SlideShare a Scribd company logo
1 of 34
Download to read offline
Securing Your Journey to the Cloud
Rami Naccache – Sr. Presales Engineer
Trend Micro Middle East
Data Center Evolution:
Physical. Virtual. Cloud.
1
15/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Desktops & Servers
Desktop
Virtualization
Server
Virtualization
Private
Cloud
Hybrid Cloud
Public
Cloud
Mobile
BYOPC
Journey to the Cloud
Where is Your Data?
25/13/2013 Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Empower the business:
Improve business agility by providing quick and
intuitive access to the right information, tools
and applications
Mitigate the risk:
Protect sensitive information to maintain brand
and comply with regulations,
while controlling costs
CIO
Branch
Offices
Main Campus
Mobile Workers
Fixed
Telecommuters
Internet
Data
Center
SaaS
IaaS
Private
Public
ENDPOINT
Infection via Social Engineering
Heavy User Touch Environment
Consumerization is key trend
SERVER
Infection via Threat Injection
Locked Down Mission-Critical Env.
Virtualization/Cloud is key trend
Journey to the Cloud
Endpoint and Server Security Diverging
Virtual CloudPhysical
Cross-platform Security
One Security Model is Possible
across Physical, Virtual, and Cloud Environments
• New platforms don’t change the threat landscape
• Each platform has unique security risks
• Integrated security is needed across all platforms
55/13/2013 Copyright 2013 Trend Micro Inc.
Platform-specific Security Risks
One Security Model is Possible
across Physical, Virtual, and Cloud Environments
Visibility & Threats
• Less visibility
• More external risks
Performance & Threats
• Security degrades
performance
• New VM-based threats
Manageability
• Glut of security products
• Less security
• Higher TCO
Virtual CloudPhysical
Increase Efficiency Deliver AgilityReduce Complexity
Integrated Security
Single Management Console
65/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Consolidate Physical Security
Reduce Complexity
Advanced Reporting
Module
Single Management
Console
Firewall
HIPS /
Virtual
Patching
File Integrity
MonitoringAntivirus
Log
Inspection
Web
Application
Protection
One Server Security Platform
Reduce Complexity
85/13/2013 Copyright 2013 Trend Micro Inc.
Virtual
Server and Desktop Virtualization Security
Increase Efficiency
Typical AV
Console
3:00am Scan
Antivirus Storm
Automatic security scans overburden the system
Virtualization Security
Challenge: Resource Contention
105/13/2013 Copyright 2013 Trend Micro Inc.
Reactivated and cloned VMs can have out-of-date security
Dormant
 
Virtualization Security
Challenge: Instant-on Gaps
Active

Reactivated with
out dated security Cloned
   
115/13/2013 Copyright 2013 Trend Micro Inc.
Attacks can spread across VMs
Virtualization Security
Challenge: Inter-VM Attacks / Blind Spots
125/13/2013 Copyright 2013 Trend Micro Inc.
Virtualization Security
VM sprawl inhibits compliance
Challenge: Complexity of Management
Patch
agents
Rollout
patterns
Provisioning
new VMs
Reconfiguring
agents
135/13/2013 Copyright 2013 Trend Micro Inc.
• Antivirus
• Integrity Monitoring
Agentless Security for VMware — Antivirus and more
VM VM VM
The Old Way
Security
Virtual
Appliance
VM VM VM
With Agentless Security
VM
• Intrusion Prevention
• Virtual Patching
• Firewall
• Web Application Protection
Virtualization Security
What is the Solution?
A Dedicated Security Virtual Appliance
VM VM VM VMVM VM
Maximizes Performance and ROI
145/13/2013 Copyright 2013 Trend Micro Inc.
Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011;
Saving estimate based on VMware ROI calculations
0 10 20 30 40 50 60 70 80
TraditionalAV
AgentlessAV
VM’s per host
75
25 3X higher VDI VM consolidation ratios
3-year Savings on 1000 VDI VMs = $539,600
Virtualization Security
Increased ROI with Agentless Security
Example: Agentless Antivirus
155/13/2013 Copyright 2013 Trend Micro Inc.
Security
Virtual
Appliance
VM VM VM
With Agentless Security
VM
Virtualization Security
What is the Solution?
Layered, Virtualization-Aware Security in One Platform
VM VM VM VMVM VM
Protect your efforts to consolidate servers,
enable VDI, and support consumerization
Integrated Modules:
• Antivirus
• Integrity Monitoring
• Intrusion Prevention
• Web Application Protection
• Application Control
• Firewall
• Log Inspection
Simplified
Management
Higher
Density
Optimized
Resources
Stronger
Security
165/13/2013 Copyright 2013 Trend Micro Inc.
vShield
Endpoint
Security
Virtual
Appliance
Other
VMware
APIs
Security agent
on individual VMs
Integrates
with
vCenter
Antivirus
Agentless
Agentless
IDS / IPS
Web Application Protection
Application Control
Firewall
Log Inspection
Agent-based
Virtualization Security
Integrity Monitoring
vSphere
Virtual
Environment
Virtualization Security
Fitting into the VMware Ecosystem
175/13/2013 Copyright 2013 Trend Micro Inc.
 Hypervisor-integrated agentless antivirus released in Nov. 2010
 1000 agentless security customers in the first year
 Over 250,000 VMs are licensed for agentless antivirus
 Agentless FIM released in 2012
 Multiple agentless security modules now available
 Largest customer purchase is 8,000 VMs
 Most dense deployment is 300 VMs/host
“Deep Security provides a robust set of tools to add to your toolbox.
The realized performance improvement is visible to the naked eye.”
- Ed Haletky, Virtualization Practice (www.virtualizationpractice.com)
Virtualization Security
Trend Micro Market Momentum
Agentless Security
185/13/2013 Copyright 2013 Trend Micro Inc.
AM Scan Performance
5/13/2013 19Copyright 2013 Trend Micro Inc.
1st AM
scan
2nd AM
scan
(cached)
Scan time ~ 20x faster
Significant DSVA CPU
Reduction
Huge IO Volume
Reduction
Cloud Computing
Cloud Deployments and Security
Deliver Agility
Additional Resources
• Scalability
• Cost savings
Provides
business agility
Data Access
• Anytime, anywhere
• Device flexibility
Supports BYOD and
consumerization
Security is the
#1 cloud adoption inhibitor
Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011
Cloud Security
Why Companies Turn to the Cloud
215/13/2013 Copyright 2013 Trend Micro Inc.
Who is responsible for security?
• With IaaS the customer is responsible for VM-level security
• With SaaS or PaaS the service provider is responsible for security
Public Cloud
PaaS
Public Cloud
IaaS
Servers Virtualization &
Private Cloud
End-User (Enterprise) Service Provider
Public Cloud
SaaS
Cloud Security
Cloud Models: Who Has Control?
22Copyright 2013 Trend Micro Inc.5/13/2013
Cloud Security
Challenge: Multi-tenancy / Mixed Trust Level VMs
Shared resources creates
a mixed trust level environment
235/13/2013 Copyright 2013 Trend Micro Inc.
Cloud Security
Challenge: Data Access and Governance
Cloud data can provide less visibility and control
10010011
01101100
245/13/2013 Copyright 2013 Trend Micro Inc.
10011
01110
00101
Cloud Security
Challenge: Data Destruction
When data is moved, unsecured data remnants can remain
10011
01110
00101
10011
0
00101
255/13/2013 Copyright 2013 Trend Micro Inc.
Patient Medical Records
Credit Card Payment
Information
Sensitive Research ResultsSocial Security Numbers
• Unreadable for
unauthorized users
• Control of when and
where data is accessed
• Server validation
• Custody of keys
Encryption
with Policy-based
Key Management
Cloud Security
Modular Protection
• Self-defending VM security
• Agentless and agent-based
• One management portal for
all modules, all deployments
vSphere & vCloud
Cloud Security
What is the Solution? Workload and Data Protection
Integration ensures servers have up-to-date
security before encryption keys are released
VM VM VM VMVM VM VM VMVM VM VM VM
Data Center Private Cloud Public Cloud
VMware vCloud
VMware
vSphere
Encryption throughout your cloud journey—
data protection for physical, virtual & cloud
1 Cloud Security
Fitting Encryption into a VMware Ecosystem
Enterprise Key
Key Service
Console
Encryption
Solution
275/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Database
Storage
Virtual
Web
Server
Mail
Server
Web
Server
Enterprise
Providers
Deep Security
Web
Access
Securing Workloads
Physical, Private, and Public Clouds
VM
VMware Virtualization
Security
Virtual
Appliance
VM VM VM VM
• Agentless security
• Layered server security
• Encryption for vSphere
Private Cloud
• Agentless security
• Layered server security
Security
Virtual
Appliance
VM VM VM
Public Cloud
Server security console
• Shared policy profile
• Virtual patching
VM
VM VM VMVM
• Encryption for vCloud
• Compliance support
(FIM, Encryption, etc.)
Encryption console
• Shared policy profile
• Key ownership
• Agent-based security
• Layered server security
• Encryption for leading cloud providers
• Compliance support
(FIM, Encryption, etc.)
VM
Virtualization and Cloud Security
One Security Model
295/13/2013 Copyright 2013 Trend Micro Inc.
Trend Micro Confidential-NDA Required
Extending to cloud scale
• Resource-pooling – independent tenant policies/data for
shared, multi-tenant clouds
• Elasticity – Automated deployment of components to cloud scale
• Self-service – Policies can be delegated by cloud admin to tenants
through self-service GUI
Same architecture can be deployed as security-as-a-service by IaaS
public cloud providers, or within enterprise ITaaS for private clouds.
―Cloud Workloads Security‖ as a Service
Support for Multi-Tenant clouds
5/13/2013 31Copyright 2013 Trend Micro Inc.
Virtualization and Cloud Security
Leading Industry Success Stories
Trend
Micro
Worldwide Endpoint Security
Revenue Share by Vendor, 2010
Source: IDC, 2011
Trend Micro
Source: 2011 Technavio – Global Virtualization
Security Management Solutions
Source: 2012 Technavio – Global
Cloud Security Software Market
Trend Micro is No.1 in Server, Virtualization, & Cloud Security
Why is Trend Micro an Expert?
#1 in Cloud Security
#1 in Virtualization
Security
#1 in Server
Security
Trend
Micro
Trend
Micro
Virtual CloudPhysical
Virtualization and Cloud Security
One Security Model is Possible
• Reduce Your Cost of Operations
• Reduce Your Investment in Management
• Increase Application Stability and Performance
• Achieve Compliance in Virtual and Cloud Environments
• Get Higher Virtualization and Cloud ROI
• Safely Use Private, Public, and Hybrid Clouds
335/13/2013 Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
www.cloudjourney.com

More Related Content

What's hot

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewPeter HJ van Eijk
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 

What's hot (19)

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud Security Top 10 Risk Mitigation Techniques for 2019
Cloud Security Top 10 Risk Mitigation Techniques for 2019Cloud Security Top 10 Risk Mitigation Techniques for 2019
Cloud Security Top 10 Risk Mitigation Techniques for 2019
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 

Similar to Cw13 securing your journey to the cloud by rami naccache-trend micro

Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 

Similar to Cw13 securing your journey to the cloud by rami naccache-trend micro (20)

Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 

More from TheInevitableCloud

Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...TheInevitableCloud
 
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...TheInevitableCloud
 
Cw13 journy to the cloud by mohamed el mofty
Cw13 journy to the cloud by mohamed el moftyCw13 journy to the cloud by mohamed el mofty
Cw13 journy to the cloud by mohamed el moftyTheInevitableCloud
 
Cw13 insights into the cloud market by abdelrahman wahid-cloud11
Cw13 insights into the cloud market by abdelrahman wahid-cloud11Cw13 insights into the cloud market by abdelrahman wahid-cloud11
Cw13 insights into the cloud market by abdelrahman wahid-cloud11TheInevitableCloud
 
Cw13 why cloud computing has to go the foss way by ahmed mekkawy
Cw13 why cloud computing has to go the foss way by ahmed mekkawyCw13 why cloud computing has to go the foss way by ahmed mekkawy
Cw13 why cloud computing has to go the foss way by ahmed mekkawyTheInevitableCloud
 
Cw13 playing with scala by tamer abdelradi
Cw13 playing with scala by tamer abdelradiCw13 playing with scala by tamer abdelradi
Cw13 playing with scala by tamer abdelradiTheInevitableCloud
 
Cw13 fedora cloud by ahmed araby
Cw13 fedora cloud by ahmed arabyCw13 fedora cloud by ahmed araby
Cw13 fedora cloud by ahmed arabyTheInevitableCloud
 
Cw13 egypt twards open source by haitham nabil-open egypt
Cw13 egypt twards open source by haitham nabil-open egyptCw13 egypt twards open source by haitham nabil-open egypt
Cw13 egypt twards open source by haitham nabil-open egyptTheInevitableCloud
 
Cw13 dell cloud computing for telco sp by anis tell
Cw13 dell cloud computing for telco sp by anis tellCw13 dell cloud computing for telco sp by anis tell
Cw13 dell cloud computing for telco sp by anis tellTheInevitableCloud
 
Cw13 culture of innovation by mohamed el mofty
Cw13 culture of innovation by mohamed el moftyCw13 culture of innovation by mohamed el mofty
Cw13 culture of innovation by mohamed el moftyTheInevitableCloud
 
Cw13 build open hybrid cloud by diaa radwan-red hat
Cw13 build open hybrid cloud by diaa radwan-red hatCw13 build open hybrid cloud by diaa radwan-red hat
Cw13 build open hybrid cloud by diaa radwan-red hatTheInevitableCloud
 
Cw13 aws by tamer abdul radi-cloud9ners
Cw13 aws by tamer abdul radi-cloud9nersCw13 aws by tamer abdul radi-cloud9ners
Cw13 aws by tamer abdul radi-cloud9nersTheInevitableCloud
 
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...TheInevitableCloud
 

More from TheInevitableCloud (13)

Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
 
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
Cw13 the rising stack-how & why open stack is changing it by mark collier-ope...
 
Cw13 journy to the cloud by mohamed el mofty
Cw13 journy to the cloud by mohamed el moftyCw13 journy to the cloud by mohamed el mofty
Cw13 journy to the cloud by mohamed el mofty
 
Cw13 insights into the cloud market by abdelrahman wahid-cloud11
Cw13 insights into the cloud market by abdelrahman wahid-cloud11Cw13 insights into the cloud market by abdelrahman wahid-cloud11
Cw13 insights into the cloud market by abdelrahman wahid-cloud11
 
Cw13 why cloud computing has to go the foss way by ahmed mekkawy
Cw13 why cloud computing has to go the foss way by ahmed mekkawyCw13 why cloud computing has to go the foss way by ahmed mekkawy
Cw13 why cloud computing has to go the foss way by ahmed mekkawy
 
Cw13 playing with scala by tamer abdelradi
Cw13 playing with scala by tamer abdelradiCw13 playing with scala by tamer abdelradi
Cw13 playing with scala by tamer abdelradi
 
Cw13 fedora cloud by ahmed araby
Cw13 fedora cloud by ahmed arabyCw13 fedora cloud by ahmed araby
Cw13 fedora cloud by ahmed araby
 
Cw13 egypt twards open source by haitham nabil-open egypt
Cw13 egypt twards open source by haitham nabil-open egyptCw13 egypt twards open source by haitham nabil-open egypt
Cw13 egypt twards open source by haitham nabil-open egypt
 
Cw13 dell cloud computing for telco sp by anis tell
Cw13 dell cloud computing for telco sp by anis tellCw13 dell cloud computing for telco sp by anis tell
Cw13 dell cloud computing for telco sp by anis tell
 
Cw13 culture of innovation by mohamed el mofty
Cw13 culture of innovation by mohamed el moftyCw13 culture of innovation by mohamed el mofty
Cw13 culture of innovation by mohamed el mofty
 
Cw13 build open hybrid cloud by diaa radwan-red hat
Cw13 build open hybrid cloud by diaa radwan-red hatCw13 build open hybrid cloud by diaa radwan-red hat
Cw13 build open hybrid cloud by diaa radwan-red hat
 
Cw13 aws by tamer abdul radi-cloud9ners
Cw13 aws by tamer abdul radi-cloud9nersCw13 aws by tamer abdul radi-cloud9ners
Cw13 aws by tamer abdul radi-cloud9ners
 
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
 

Cw13 securing your journey to the cloud by rami naccache-trend micro

  • 1. Securing Your Journey to the Cloud Rami Naccache – Sr. Presales Engineer Trend Micro Middle East Data Center Evolution: Physical. Virtual. Cloud. 1 15/13/2013 Copyright 2013 Trend Micro Inc.
  • 2. Physical Desktops & Servers Desktop Virtualization Server Virtualization Private Cloud Hybrid Cloud Public Cloud Mobile BYOPC Journey to the Cloud Where is Your Data? 25/13/2013 Copyright 2013 Trend Micro Inc.
  • 3. Copyright 2013 Trend Micro Inc. Empower the business: Improve business agility by providing quick and intuitive access to the right information, tools and applications Mitigate the risk: Protect sensitive information to maintain brand and comply with regulations, while controlling costs CIO
  • 4. Branch Offices Main Campus Mobile Workers Fixed Telecommuters Internet Data Center SaaS IaaS Private Public ENDPOINT Infection via Social Engineering Heavy User Touch Environment Consumerization is key trend SERVER Infection via Threat Injection Locked Down Mission-Critical Env. Virtualization/Cloud is key trend Journey to the Cloud Endpoint and Server Security Diverging
  • 5. Virtual CloudPhysical Cross-platform Security One Security Model is Possible across Physical, Virtual, and Cloud Environments • New platforms don’t change the threat landscape • Each platform has unique security risks • Integrated security is needed across all platforms 55/13/2013 Copyright 2013 Trend Micro Inc.
  • 6. Platform-specific Security Risks One Security Model is Possible across Physical, Virtual, and Cloud Environments Visibility & Threats • Less visibility • More external risks Performance & Threats • Security degrades performance • New VM-based threats Manageability • Glut of security products • Less security • Higher TCO Virtual CloudPhysical Increase Efficiency Deliver AgilityReduce Complexity Integrated Security Single Management Console 65/13/2013 Copyright 2013 Trend Micro Inc.
  • 8. Advanced Reporting Module Single Management Console Firewall HIPS / Virtual Patching File Integrity MonitoringAntivirus Log Inspection Web Application Protection One Server Security Platform Reduce Complexity 85/13/2013 Copyright 2013 Trend Micro Inc.
  • 9. Virtual Server and Desktop Virtualization Security Increase Efficiency
  • 10. Typical AV Console 3:00am Scan Antivirus Storm Automatic security scans overburden the system Virtualization Security Challenge: Resource Contention 105/13/2013 Copyright 2013 Trend Micro Inc.
  • 11. Reactivated and cloned VMs can have out-of-date security Dormant   Virtualization Security Challenge: Instant-on Gaps Active  Reactivated with out dated security Cloned     115/13/2013 Copyright 2013 Trend Micro Inc.
  • 12. Attacks can spread across VMs Virtualization Security Challenge: Inter-VM Attacks / Blind Spots 125/13/2013 Copyright 2013 Trend Micro Inc.
  • 13. Virtualization Security VM sprawl inhibits compliance Challenge: Complexity of Management Patch agents Rollout patterns Provisioning new VMs Reconfiguring agents 135/13/2013 Copyright 2013 Trend Micro Inc.
  • 14. • Antivirus • Integrity Monitoring Agentless Security for VMware — Antivirus and more VM VM VM The Old Way Security Virtual Appliance VM VM VM With Agentless Security VM • Intrusion Prevention • Virtual Patching • Firewall • Web Application Protection Virtualization Security What is the Solution? A Dedicated Security Virtual Appliance VM VM VM VMVM VM Maximizes Performance and ROI 145/13/2013 Copyright 2013 Trend Micro Inc.
  • 15. Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011; Saving estimate based on VMware ROI calculations 0 10 20 30 40 50 60 70 80 TraditionalAV AgentlessAV VM’s per host 75 25 3X higher VDI VM consolidation ratios 3-year Savings on 1000 VDI VMs = $539,600 Virtualization Security Increased ROI with Agentless Security Example: Agentless Antivirus 155/13/2013 Copyright 2013 Trend Micro Inc.
  • 16. Security Virtual Appliance VM VM VM With Agentless Security VM Virtualization Security What is the Solution? Layered, Virtualization-Aware Security in One Platform VM VM VM VMVM VM Protect your efforts to consolidate servers, enable VDI, and support consumerization Integrated Modules: • Antivirus • Integrity Monitoring • Intrusion Prevention • Web Application Protection • Application Control • Firewall • Log Inspection Simplified Management Higher Density Optimized Resources Stronger Security 165/13/2013 Copyright 2013 Trend Micro Inc.
  • 17. vShield Endpoint Security Virtual Appliance Other VMware APIs Security agent on individual VMs Integrates with vCenter Antivirus Agentless Agentless IDS / IPS Web Application Protection Application Control Firewall Log Inspection Agent-based Virtualization Security Integrity Monitoring vSphere Virtual Environment Virtualization Security Fitting into the VMware Ecosystem 175/13/2013 Copyright 2013 Trend Micro Inc.
  • 18.  Hypervisor-integrated agentless antivirus released in Nov. 2010  1000 agentless security customers in the first year  Over 250,000 VMs are licensed for agentless antivirus  Agentless FIM released in 2012  Multiple agentless security modules now available  Largest customer purchase is 8,000 VMs  Most dense deployment is 300 VMs/host “Deep Security provides a robust set of tools to add to your toolbox. The realized performance improvement is visible to the naked eye.” - Ed Haletky, Virtualization Practice (www.virtualizationpractice.com) Virtualization Security Trend Micro Market Momentum Agentless Security 185/13/2013 Copyright 2013 Trend Micro Inc.
  • 19. AM Scan Performance 5/13/2013 19Copyright 2013 Trend Micro Inc. 1st AM scan 2nd AM scan (cached) Scan time ~ 20x faster Significant DSVA CPU Reduction Huge IO Volume Reduction
  • 20. Cloud Computing Cloud Deployments and Security Deliver Agility
  • 21. Additional Resources • Scalability • Cost savings Provides business agility Data Access • Anytime, anywhere • Device flexibility Supports BYOD and consumerization Security is the #1 cloud adoption inhibitor Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011 Cloud Security Why Companies Turn to the Cloud 215/13/2013 Copyright 2013 Trend Micro Inc.
  • 22. Who is responsible for security? • With IaaS the customer is responsible for VM-level security • With SaaS or PaaS the service provider is responsible for security Public Cloud PaaS Public Cloud IaaS Servers Virtualization & Private Cloud End-User (Enterprise) Service Provider Public Cloud SaaS Cloud Security Cloud Models: Who Has Control? 22Copyright 2013 Trend Micro Inc.5/13/2013
  • 23. Cloud Security Challenge: Multi-tenancy / Mixed Trust Level VMs Shared resources creates a mixed trust level environment 235/13/2013 Copyright 2013 Trend Micro Inc.
  • 24. Cloud Security Challenge: Data Access and Governance Cloud data can provide less visibility and control 10010011 01101100 245/13/2013 Copyright 2013 Trend Micro Inc.
  • 25. 10011 01110 00101 Cloud Security Challenge: Data Destruction When data is moved, unsecured data remnants can remain 10011 01110 00101 10011 0 00101 255/13/2013 Copyright 2013 Trend Micro Inc.
  • 26. Patient Medical Records Credit Card Payment Information Sensitive Research ResultsSocial Security Numbers • Unreadable for unauthorized users • Control of when and where data is accessed • Server validation • Custody of keys Encryption with Policy-based Key Management Cloud Security Modular Protection • Self-defending VM security • Agentless and agent-based • One management portal for all modules, all deployments vSphere & vCloud Cloud Security What is the Solution? Workload and Data Protection Integration ensures servers have up-to-date security before encryption keys are released
  • 27. VM VM VM VMVM VM VM VMVM VM VM VM Data Center Private Cloud Public Cloud VMware vCloud VMware vSphere Encryption throughout your cloud journey— data protection for physical, virtual & cloud 1 Cloud Security Fitting Encryption into a VMware Ecosystem Enterprise Key Key Service Console Encryption Solution 275/13/2013 Copyright 2013 Trend Micro Inc.
  • 29. VM VMware Virtualization Security Virtual Appliance VM VM VM VM • Agentless security • Layered server security • Encryption for vSphere Private Cloud • Agentless security • Layered server security Security Virtual Appliance VM VM VM Public Cloud Server security console • Shared policy profile • Virtual patching VM VM VM VMVM • Encryption for vCloud • Compliance support (FIM, Encryption, etc.) Encryption console • Shared policy profile • Key ownership • Agent-based security • Layered server security • Encryption for leading cloud providers • Compliance support (FIM, Encryption, etc.) VM Virtualization and Cloud Security One Security Model 295/13/2013 Copyright 2013 Trend Micro Inc.
  • 30. Trend Micro Confidential-NDA Required Extending to cloud scale • Resource-pooling – independent tenant policies/data for shared, multi-tenant clouds • Elasticity – Automated deployment of components to cloud scale • Self-service – Policies can be delegated by cloud admin to tenants through self-service GUI Same architecture can be deployed as security-as-a-service by IaaS public cloud providers, or within enterprise ITaaS for private clouds. ―Cloud Workloads Security‖ as a Service Support for Multi-Tenant clouds
  • 31. 5/13/2013 31Copyright 2013 Trend Micro Inc. Virtualization and Cloud Security Leading Industry Success Stories
  • 32. Trend Micro Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Trend Micro Source: 2011 Technavio – Global Virtualization Security Management Solutions Source: 2012 Technavio – Global Cloud Security Software Market Trend Micro is No.1 in Server, Virtualization, & Cloud Security Why is Trend Micro an Expert? #1 in Cloud Security #1 in Virtualization Security #1 in Server Security Trend Micro Trend Micro
  • 33. Virtual CloudPhysical Virtualization and Cloud Security One Security Model is Possible • Reduce Your Cost of Operations • Reduce Your Investment in Management • Increase Application Stability and Performance • Achieve Compliance in Virtual and Cloud Environments • Get Higher Virtualization and Cloud ROI • Safely Use Private, Public, and Hybrid Clouds 335/13/2013 Copyright 2013 Trend Micro Inc.
  • 34. Copyright 2013 Trend Micro Inc. www.cloudjourney.com