SlideShare a Scribd company logo
1 of 37
©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals
Síla virtuality
virtualizovaná bezpečnost
Softwarově Definovaných Datových Center (SDDC)
s plnou podporou SDN
Martin Koldovský, Check Point Software Technologies
SE Manager Eastern Europe
©2015 Check Point Software Technologies Ltd. 22
DID YOU KNOW?
months is the
average time to
deliver new DC
service.
Source: Gartner Research
©2015 Check Point Software Technologies Ltd. 33
$7,900 per minute
$1/2 M dollar per hour
Source: Gartner Research
DID YOU KNOW?
Average Costs of a downtime:
©2015 Check Point Software Technologies Ltd. 44
DID YOU KNOW?
1 in 5 companies
fire employees
due to downtime.
Source: Gartner Research
©2015 Check Point Software Technologies Ltd. 8[Restricted] ONLY for designated groups and individuals
CRM ERP Web
Server
File
System
Billing Mail
Server
The Backbone of any Enterprise Business
©2015 Check Point Software Technologies Ltd. 99[Restricted] ONLY for designated groups and individuals
It is nearly impossible for
today’s data center to run at
business speed.
“
”ZK Research
©2015 Check Point Software Technologies Ltd. 10
Hey, I can spin-up VMs in
minutes. Why does it take
a week to get
network/firewall changes
State of Virtualization vs. Networking
©2015 Check Point Software Technologies Ltd. 1111[Restricted] ONLY for designated groups and individuals
The traditional DC is
SLOW
INSECURE
©2015 Check Point Software Technologies Ltd. 1212[Confidential] For designated groups and individuals
But it doesn’t have to
work this way.
let’s take a
DIFFERENT
APPROACH
©2015 Check Point Software Technologies Ltd. 13
A new networking model is needed
[Highly Restricted] ONLY for designated individuals
Facebook’s Data Center @ Altoona Iowa US
©2015 Check Point Software Technologies Ltd. 1414[Restricted] ONLY for designated groups and individuals
A new trend is gaining momentum…
Software Defined Networking
©2015 Check Point Software Technologies Ltd. 1515[Restricted] ONLY for designated groups and individuals
Before SDN
Traditionally, switches and routers learn
the network topology by communicating
with neighbor devices
©2015 Check Point Software Technologies Ltd. 1616[Restricted] ONLY for designated groups and individuals
What is SDN all about?
Controller
With SDN, network devices get
directions from a central controller
©2015 Check Point Software Technologies Ltd. 1717[Restricted] ONLY for designated groups and individuals
Benefits of SDN
Controller
SDN allows modern networks to be
more agile and automated
Network
App
Network
App
©2015 Check Point Software Technologies Ltd. 1818
Traditional Data Center
• Dedicated and
Isolated Hardware
• Low utilization
• Low flexibility
Virtualized Data Center
• Server Consolidation and
Virtualization
• Optimized Compute utilization
• Performance issues
Software Defined
Data Center
• Offer infrastructure
as a service
• Better utilization
• Higher flexibility /
Capacity on
demand
DATA
CENTER
EVOLUTION
Server Virtualization
Allows aggregation of
multiple independent
virtual servers to exist
on a physical server
2007-2010
Network Virtualization
Decouples the physical infrastructure
from the connectivity services making
the network adaptive and dynamic
with simple one-touch provisioning
Compute
Access
Data Center
Core
Campus
Core
Distribution
Layer
Access
Layer
©2015 Check Point Software Technologies Ltd. 19
SDDC
©2015 Check Point Software Technologies Ltd. 20
The SDDC Vision
[Restricted] ONLY for designated groups and individuals
Software Defined Data Center revolutionize IT by
implementing SDN concepts and supporting :
Orchestration & automation
Private/Hybrid cloud
Self service
©2015 Check Point Software Technologies Ltd. 21
SDDC improves traffic flows
[Restricted] ONLY for designated groups and individuals
• Networking layer is virtualized and centrally controlled
• IP segments no longer force ineffective traffic routes
• Fully optimized traffic flows are be generated automatically
on demand without admin intervention
• Potentially – everything is connected !
©2015 Check Point Software Technologies Ltd. 22
But what about security ?
[Restricted] ONLY for designated groups and individuals
• Traditional security methodology no longer apply:
̶ No IP based topology
̶ No clear static segments
̶ Dynamic real-time end-user-triggered changes
̶ Security policies and access control readiness for changes
̶ Lack of virtualization awareness
̶ The Data Center is a blind spot for the IT security
• Multiple vendor-independent components
• Dynamic traffic flows serving application layer
• SDDC prone to malware propagation and collateral movement
©2015 Check Point Software Technologies Ltd. 23[Protected] Non-confidential content
Anatomy Of
Modern Attacks
On Data Centers
infiltrate lateral move
©2015 Check Point Software Technologies Ltd. 24[Restricted] ONLY for designated groups and individuals
We need a new security model, don’t we ?
http://www.checkpoint.com/sdp/
©2015 Check Point Software Technologies Ltd. 25
SDN
An emerging network architecture, decoupling
network control and data planes.
Data flows between network nodes controlled via
a programmable network SDN controller.
SDP
An overlay architecture enforcing security
traffic flows within an SDN network
Data flows are programmed to pass through
SDP enforcement points
SDP AND SDN MODELS WORK
IN SYNERGY
©2015 Check Point Software Technologies Ltd. 26
vSEC
Solution Components
©2015 Check Point Software Technologies Ltd. 27
vSEC solution components
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 28
vSEC
Key Features
©2015 Check Point Software Technologies Ltd. 29
Automatically & instantly
scale vSEC to secure VMs
on new host members
CHECK POINT vSEC AUTO-DEPLOYMENT
©2015 Check Point Software Technologies Ltd. 30
SECURITY FOR EAST-WEST TRAFFIC
NSX chains Check Point vSEC gateway between VMs
Traffic between VMs goes through
VMware NSX and Check Point vSEC
gateways
©2015 Check Point Software Technologies Ltd. 31
Use vSEC for Advanced Threat Prevention inside data center
PREVENT LATERAL THREATS
©2015 Check Point Software Technologies Ltd. 32
UNIFIED MANAGEMENT
Use Check Point unified management for consistent policy control
and threat visibility across virtual and perimeter gateways
©2015 Check Point Software Technologies Ltd. 33
APPLICATION-AWARE POLICY
Check Point Access Policy
Rule From To Service Action
3
WEB_VM
(vCenter Object)
Database
(NSX SecGroup)
SQL Allow
Use Fine-grained security policies tied to NSX Security Groups
and Virtual Machine identities
Check Point dynamically
fetches objects from NSX
and vCenter
©2015 Check Point Software Technologies Ltd. 34
SHARED-CONTEXT POLICY
NSX Policy
From To Action
Infected VM
(Tagged by Check Point)
Any Quarantine
Shared security context between vSEC and NSX Manager to
automatically quarantine and trigger remediation by other services
Check Point tags
infected Virtual Machines
in NSX manager
©2015 Check Point Software Technologies Ltd. 35
Use Check Point SmartEvent to monitor and investigate threats
across north-south and east-west traffic
THREAT VISIBILITY INSIDE THE DATACENTER
4800
12400
Infected Virtual Machines
VM Identity Severity Date
VM_Web_22 High 3:22:12 2/4/201
VM_DB_12 High 5:22:12 2/4/201
VM_AD_15 Medium 5:28:12 2/4/201
VM_SAP_34 Medium 7:28:12 2/4/201
©2015 Check Point Software Technologies Ltd. 36
Demo
37©2013 Check Point Software Technologies Ltd.
Advanced Security Protections
GranularVisibility
Identity
Awareness
DLP
Mobile
Access
SmartEvent
Application
Control
URLF
IPS
Anti-Bot
Antivirus
Threat
Emulation
HTTPSHTTPSHTTPS
USERCHECKUCUC
©2015 Check Point Software Technologies Ltd. 38
Summary
Check Point SDDC security solutions
Advanced Security protections seamlessly enforced
inside the SDDC
Agile Security Provisioning for the SDDC
Comprehensive threat visibility across the SDDC
©2015 Check Point Software Technologies Ltd. 39[Confidential] For designated groups and individuals
Feature Check Point
Policy
Management Unified management for Virtual and physical
Gateways
Datacenter policy segmentation with sub policies*
Fetch vCenter and NSX objects for use in Check
Point policy
Security
Threat Prevention with multi-layered defenses for
Virtual Data Center
Tag infected VM and update NSX for automatic
remediation
Visibility &
Forensics View VM objects in security logs
Comprehensive Datacenter Threat Visibility
Automation &
Orchestration
Granular privilege down to individual rule for trusted
integrations*
Check Point vSEC Key Features
* Available in R80
©2015 Check Point Software Technologies Ltd. 40©2015 Check Point Software Technologies Ltd.
THANK YOU!

More Related Content

What's hot

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513Tiffeny Price
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
Modern Network Compliance: What It Is & How to Achieve It
Modern Network Compliance: What It Is & How to Achieve ItModern Network Compliance: What It Is & How to Achieve It
Modern Network Compliance: What It Is & How to Achieve ItItential
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overviewBAKOTECH
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesReal-Time Innovations (RTI)
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...Real-Time Innovations (RTI)
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
How Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual AssistantHow Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual AssistanteG Innovations
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Itential
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?NAIM Networks, Inc.
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...centralohioissa
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Real-Time Innovations (RTI)
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 

What's hot (20)

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Modern Network Compliance: What It Is & How to Achieve It
Modern Network Compliance: What It Is & How to Achieve ItModern Network Compliance: What It Is & How to Achieve It
Modern Network Compliance: What It Is & How to Achieve It
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car Architectures
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
How Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual AssistantHow Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual Assistant
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 

Viewers also liked

2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deckMcOWLMarketing
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectDavid Pasek
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSXScott Lowe
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
Varrow VMworld Update and vCHS Lunch and Learn Presentation
Varrow VMworld Update and vCHS Lunch and Learn PresentationVarrow VMworld Update and vCHS Lunch and Learn Presentation
Varrow VMworld Update and vCHS Lunch and Learn PresentationVarrow Inc.
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentationShreyansh Vijay Singh
 

Viewers also liked (12)

Checkpoint Security Check-Up
Checkpoint Security Check-UpCheckpoint Security Check-Up
Checkpoint Security Check-Up
 
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck2.13.14 v mware software defined data center (sddc) in 2014 slide deck
2.13.14 v mware software defined data center (sddc) in 2014 slide deck
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the Cloud
 
Transforming Networks with NFV & SDN
Transforming Networks with NFV & SDNTransforming Networks with NFV & SDN
Transforming Networks with NFV & SDN
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
Varrow VMworld Update and vCHS Lunch and Learn Presentation
Varrow VMworld Update and vCHS Lunch and Learn PresentationVarrow VMworld Update and vCHS Lunch and Learn Presentation
Varrow VMworld Update and vCHS Lunch and Learn Presentation
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Virtual Reality-Seminar presentation
Virtual Reality-Seminar  presentationVirtual Reality-Seminar  presentation
Virtual Reality-Seminar presentation
 

Similar to Virtualized Security for Software-Defined Data Centers

Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxEBERTE
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Scott Sims
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s newsolarisyourep
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 
Oracle Open World 2018 - Cloud Lift Accelerator Suite
Oracle Open World 2018 - Cloud Lift Accelerator SuiteOracle Open World 2018 - Cloud Lift Accelerator Suite
Oracle Open World 2018 - Cloud Lift Accelerator SuiteIke Aniagoh
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceThousandEyes
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesDavid McGeough
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeItential
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsAngelo Agatino Nicolosi
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 

Similar to Virtualized Security for Software-Defined Data Centers (20)

vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s new
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Oracle Open World 2018 - Cloud Lift Accelerator Suite
Oracle Open World 2018 - Cloud Lift Accelerator SuiteOracle Open World 2018 - Cloud Lift Accelerator Suite
Oracle Open World 2018 - Cloud Lift Accelerator Suite
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance IssuesUsing NetScaler Insight to Troubleshoot Network and Server Performance Issues
Using NetScaler Insight to Troubleshoot Network and Server Performance Issues
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Democratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-CodeDemocratizing Network Automation Through Low-Code
Democratizing Network Automation Through Low-Code
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
A Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial InstitutionsA Blueprint for Cloud-Native Financial Institutions
A Blueprint for Cloud-Native Financial Institutions
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 

More from MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfMarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaMarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceMarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeMarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle softwareMarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyMarketingArrowECS_CZ
 

More from MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Virtualized Security for Software-Defined Data Centers

  • 1. ©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Síla virtuality virtualizovaná bezpečnost Softwarově Definovaných Datových Center (SDDC) s plnou podporou SDN Martin Koldovský, Check Point Software Technologies SE Manager Eastern Europe
  • 2. ©2015 Check Point Software Technologies Ltd. 22 DID YOU KNOW? months is the average time to deliver new DC service. Source: Gartner Research
  • 3. ©2015 Check Point Software Technologies Ltd. 33 $7,900 per minute $1/2 M dollar per hour Source: Gartner Research DID YOU KNOW? Average Costs of a downtime:
  • 4. ©2015 Check Point Software Technologies Ltd. 44 DID YOU KNOW? 1 in 5 companies fire employees due to downtime. Source: Gartner Research
  • 5. ©2015 Check Point Software Technologies Ltd. 8[Restricted] ONLY for designated groups and individuals CRM ERP Web Server File System Billing Mail Server The Backbone of any Enterprise Business
  • 6. ©2015 Check Point Software Technologies Ltd. 99[Restricted] ONLY for designated groups and individuals It is nearly impossible for today’s data center to run at business speed. “ ”ZK Research
  • 7. ©2015 Check Point Software Technologies Ltd. 10 Hey, I can spin-up VMs in minutes. Why does it take a week to get network/firewall changes State of Virtualization vs. Networking
  • 8. ©2015 Check Point Software Technologies Ltd. 1111[Restricted] ONLY for designated groups and individuals The traditional DC is SLOW INSECURE
  • 9. ©2015 Check Point Software Technologies Ltd. 1212[Confidential] For designated groups and individuals But it doesn’t have to work this way. let’s take a DIFFERENT APPROACH
  • 10. ©2015 Check Point Software Technologies Ltd. 13 A new networking model is needed [Highly Restricted] ONLY for designated individuals Facebook’s Data Center @ Altoona Iowa US
  • 11. ©2015 Check Point Software Technologies Ltd. 1414[Restricted] ONLY for designated groups and individuals A new trend is gaining momentum… Software Defined Networking
  • 12. ©2015 Check Point Software Technologies Ltd. 1515[Restricted] ONLY for designated groups and individuals Before SDN Traditionally, switches and routers learn the network topology by communicating with neighbor devices
  • 13. ©2015 Check Point Software Technologies Ltd. 1616[Restricted] ONLY for designated groups and individuals What is SDN all about? Controller With SDN, network devices get directions from a central controller
  • 14. ©2015 Check Point Software Technologies Ltd. 1717[Restricted] ONLY for designated groups and individuals Benefits of SDN Controller SDN allows modern networks to be more agile and automated Network App Network App
  • 15. ©2015 Check Point Software Technologies Ltd. 1818 Traditional Data Center • Dedicated and Isolated Hardware • Low utilization • Low flexibility Virtualized Data Center • Server Consolidation and Virtualization • Optimized Compute utilization • Performance issues Software Defined Data Center • Offer infrastructure as a service • Better utilization • Higher flexibility / Capacity on demand DATA CENTER EVOLUTION Server Virtualization Allows aggregation of multiple independent virtual servers to exist on a physical server 2007-2010 Network Virtualization Decouples the physical infrastructure from the connectivity services making the network adaptive and dynamic with simple one-touch provisioning Compute Access Data Center Core Campus Core Distribution Layer Access Layer
  • 16. ©2015 Check Point Software Technologies Ltd. 19 SDDC
  • 17. ©2015 Check Point Software Technologies Ltd. 20 The SDDC Vision [Restricted] ONLY for designated groups and individuals Software Defined Data Center revolutionize IT by implementing SDN concepts and supporting : Orchestration & automation Private/Hybrid cloud Self service
  • 18. ©2015 Check Point Software Technologies Ltd. 21 SDDC improves traffic flows [Restricted] ONLY for designated groups and individuals • Networking layer is virtualized and centrally controlled • IP segments no longer force ineffective traffic routes • Fully optimized traffic flows are be generated automatically on demand without admin intervention • Potentially – everything is connected !
  • 19. ©2015 Check Point Software Technologies Ltd. 22 But what about security ? [Restricted] ONLY for designated groups and individuals • Traditional security methodology no longer apply: ̶ No IP based topology ̶ No clear static segments ̶ Dynamic real-time end-user-triggered changes ̶ Security policies and access control readiness for changes ̶ Lack of virtualization awareness ̶ The Data Center is a blind spot for the IT security • Multiple vendor-independent components • Dynamic traffic flows serving application layer • SDDC prone to malware propagation and collateral movement
  • 20. ©2015 Check Point Software Technologies Ltd. 23[Protected] Non-confidential content Anatomy Of Modern Attacks On Data Centers infiltrate lateral move
  • 21. ©2015 Check Point Software Technologies Ltd. 24[Restricted] ONLY for designated groups and individuals We need a new security model, don’t we ? http://www.checkpoint.com/sdp/
  • 22. ©2015 Check Point Software Technologies Ltd. 25 SDN An emerging network architecture, decoupling network control and data planes. Data flows between network nodes controlled via a programmable network SDN controller. SDP An overlay architecture enforcing security traffic flows within an SDN network Data flows are programmed to pass through SDP enforcement points SDP AND SDN MODELS WORK IN SYNERGY
  • 23. ©2015 Check Point Software Technologies Ltd. 26 vSEC Solution Components
  • 24. ©2015 Check Point Software Technologies Ltd. 27 vSEC solution components [Restricted] ONLY for designated groups and individuals
  • 25. ©2015 Check Point Software Technologies Ltd. 28 vSEC Key Features
  • 26. ©2015 Check Point Software Technologies Ltd. 29 Automatically & instantly scale vSEC to secure VMs on new host members CHECK POINT vSEC AUTO-DEPLOYMENT
  • 27. ©2015 Check Point Software Technologies Ltd. 30 SECURITY FOR EAST-WEST TRAFFIC NSX chains Check Point vSEC gateway between VMs Traffic between VMs goes through VMware NSX and Check Point vSEC gateways
  • 28. ©2015 Check Point Software Technologies Ltd. 31 Use vSEC for Advanced Threat Prevention inside data center PREVENT LATERAL THREATS
  • 29. ©2015 Check Point Software Technologies Ltd. 32 UNIFIED MANAGEMENT Use Check Point unified management for consistent policy control and threat visibility across virtual and perimeter gateways
  • 30. ©2015 Check Point Software Technologies Ltd. 33 APPLICATION-AWARE POLICY Check Point Access Policy Rule From To Service Action 3 WEB_VM (vCenter Object) Database (NSX SecGroup) SQL Allow Use Fine-grained security policies tied to NSX Security Groups and Virtual Machine identities Check Point dynamically fetches objects from NSX and vCenter
  • 31. ©2015 Check Point Software Technologies Ltd. 34 SHARED-CONTEXT POLICY NSX Policy From To Action Infected VM (Tagged by Check Point) Any Quarantine Shared security context between vSEC and NSX Manager to automatically quarantine and trigger remediation by other services Check Point tags infected Virtual Machines in NSX manager
  • 32. ©2015 Check Point Software Technologies Ltd. 35 Use Check Point SmartEvent to monitor and investigate threats across north-south and east-west traffic THREAT VISIBILITY INSIDE THE DATACENTER 4800 12400 Infected Virtual Machines VM Identity Severity Date VM_Web_22 High 3:22:12 2/4/201 VM_DB_12 High 5:22:12 2/4/201 VM_AD_15 Medium 5:28:12 2/4/201 VM_SAP_34 Medium 7:28:12 2/4/201
  • 33. ©2015 Check Point Software Technologies Ltd. 36 Demo
  • 34. 37©2013 Check Point Software Technologies Ltd. Advanced Security Protections GranularVisibility Identity Awareness DLP Mobile Access SmartEvent Application Control URLF IPS Anti-Bot Antivirus Threat Emulation HTTPSHTTPSHTTPS USERCHECKUCUC
  • 35. ©2015 Check Point Software Technologies Ltd. 38 Summary Check Point SDDC security solutions Advanced Security protections seamlessly enforced inside the SDDC Agile Security Provisioning for the SDDC Comprehensive threat visibility across the SDDC
  • 36. ©2015 Check Point Software Technologies Ltd. 39[Confidential] For designated groups and individuals Feature Check Point Policy Management Unified management for Virtual and physical Gateways Datacenter policy segmentation with sub policies* Fetch vCenter and NSX objects for use in Check Point policy Security Threat Prevention with multi-layered defenses for Virtual Data Center Tag infected VM and update NSX for automatic remediation Visibility & Forensics View VM objects in security logs Comprehensive Datacenter Threat Visibility Automation & Orchestration Granular privilege down to individual rule for trusted integrations* Check Point vSEC Key Features * Available in R80
  • 37. ©2015 Check Point Software Technologies Ltd. 40©2015 Check Point Software Technologies Ltd. THANK YOU!

Editor's Notes

  1. And if we look at the financials: It is estimated that: DC downtime may cost:
  2. Let’s analyze this definition to understand whether it can apply to modern Data Centers.
  3. First statement refers to a “facility”, while SDDC provides the ability to virtually distribute Data Center services among different physical locations and even leverage public cloud platforms
  4. First statement refers to a “facility”, while SDDC provides the ability to virtually distribute Data Center services among different physical locations and even leverage public cloud platforms
  5. Instead of phisical servers and locations, the modern Data Center addresses the concept in terms of business applications regardless on the location and hardware in use.
  6. But I can hardly blame you, because according to ZK Research: “It is nearly impossible for today’s data center to run at business speed.”
  7. ASK Who knows what SDN is about.
  8. Utopian network Want to take decision from network layer to application layer, more sophisticated and agile network.
  9. Being controlled by an intelligent controller, operating at an application level which allows modern SDN networks to be very agile and automated. Changes in the network can be automatically accommodated. Self healing Easily Orchestrated Part, and eventually Automated Utopian network
  10. Private cloud – organizational entity providing compute, storage and network access to application services Hybrid cloud – combines private and public cloud services, distributing specific functions according to load/capacity/other or data/application sensitivity Orchestration and automation – layer designed to provide provisioning, define processes flows, optimize resources, translate logical requirements into operations and react dynamically to changes Self service – methodology allowing end-users to initiate changes by submitting requests and translating it into an automated provisioned process
  11. Movie – self service
  12. Let’s start with what we don’t know
  13. Movie – self service