Alexandru Catalin Cosoi

711 views
674 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
711
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • By re-architecting the way that security is provided to servers and end-user systems, Bitdefender has not simply created security technology that provides the same value as in the traditional environments, but is, in-fact, better. There are several reasons why security in virtualized environments can be better than in traditional environments: elimination of boot-time vulnerability gaps, update and maintain a single scanning virtual machine and achieve power and hardware efficiencies across the environment. Organizations today look to virtualization technologies to increase the return on investment in data center infrastructure. Consolidation of server and enduser workloads onto shared infrastructure has led to cost reductions by deduplification of hardware resources. Virtualization also provides significant operational benefits through near-instant provisioning as organizations create and leverage private and public clouds. To realize the full potential of virtualized datacenters, organizations must also look to consolidating elements of the workloads themselves, security being an element that must be present across all workloads. In gaining ever-higher consolidation ratios and operational benefits, organizations must not sacrifice security while their valuable brands become increasingly threatened by evermore dedicated, sophisticated, and focused attackers. Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Virtualization platforms are software. All software has flaws. Therefore, virtualization platforms have flaws. The major virtualization platform vendors, VMware, Xen (now Citrix), and Microsoft, have all had several vulnerabilities over the last few years. However, the major components of a virtualization infrastructure and the IT strategy related to deployment and maintenance of virtualization technologies can be planned and secured fairly well.
  • Security for Virtualized Environments (SVE) by Bitdefender is the first comprehensive security solution for virtualized datacenters, integrating VMware vShield™ to protect Windows servers and desktops, as well as Linux and Solaris systems. Integrated with VMware vShield and VMware vCenter, the unique architecture of SVE also allows it to defend systems running on any system virtualization technology. As organizations increase consolidation ratios, Bitdefender security that has been designed, from day one, to provide highly advanced, proactive, and reliable security in virtualized environments is a cornerstone of building and enhancing datacenter virtualization strategies.
  • Server virtualization allows the conversion of one server into many virtual machines. By using specially designed software, an administrator can convert one physical server into multiple virtual machines. Each virtual server acts like a unique physical device, capable of running its own operating system. Each virtual machine is completely isolated from other virtual machines and is disconnected from the host by a thin layer of software known as a hypervisor. This allows each virtual machine to run different operating systems and applications. The traditional one server to one application architecture - you are running out of resources and performance is suffering. Once you order new server hardware, you wait for delivery, configure it, install your business application, test the server and finally start using it in production environments. This process can take a long time. It is also a manually intensive process that will use your team every team you outgrow your current infrastructure. With a virtual server solution you can accomplish all this in a very short period of time. Server virtualization software separates the OS and application from the underlying server hardware and with multiple virtual machines on a single server you can use each of each of them to run different OSs and applications. You can move your virtual machines from one piece of hardware to another whenever you want to maximize utilization, simplify maintenance or recover from hardware failures without slowing down your applications or users. Security for Virtualized Environments uses unique technology to achieve centralized scanning regardless of the virtualization technology (VMware, Citrix, Microsoft Hyper-V, etc). The main server virtualization infrastructure providers are: Vmware, Microsoft and Citrix. VMware is the market leader in data center virtualization. The company created technology that allows Bitdefender to perform anti-malware actions on a virtual machine from a virtual appliance. In VMware environments, Security for Virtualized Environments integrates with VMware vShield Endpoint, which provides introspection of the protected guest, caching of scan results, and a method of making objects that require scanning available to the Scanning Virtual Machine (SVM). In virtualized environments that do no leverage VMware, Bitdefender has created technology that provides introspection of the protected guest, caching of the scan result, and a method of making objects that require scanning available to the SVM via TCP/IP. The success of the technology is powered by the caching capabilities which perform functions such as de-duplicating scan results that are common across systems (for example, across a group of Red Hat Linux systems, the scanning results of the same system files is common). Windows Server 2008 R2 provides both server and client virtualization, enabled by Hyper-V and Remote Desktop Services (RDS). Hyper-V is Microsoft’s hypervisor which provides you with a scalable, reliable, and highly available virtualization platform included in the Windows Server 2008 R2 operating system. SP1 introduces new features to Hyper-V for creating dynamic virtual data centers and private clouds. These improvements provide you with increased availability and performance, improved management, and simplified methods for deployment including live migration. When combined with System Center, you are able to build out a dedicated private cloud environment to transform the way you deliver IT services to the business. Citrix XenServer is a complete, managed server virtualization platform built on the powerful Xen hypervisor. Xen technology is widely acknowledged as the fastest and most secure virtualization software in the industry. XenServer is designed for efficient management of Windows® and Linux® virtual servers and delivers cost-effective server consolidation and business continuity.
  • Desktop virtualization, sometimes referred to as client virtualization , is defined as a virtualization technology that is used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the virtualized desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. Desktop virtualization "virtualizes desktop computers" and these virtual desktop environments are "served" to users on the network. Users interact with a virtual desktop in the same way that a physical desktop is accessed and used. Another benefit of desktop virtualization is that is lets you remotely log in to access your desktop from any location. One of the most popular uses of desktop virtualization is in the data center, where personalized desktop images for each user is hosted on a data center server. VDI (Virtual Desktop Infrastructure -- or Interface) is a popular method of desktop virtualization. This type of desktop virtualization uses the server computing model, as the desktop virtualization in this scenario is enabled through hardware and software. VDI hosts the desktop environment in a virtual machine (VM) that runs on a centralized or remote server. VMware View™ delivers desktop services from your cloud to enable end user freedom and IT management and control. VMware View allows IT to simplify and automate the management of thousands of desktops and to securely deliver desktop as a service to users from a central location with levels of availability and reliability unmatched by traditional PCs. By delivering secure access to applications and data to any device, when and where the user needs it, VMware View provides end users with the highest levels of mobility and flexibility. Microsoft Desktop Virtualization & Management solutions use key features and tools found in Windows Server Hyper-V, Microsoft Desktop Optimization Pack, and System Center to empower IT in providing a flexible work experience to users who want to connect from everywhere, on the devices they choose, whether inside or outside the corporate networks. These solutions deliver personalized, consistent, and secure experiences for users, while also improving compliance through centralized control and access to confidential data. Microsoft Desktop Virtualization helps you simplify management too by unifying IT operations onto a single infrastructure across physical and virtual assets. It enables instant provisioning of corporate applications and desktops, which get users up and running sooner, and equips IT to provide access to legacy applications during migration to Windows 7. Working with System Center management tools, Microsoft Desktop Virtualization automatically detects device configurations and network conditions to deliver the most appropriate services to each user. Citrix XenDesktop is a desktop virtualization solution that transforms Windows desktops and applications into an on-demand service available to any user, anywhere, on any device. With XenDesktop, you can securely deliver individual Windows, web and SaaS applications, or full virtual desktops, to PCs, Macs, tablets, smartphones, laptops and thin clients—all with a high-definition user experience.
  • Until now the traditional approach used for protecting the virtual machines was basically consisting in installing an antivirus solution for each virtual machine, which was leading to a large resource consumption level for each virtual machine. The Bitdefender approach will ensure the scanning from a single point, integrated at the hypervisor level from VMWare. There will be no more antivirus solutions installed locally in each virtual machines. The scanning process will be run from the VMWare architecture, even if a specific virtual machine is turned off. Thanks to the Vshield integration we have access for scanning in the file system as it was conceived by VMware. This is applied for the Vmware solutions Windows operating machines. We can scan Linux and Solaris systems also or any other virtualization systems, using a technology integrated in the virtualization solution, using an agent (a sort of a driver) placed on the respective machine, the scan process taking place at a server level. The agent will intercept the accessed files and will send the hashes of the files to the scanning server, which will process them and send the answer back. There is only a centralized server on which all the scanning tasks are performed, there is nothing installed on the local machines.
  • Security for Virtualized Environments by Bitdefender has, at its heart, a hardened Linux, scanning virtual appliance. Much of the scanning and maintenance (updates, upgrades, RAM, IOPS, etc.) requirements of antimalware clients are duplicated with each virtual machine when using traditional security solutions. SVE deduplicates and centralizes much of the scanning functionality at a single, dedicated virtual appliance on each physical host. The relationship between the virtual appliance and protected systems is interactive and intelligent. Patented technology that includes a series of sophisticated cache mechanisms acts to provide deduplication of effort within SVE itself. By being virtualization-aware via integration with VMware vCenter, Security Console guarantees that no host is overwhelmed during even the most intense full-system scans of multiple virtual machines (a condition known as “resource contention” or “AV storm” that results from full anti-malware clients across multiple virtual machines competing for host resources, thus preventing the host from servicing production workloads). Recognizing the need to provide comprehensive security in the most demanding and heterogeneous datacenters, SVE has been architected to include coverage of: - Virtualized servers and desktops - VMware, Citrix, Microsoft, Oracle, or any other system virtualization technology Windows, Linux, and Solaris File event, process, and memory scanning
  • solution is the only one that has won an award in every single VBSpam test,
  • Bitdefender products have received numerous industry certifications and awards that confirm its value and performance. Here are just a few examples: AV-Comparatives provides independent Anti-Virus software tests by using various sources of malware samples. The SC Magazine in the US reviewed the Bitdefender Client Security 3.1.8 and found it a strong AV solution with management of the registry and WMI scripting for better endpoint management. Virus Bulletin has awarded VB100 award for Bitdefender Client Security 3.1.9 in December 2010, for Bitdefender Security for File Servers 3.4 in June and October 2010; and for Bitdefender Security for Samba 3.1.2 in February 2011 with the highest final score . Each product within the Bitdefender business product portfolio all share the same version of anti-virus engine, so the detection and performance noted by Virus Bulletin can be applied to all solutions. Bitdefender Security for Mail Servers 3.0.2 was awarded its 12th VB Spam Verified distinction in march 2011. The "Compatible - Windows 7 Logo" means this product passed Microsoft's compatibility tests for 64-bit and 32-bit Windows 7. To earn the "Compatible with Windows 7" logo, software and hardware must pass Microsoft designed installation, performance, reliability, and security tests so you can be sure these products are compatible with Windows 7. And finally, the Top Ten REVIEWS evaluated a number of Small Business Internet Security Suites and found Bitdefender Business Security number one, earning Bitdefender the GOLD Award in February 2011.
  • Alexandru Catalin Cosoi

    1. 2. <ul><li>S ecurity for V irtualized E nvironments </li></ul><ul><li>The first comprehensive security solution for Windows and Unix servers or desktops, in environments powered by any virtualization technology </li></ul><ul><li>Solution Presentation – October 11, 2011 </li></ul>
    2. 3. Do you protect your business or risk getting hacked?
    3. 4. Do you protect your business or risk getting hacked?
    4. 5. Why Security for Virtualized Environments? <ul><li>Virtualization has emerged as a major enabler for the modern data center, increasing resource utilization, system support options and resilience </li></ul><ul><li>Cloud computing technologies further that transformation, bringing on-demand provisioning and scalability to computing users </li></ul><ul><li>In gaining ever-higher consolidation ratios and operational benefits of virtualization, organizations must not sacrifice Security </li></ul>
    5. 6. Security for Virtualized Environments (SVE) by Bitdefender <ul><li>Security for Virtualized Environments (SVE) by Bitdefender provides security that is build specifically for the virtualized environments allowing organizations to maintain higher consolidation ratios across their datacenters. </li></ul>
    6. 7. Two types of virtualization: server virtualization <ul><li>For virtualized Windows, Linux and Solaris web/application servers </li></ul><ul><li>The main server virtualization infrastructure providers are: </li></ul><ul><ul><ul><li>VMware vSphere infrastructure (but not Server or Workstation!) </li></ul></ul></ul><ul><ul><ul><li>Microsoft with Windows Server 2008 R2 (Hyper-V) </li></ul></ul></ul><ul><ul><ul><li>Citrix XenServer infrastructure </li></ul></ul></ul>
    7. 8. Two types of virtualization: desktop virtualization <ul><li>It separates a personal computer desktop environment from a physical machine using the client–server model of computing </li></ul><ul><li>Sometimes called as “Client Virtualization” or “ Virtual Desktop Infrastructure ” (VDI) </li></ul><ul><li>The main desktop virtualization infrastructure providers are: </li></ul><ul><ul><li>VMware View (but not ThinApp or Workstation!) </li></ul></ul><ul><ul><li>Microsoft has virtual desktop infrastructure in Windows Server 2008 (based on Hyper-V hypervisor technology) </li></ul></ul><ul><ul><li>Citrix XenDesktop </li></ul></ul>
    8. 9. <ul><li>Two approaches: with agent vs. agentless </li></ul>
    9. 10. SVE Architecture <ul><li>Delivered within a Security Virtual Appliance running on a hardened Linux Server and is managed by Bitdefender Security Console </li></ul><ul><li>SVE deduplicates and centralizes much of the scanning functionality at a single, dedicated virtual appliance on each physical host </li></ul><ul><li>Integrated with Bitdefender Cloud Technologies for offering enhanced protection against 0-day malware </li></ul><ul><li>Build to include coverage of : </li></ul><ul><ul><li>Virtualized servers and desktops (VDI) </li></ul></ul><ul><ul><li>VMware, Citrix, Microsoft, Oracle, or any other system virtualization technology </li></ul></ul><ul><ul><li>Windows, Linux, and Solaris </li></ul></ul><ul><ul><li>File event, process, and memory scanning </li></ul></ul>
    10. 11. The number-one-ranked security technology
    11. 12. VBSpam award in every single antispam test <ul><ul><li>Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million spam per week </li></ul></ul><ul><ul><li>Bitdefender has continuously ranked top in Virus Bulletin’s (VB) tests for SPAM winning in July 2011 the 14 th VBSpam award in a row </li></ul></ul>
    12. 13. Awards and certifications for Business Solutions CRN Test Center Review 2011 “ a must-consider ” Bitdefender Business Solutions 3.5, June 2011 AV-Comparatives “Seal of Approval” Bitdefender Business Solutions, September 2011 Gold Award - Bitdefender Business Security Suite Top Ten Reviews, February 2011 Virus Bulletin’s VB100 Award Bitdefender Client Security 3.5, File Servers 3.5, Samba 3.1.2 Virus Bulletin’s VBSpam Award Bitdefender Security for Mail Servers 3.0.2, March 2011 Compatible with Windows 7 Bitdefender Client Security 3.5, 3.1.9, December 2010
    13. 14. <ul><li>More information at: bitdefender.com/sve </li></ul>
    14. 15. <ul><li>Thank you! </li></ul>

    ×