Your SlideShare is downloading. ×
New Solutions for Security and Compliance in the Cloud
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

New Solutions for Security and Compliance in the Cloud

388

Published on

This webinar reviews data security challenges in cloud environments as well as introduce new solutions for meeting security and compliance in virtualized and cloud infrastructure.

This webinar reviews data security challenges in cloud environments as well as introduce new solutions for meeting security and compliance in virtualized and cloud infrastructure.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
388
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. vShield Data Security (vSDS) Overview June 14, 2011 Gargi Mitra Keeling, vShield Product ManagementConfidential © 2009 VMware Inc. All rights reserved
  • 2. Agenda•Data Security Challenges in Cloud Environments•vShield Data Security Overview • Introducing vShield Data Security • How it works • Benefits•vCenter Configuration Manager Overview2 Confidential
  • 3. You probably already know this…Compliance and Governance Drive Data Security Regional Privacy LawsRegulatoryCompliance Personal Health Personally Identifiable Cardholder Data (PCI) Information (PHI) Information (PII)Governance Intellectual Property Acceptable Use Customer Data Frameworks and Best Practices3 Confidential
  • 4. …and you’re probably already doing this…Secure Data on Physical Systems Data Loss / Leak E-Discovery Prevention (DLP) Data in Data at Data in Motion Rest Use Access Control Encryption4 Confidential
  • 5. …But these days, your data could be anywhere. Storage Array Local Disk (data on virtual disks) Physical(no virtualization, local disk or Cloud Storage storage array) (storage ‘blobs’) Cloud Deployment Models View / VDI – View / VDI – CIFS(data on file Linked Clones shares) (data on virtual disks)5 Confidential
  • 6. …And if you’re here today, you probably know this firsthand. Over 10.8 million virtual machines on SAN!! -- VMware Data explosion in the virtual data center! The number of virtual machines VMware View $3.63 Billion double every year revenue in 2011 -- Gartner – Wall Street6 Confidential
  • 7. Data Security for Virtual and Cloud InfrastructureThere’s much to doBut before you worryabout applying all ofthis data security……to your virtualenvironments…7 Confidential
  • 8. First things first. Do you know where your sensitive data is stored in virtual infrastructure and cloud environments?8 Confidential
  • 9. vShield Data Security Overview Coming Soon – September 2011 vShield 5.0 Release9 Confidential
  • 10. Introducing vShield Data Security (vSDS)Discovery of Sensitive Data in the Virtual Data Center PCI PHI PII Cardholder Data Personal Health Information Personally Identifiable Information1 Define policies: Choose from built in templates for standards and regulations governing most common types of sensitive data • PII Personally Identifiable Information • PCI-DSS Payment Card Industry Standard • PHI Patient Health information Run Scans: Continuous scan of running virtual2 machines to discover sensitive data in unstructured files, based on policy. Analyze Results: Generate actionable reports on3 type and location of sensitive data, with virtualization context (logical containers, for example) 10 1 Confidential
  • 11. vShield Data SecurityHow it worksvShield Endpoint virtual  Solution Componentsappliance for data security • vShield Endpoint Virtual Appliance (vSEP-VA) for data security (included) Powered by • Thin Agent in every guest virtual machine (included with VM Tools) • vShield Endpoint ESX hypervisor module per host  Features • Define policies, run scans, and analyze reports of discovered sensitive data throughout the vDC • Role-based access control for data security policies – definition, operation, report analysis 11
  • 12. vShield Data SecurityBenefits  Visibility • Enable regulatory compliance within vDC with visibility into PCI, PII, PHI  Manageability • Deployment and operation optimized for virtual data centers  Proven Technology • RSA DLP deployed thousands of data centers • vShield Endpoint performance gains validated by 3rd parties 12
  • 13. VMware vCenter Configuration Manager Configuration and Compliance Solution Overview13
  • 14. vCenter Configuration Manager Overview  Drive IT Compliance to lower risk • Ensure compliance with various industry and regulatory standards on a continuous basis • Quickly remediate problems  Mitigate outages through approved change processes • Detailed understanding and tracking of changes • Control change by following your Closed Loop Change Mgmt Process Harden your environment and reduce potential threats and breaches Compliance Through Unified Patching and Provisioning • Provision Linux, Windows and ESX images • Assess and Patch Windows, UNIX, MAC, etc  Control your virtual infrastructure • Fight VM Sprawl & Decommissioning Issues • Improved Virtual Troubleshooting • Single Pane of Glass14
  • 15. Manage & Measure Compliance Automated & Continuous Enterprise Compliance Posture Deep Collection and Visibility SOX HIPAA FISMA • Virtual and Physical Machines • Desktops and Servers DISA GLBA ISO 27002 PCI • Spans a large array or OSs CIS NERC/ Built in compliance tool kits NIST PCI DSS FERC VMware • Regulatory Virtualization Hardening Guidelines • SOX, HIPAA, GLBA, FISMA, DISA, ISO 27002 • Industry CIS Benchmarks • PCI DSS • Security • NERC/FERC  CIS Certified Benchmarks • vSphere Hardening • VMware Best Practices  DISA NIST • CIS Benchmark  Security Hardening Guides  Vendor Specific Hardening Guidelines Dashboards provide “At-a-Glance” 15 health

×