Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance

  • 857 views
Uploaded on

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance …

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Auteur: Rik Ferguson, Trend Micro
Relatiedag UNIT4, 14 april 2011

Voor meer informatie:
itsolutions@unit4.com

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
857
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
49
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. How Security can maximise your VirtualisationROI Name Title, Date Copyright 2009 Trend Micro Inc. 1
  • 2. The journey to the cloud Security issues & risksSecuring your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 2
  • 3. The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud Virtual Physical Select enterprise applications in public cloud Servers virtualized with Servers virtualized in minimal changes to scalable, shared, datacenter processes automated & elasticTraditional environment datacenter Copyright 2009 Trend Micro Inc. 3
  • 4. Securing Cloud Computing Securing…Pillars of the Cloud is About Virtualisation Highly Mobile Devices Cloud Infrastructure Endpoint Revolution Dynamic Data Center with Ubiquitous, Borderless Shared System, Share Storage Data Access, Data Everywhere Hybrid Cloud Management Security That Fits Shared Data Storage Application Platform Cloud Data Cloud Application Ownership of Data vs. Computing New Platform for New Apps. Example, Confidentiality & Access Control Web Defacing, SQL Injection Copyright 2009 Trend Micro Inc.
  • 5. The journey to the cloud Security issues & risksSecuring your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 5
  • 6. The Dynamic Datacenter88% of North American enterprises 2012, 60% of virtualized servers.. less[no] virtualization security strategy secure than… physical servers….Forrester Research / Info Week “Addressing the Most Common Security Risks in Data Center Virtualization Projects” Gartner, 25 January 2010 Physical Virtual Cloud Technologies and practices for Number one concern (87.5%) securing physical servers won’t about cloud services is security. provide sufficient protections for VMs. Frank Gens, IDC, Senior VP & Chief Analyst Neil MacDonald, Gartner, June 2009 Copyright 2009 Trend Micro Inc.
  • 7. Security: the #1 Cloud ChallengeSecurity and privacy were the foremost concerns by far, with a weightedscore higher than the next three (performance, immaturity and regulatorycompliance) combined. Gartner (April 2010) Copyright 2009 Trend Micro Inc. 7
  • 8. Assessing Risk in the Cloud Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Compliance / Lack of audit trail 7 Complexity of Management 6 Resource contention 5 Mixed trust level VMs 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed 1 Copyright 2009 Trend Micro Inc.08-31
  • 9. The journey to the cloud Security issues & risksSecuring your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 9
  • 10. VMware Solutions for IT as a Service End User Computing• Secure• Manageable Management, Cloud Application Platform Security, Compliance.• Open Cloud Infrastructure and Management Copyright 2009 Trend Micro Inc.
  • 11. vShield SecuritySecuring the Private Cloud End to End: from the Edge to the Endpoint vShield App 1.0 and vShield Edge 1.0 vShield Endpoint 1.0 Zones Edge Endpoint = VM Security Zone Secure the edge of Enables offloaded anti-virus Application protection from the virtual datacenter network based threats Virtual Datacenter 1 Virtual Datacenter 2 VMware VMware DMZ PCI HIPAA vShield Web View vShield compliant compliant VMware vShield Manager Copyright 2009 Trend Micro Inc.
  • 12. VMware and Trend Micro have partnered to deliver the first and only agentless anti-virus solution architected for VMware virtualized datacenters and desktops.• Enable our customers to maximize the benefits of virtualization,• Securely accelerating the journey to the cloud• Trend FIRST to partner with VMware to fully leverage the new vShield EndPoint platform“While their competitors talk about virtualization, Trend Micro is leading the waywith product” Sept 3, 2010 12 Copyright 2009 Trend Micro Inc.
  • 13. Agentless Anti-Virus Overview These are the key “building blocks” for VMware customers Agent-less Anti-Virus for VMwareThe idea Protection for virtualized desktops and datacenters Trend MicroThe components VMware Deep Security vShield Endpoint Anti-malware Enables offloading of antivirus A virtual appliance that detects processing to Trend Micro Deep and blocks malware (web threats, Security Anti-malware – a viruses & worms, Trojans). dedicated, security-hardened VM.CustomerBenefits Higher Faster Better Stronger Consolidation Performance Manageability SecurityDiffer-entiator The first and only agentless anti-virus solution architected for VMware 13 Copyright 2009 Trend Micro Inc.
  • 14. Protection beyond Anti-MalwareBeyond providing Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers DEEP SECURITY Agentless 1vShield Detects and blocks malware (web threats, Anti-Malware viruses & worms, Trojans). (PCI*)Endpoint Agentless 2 Detects and blocks known and zero-day IDS / IPS attacks that target vulnerabilities (PCI*)VMsafeAPIs Web Application Protection Shields web application vulnerabilities (PCI*) Provides increased visibility into, or control Application Control over, applications accessing the network Firewall Reduces attack surface. Prevents DoS & detects reconnaissance scans (PCI*) Agent-based 3 Detects malicious and unauthorized changes Integrity Monitoring to directories, files, registry keys. (PCI*) Agent-based 4 Log Inspection Optimizes the identification of important security events buried in log entries. (PCI*) (PCI*): Helps address one or more PCI Data Security Standards and other compliance 14 Copyright 2009 Trend Micro Inc. requirements
  • 15. Benefits that Matter to Customers• Higher consolidation Now, with Deep Security 7.5 − Inefficient operations removed AV Virtual VM VM VM VM• Faster performance Appliance − Freedom from AV Storms• Better manageability − No agents to configure, update & patch• Stronger security Previously − Instant ON protection − Tamper-proofing VM VM VM Copyright 2009 Trend Micro Inc. 15
  • 16. Deep Security enables higher VM densities • SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle more than 25 desktop VMs/host • DS supports 2-3 times no. of desktop VMs/host than traditional AV • DS supports 40-60% more server VMs/host than traditional AV CPU IOPS Symantec Trend McAfee Symantec Trend McAfee 2143 307% 2053 % % 273% 692% 81% Symantec Trend McAfee Symantec Trend McAfee Scheduled scan resource usage over baseline – 50 VMs per host Copyright 2009 Trend Micro Inc.
  • 17. Data Security Challenges in the CloudEncryption rarely used: Name: John Doe- Who can see your information? SSN: 425-79-0053 Visa #: 4456-8732…Storage volumes and servers are mobile:- Where is your data? Has it moved?Rogue servers might access data: Name: John Doe- Who is attaching to your storage? SSN: 425-79-0053 Visa #: 4456-8732…Audit and alerting modules lacking:- What happened when you weren’t looking?Encryption keys tied to vendor:- Are you locked into a single security solution? Who has access to your keys?Storage volumes contain residual data:- Are your storage devices recycled securely? Classification 4/5/2011 Copyright 2009 Trend Micro Inc. 19
  • 18. Protection at the Data Level Encryption designed to secure the cloud Copyright 2009 Trend Micro Inc.
  • 19. Identity and Integrity are paramountIdentity - “Is it mine?” Integrity - “Is it OK?” • Mounted data store • Firewall • Location • AV • Start-up time • Self integrity check • Embedded keys • Deep Security Auto or Manual rules based key approval Copyright 2009 Trend Micro Inc. 21
  • 20. Trend Micro Mapped Along the Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Mixed Trust Level VMs 7 Complexity of Management 6 Resource contention 5 Compliance / Lack of audit trail 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed Copyright 2009 Trend Micro Inc. 108-31
  • 21. Trend Micro: Server Security Leadership IDC Market Analysis: Worldwide Corporate Server Security Market Share Trend Micro 22.9% All Others 77.1%These products are generally more robust than desktop endpoint security and are available for a much wider set of operating systems (Windows, Unix, and Linux).This category also includes products that are designed to protect hypervisors and virtualservers.” Source: Worldwide Endpoint Security 2010-2014 Forecast and 2009 Vendor Shares, IDC Copyright 2009 Trend Micro Inc. 23
  • 22. Improves Security Improves Virtualization by providing security solutions by providing the most architected to fully leveragesecure virtualization infrastructure, the VMware platformwith APIs, and certification programsThe most comprehensive suite of next-generation,virtualization security solutions:  Virtual appliance- and guest-based  Tightly integrated with, and leverages, VMware APIs and technologies. Architected to fully leverage the VMware platform for delivering better-than-physical security. Copyright 2009 Trend Micro Inc. 24
  • 23. Thank you from Trend Micro Copyright 2009 Trend Micro Inc.