to separate security groups from one another.
    Optimize hardware resource utilization while maintaining strong security.
    Simplify compliance with comprehensive logging of all virtual machine network activity.
  • 16. Vshield App enables Granular Policy Enforcement Using Security Groups
  • 17. vShield Edge
    vShield Edge provides network edge security and gateway services to isolate the virtual machines in a port group, vDS port group, or Cisco® Nexus 1000V.
    Common deployments of vShield Edge include in the DMZ, VPN Extranets, and multi‐tenant Cloud environments where the vShield Edge provides perimeter security for Virtual Datacenters (VDCs).
  • 18.
  • 19. Consolidate edge security hardware: Provision edge security services, including firewall and VPN, using existing vSphere resources, eliminating the need for hardware-based solutions.
  • 20. Ensure performance and availability of web services: Efficiently manage inbound web traffic across virtual machine clusters with web load balancing capabilities
  • 21. Accelerate IT compliance: Get increased visibility and control over security at the network edge, with the logging and auditing controls you need to demonstrate compliance with internal policies and external regulatory requirements
  • 22. vShield End Point
    vShield Endpoint delivers an introspection‐based antivirus solution. vShield Endpoint uses the hypervisor to scan guest virtual machines from the outside without a bulky agent
  • 23.
  • 24. Streamline antivirus and anti-malware deployment: Deploy enterprise antivirus engine and signature file to a single security virtual machine instead of each and every individual virtual machine on a vSphere host
  • 25. Improve virtual machine performance: Securely achieve higher consolidation ratios by the same offload mechanism as described above
  • 26. Prevent antivirus storms and bottlenecks: Prevent antivirus storms and bottlenecks associated with multiple simultaneous antivirus and anti-malware scans and updates
  • 27. Protect antivirus security software from attack: Deploy and run the antivirus and anti-malware client software in a hardened security virtual machine to prevent targeted attacks

×