SlideShare a Scribd company logo
1 of 36
© 2009 VMware Inc. All rights reserved
VMware Overview
By Alamgir Hossain
Email: alamgirgtc@outlook.com
M:+8801922688303
Working Experience with VMware vSphere 6.0 (ESXi & vCenter) & VMware Horizon 7 (For VDI):
Optical Data Archive and Networking (ODAN 2nd Phase) Project of BBS
R&D Project of VMware VDI (virtual desktop infrastructure)
© 2009 VMware Inc. All rights reserved
A global leader in cloud infrastructure & digital
workspace technology, accelerates digital
transformation for evolving IT environments.
VMware software based Virtualization which
run multiple Operating Systems over a single
physical host.
3 Confidential
Agenda
 VMware Product Type
 Cloud Computing framework, Security & Services
 VMware Infrastructure Architecture (Server, Network & Storage)
 Virtualization – Key Security Enabler (Challenges, Advantage,
Automating & Complex)
4 Confidential
VMware Product Type:
 Data Center and Cloud Infrastructure
 Desktop and Application Virtualization
 Personal Desktop
 Application and Data Platform
 Data Center and Cloud Management
 Internet of Things (IoT)
5 Confidential
Product of Data Center and Cloud
Infrastructure:
 VMware vSphere: vSphere is a server virtualization
platform that delivers essential services for the modern
hybrid cloud such as ESXi & vCenter.
 VMware vSAN: VMware vSAN uses a software-
defined approach that creates shared storage for virtual
machines
 VMware NSX: The network virtualization platform that
enables the implementation of virtual networks on your
physical network and within virtual server infrastructure.
6 Confidential
Desktop and Application Virtualization:
 VMware Horizon 7
 VMware Horizon Cloud
 VMware Workspace ONE UEM
 VMware vRealize Operations for Horizon and
Published Applications
 VMware ThinApp
 VMware App Volumes
 VMware User Environment Manager
7 Confidential
Data Center and Cloud Management:
 VMware vRealize Automation
 VMware vRealize Operations
 VMware vRealize Log Insight
 VMware vRealize Code Stream
 VMware Site Recovery Manager
 VMware Integrated OpenStack
 VMware vRealize Business for Cloud
8 Confidential
Application and Data Platform:
 Pivotal App Suite
 Pivotal TC Server
 Pivotal GemFire
 Pivotal RabbitMQ
9 Confidential
Internet of Things (IoT):
 VMware Pulse IoT Center: A secure, enterprise-grade
IoT device management platform that improves the
reliability & security of your IoT infrastructure.
10 Confidential
Personal Desktop:
 VMware Workstation Pro
 VMware Fusion
 VMware Fusion Pro
 VMware Workstation Player (formerly Player Pro)
11 Confidential
VMware Cloud Services security framework:
12 Confidential
VMware Cloud Security: Cloud, Hybrid or
on premise – security is our priority.
 Extensive security experience
 Built-in compliance
 Accelerate without compromise
13 Confidential
VMware Cloud Security capabilities:
 Software security
 Data security
 Network security
 Identity and access management
 Vulnerability and patch management
 Operations management
14 Confidential
VMware Transforms Security from Expensive to Cost Effective
Load balancer
firewall
VPN
Load balancer
Firewall
VPN
Etc… vShield
Virtual
Appliance
vShield eliminates the need for multiple special purpose
hardware appliances – 3-5x Savings Capex, Opex
15 Confidential
Business Adoption of Server Virtualization Solutions by Company
Size:
16 Confidential
17 Confidential
VMware Infrastructure Architecture:
18 Confidential
Physical Topology of the VMware Infrastructure Data Center:
19 Confidential
vCenter Management Server Management of VM to Physical Servers:
20 Confidential
Virtual Data Center Architecture:
21 Confidential
VMware VMotion, VMware DRS and VMware HA:
VMware VMotion
VMware DRS VMware
HA
22 Confidential
Networking Architecture:
23 Confidential
Storage Architecture:
24 Confidential
VMware VMotion, VMware DRS and VMware HA:
VMware VMotion
VMware DRS VMware
HA
25 Confidential
VMware Infrastructure Access and Control:
26 Confidential
• VLAN sprawl
• Gap between policy and
enforcement
• Manual re-implementation of
security policies
• Heightened risk exposures
• Limited control and visibility
• Organizational confusion (VI,
security, network)
• Hindered IT compliance
• Slow provisioning
• Heightened risk exposures
Security Challenges
Traditional Security
Expensive
• Specialized hardware
appliances
• Multiple point solutions
Rigid
• Policy directly tied to
implementation
• Not virtualization and change-
aware
Effect
Complex
• Spaghetti of different rules and
policies
• Security “rationing”
• Heightened risk exposures
27 Confidential
The vShield Advantage: Increased Security
Traditional Security vShield
Cost Effective
• Single virtual appliance with
breadth of functionality
• Single framework for
comprehensive protection
Simple
• No sprawl in rules, VLANs, agents
• Relevant visibility for VI Admins,
network and security teams
• Simplified compliance
Adaptive
• Virtualization and change aware
• Program once, execute everywhere
• Rapid remediation
Expensive
• Specialized hardware
appliances
• Multiple point solutions
Rigid
• Policy directly tied to
implementation
• Not virtualization and change-
aware
Complex
• Spaghetti of different rules and
policies
Deployments on VMware are more secure than physical
28 Confidential
Automating Operations Management across the Enterprise:
29 Confidential
VMware Transforms Security from Complex…
VLAN’s
agent
Complex
• Policies, rules implementation - no clear separation of duties;
organizational confusion
• Many steps – configure network, firewall and vSphere
• Spaghetti of VLANs, Sprawl - Firewall rules, agents
Policies,
Rules
Network
admin
Security
admin
VI admin
Overlapping
Roles /
Responsibilities
Many steps.
Configure
•Network
•Firewall
•vSphere
Define, Implement ,
Monitor, Refine,
agent agent agent agent agent agent agent
30 Confidential
VMware Turns Security from Rigid…
 BEFORE vShield
• Security groups tied to
physical servers
• “Air gaps”, i.e. physical
isolation, between security
groups
• VMs in a security group
cannot be vMotioned to other
hosts
DMZ PCI compliant
“Air gap”
31 Confidential
… To Disruptively Simple
Few steps:
Configure
vShield
Simple
• Clear separation of duties
• Few steps – configure vShield
• Eliminate VLAN sprawl – vNIC firewalls
• Eliminate firewall rules, agents sprawl
Network
admin
Security
admin
VI admin
Clear separation
of Roles /
Responsibilities
Define, Monitor, Refine,
Implement
32 Confidential
PCI CompliantDMZDMZDMZ PCI Compliant
….to Adaptive
 AFTER vShield
• Security groups becomes a
VM construct rather than
physical server construct
• Security groups enforced with
VM movement
• Mix VMs from different
groups on the same host
33 Confidential
Why VMware vShield is a Security Enabler ?
1. Unique introspection
2. Policy abstraction
Cost Effective
• Single virtual appliance with breadth
of functionality
• Single framework for comprehensive
protection
Simple
• No sprawl in rules, VLANs, agents
• Relevant visibility for VI Admins,
network and security teams
• Simplified compliance
Adaptive
• Virtualization and change aware
• Program once, execute everywhere
• Rapid remediation
34 Confidential
Security Enabler: Unique Introspection
Introspect detailed VM state and VM-to-VM
communications
vSphere + vShield
Processor
memory
Network
Benefits
• Comprehensive host and VM
protection
• Reduced configuration errors
• Quick problem identification
• Reduced complexity – no security
agents per VM required
35 Confidential
Security Enabler: Policy Abstraction
Before
vShield
Policy tied to the
physical host;
lost during
vMotion
Policy tied to
logical
attributes
After
vShield
Benefits
• Create and enforce security
policies with live migration,
automated VM load balancing
and automated VM restart
• Rapid provisioning of security
policies
• Easier compliance with
continuous monitoring and
comprehensive logging
Separate the policy definition from the policy
implementation
Policy tied to
logical attributes;
follow virtual
machine
© 2009 VMware Inc. All rights reserved
Thank You..
By Alamgir Hossain
Email: alamgirgtc@outlook.com
M:+8801922688303
Working Experience with VMware vSphere 6.0 (ESXi & vCenter) & VMware Horizon 7 (For VDI):
Optical Data Archive and Networking (ODAN 2nd Phase) Project of BBS
R&D Project of VMware VDI (virtual desktop infrastructure)

More Related Content

What's hot

VMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingVMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingDan Brinkmann
 
Understanding Azure Networking Services
Understanding Azure Networking ServicesUnderstanding Azure Networking Services
Understanding Azure Networking ServicesInCycleSoftware
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & LoggingJason Poley
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical ChallengeAidan Finn
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 
Azure key vault
Azure key vaultAzure key vault
Azure key vaultRahul Nath
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
Hybrid Cloud Customer Use Cases on AWS
Hybrid Cloud Customer Use Cases on AWSHybrid Cloud Customer Use Cases on AWS
Hybrid Cloud Customer Use Cases on AWSTom Laszewski
 
Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900thisiswali
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”solarisyourep
 
AZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxAZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxTheGameSquad
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Amazon Web Services
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 

What's hot (20)

VMware vSphere Performance Troubleshooting
VMware vSphere Performance TroubleshootingVMware vSphere Performance Troubleshooting
VMware vSphere Performance Troubleshooting
 
Understanding Azure Networking Services
Understanding Azure Networking ServicesUnderstanding Azure Networking Services
Understanding Azure Networking Services
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
 
Azure 101
Azure 101Azure 101
Azure 101
 
Azure Networking - The First Technical Challenge
Azure Networking  - The First Technical ChallengeAzure Networking  - The First Technical Challenge
Azure Networking - The First Technical Challenge
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
Azure key vault
Azure key vaultAzure key vault
Azure key vault
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Hybrid Cloud Customer Use Cases on AWS
Hybrid Cloud Customer Use Cases on AWSHybrid Cloud Customer Use Cases on AWS
Hybrid Cloud Customer Use Cases on AWS
 
Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900Azure Fundamentals || AZ-900
Azure Fundamentals || AZ-900
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Zero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOpsZero-Trust SASE DevSecOps
Zero-Trust SASE DevSecOps
 
Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”
 
AZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptxAZ-900T00A-ENU-PowerPoint-02.pptx
AZ-900T00A-ENU-PowerPoint-02.pptx
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 

Similar to VMware Overview: Virtualization & Security

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...Cisco DevNet
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationSuministros Obras y Sistemas
 
GAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO a.s.
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2karanamsaibabu
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your itsolarisyourep
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s newsolarisyourep
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld
 
Clearing Cloud Confusion
Clearing Cloud ConfusionClearing Cloud Confusion
Clearing Cloud ConfusionOVH US
 
VMworld 2013: Architectural Changes in vCenter Platform
VMworld 2013: Architectural Changes in vCenter Platform VMworld 2013: Architectural Changes in vCenter Platform
VMworld 2013: Architectural Changes in vCenter Platform VMworld
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandAruj Thirawat
 
V center operations management suite 5.6 what's new, pricing and packaging ...
V center operations management suite 5.6   what's new, pricing and packaging ...V center operations management suite 5.6   what's new, pricing and packaging ...
V center operations management suite 5.6 what's new, pricing and packaging ...solarisyourep
 

Similar to VMware Overview: Virtualization & Security (20)

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 
GAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO VMware vCloud Air
GAMO VMware vCloud Air
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your it
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s new
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
Clearing Cloud Confusion
Clearing Cloud ConfusionClearing Cloud Confusion
Clearing Cloud Confusion
 
OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
VMworld 2013: Architectural Changes in vCenter Platform
VMworld 2013: Architectural Changes in vCenter Platform VMworld 2013: Architectural Changes in vCenter Platform
VMworld 2013: Architectural Changes in vCenter Platform
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - Thailand
 
V center operations management suite 5.6 what's new, pricing and packaging ...
V center operations management suite 5.6   what's new, pricing and packaging ...V center operations management suite 5.6   what's new, pricing and packaging ...
V center operations management suite 5.6 what's new, pricing and packaging ...
 

Recently uploaded

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

VMware Overview: Virtualization & Security

  • 1. © 2009 VMware Inc. All rights reserved VMware Overview By Alamgir Hossain Email: alamgirgtc@outlook.com M:+8801922688303 Working Experience with VMware vSphere 6.0 (ESXi & vCenter) & VMware Horizon 7 (For VDI): Optical Data Archive and Networking (ODAN 2nd Phase) Project of BBS R&D Project of VMware VDI (virtual desktop infrastructure)
  • 2. © 2009 VMware Inc. All rights reserved A global leader in cloud infrastructure & digital workspace technology, accelerates digital transformation for evolving IT environments. VMware software based Virtualization which run multiple Operating Systems over a single physical host.
  • 3. 3 Confidential Agenda  VMware Product Type  Cloud Computing framework, Security & Services  VMware Infrastructure Architecture (Server, Network & Storage)  Virtualization – Key Security Enabler (Challenges, Advantage, Automating & Complex)
  • 4. 4 Confidential VMware Product Type:  Data Center and Cloud Infrastructure  Desktop and Application Virtualization  Personal Desktop  Application and Data Platform  Data Center and Cloud Management  Internet of Things (IoT)
  • 5. 5 Confidential Product of Data Center and Cloud Infrastructure:  VMware vSphere: vSphere is a server virtualization platform that delivers essential services for the modern hybrid cloud such as ESXi & vCenter.  VMware vSAN: VMware vSAN uses a software- defined approach that creates shared storage for virtual machines  VMware NSX: The network virtualization platform that enables the implementation of virtual networks on your physical network and within virtual server infrastructure.
  • 6. 6 Confidential Desktop and Application Virtualization:  VMware Horizon 7  VMware Horizon Cloud  VMware Workspace ONE UEM  VMware vRealize Operations for Horizon and Published Applications  VMware ThinApp  VMware App Volumes  VMware User Environment Manager
  • 7. 7 Confidential Data Center and Cloud Management:  VMware vRealize Automation  VMware vRealize Operations  VMware vRealize Log Insight  VMware vRealize Code Stream  VMware Site Recovery Manager  VMware Integrated OpenStack  VMware vRealize Business for Cloud
  • 8. 8 Confidential Application and Data Platform:  Pivotal App Suite  Pivotal TC Server  Pivotal GemFire  Pivotal RabbitMQ
  • 9. 9 Confidential Internet of Things (IoT):  VMware Pulse IoT Center: A secure, enterprise-grade IoT device management platform that improves the reliability & security of your IoT infrastructure.
  • 10. 10 Confidential Personal Desktop:  VMware Workstation Pro  VMware Fusion  VMware Fusion Pro  VMware Workstation Player (formerly Player Pro)
  • 11. 11 Confidential VMware Cloud Services security framework:
  • 12. 12 Confidential VMware Cloud Security: Cloud, Hybrid or on premise – security is our priority.  Extensive security experience  Built-in compliance  Accelerate without compromise
  • 13. 13 Confidential VMware Cloud Security capabilities:  Software security  Data security  Network security  Identity and access management  Vulnerability and patch management  Operations management
  • 14. 14 Confidential VMware Transforms Security from Expensive to Cost Effective Load balancer firewall VPN Load balancer Firewall VPN Etc… vShield Virtual Appliance vShield eliminates the need for multiple special purpose hardware appliances – 3-5x Savings Capex, Opex
  • 15. 15 Confidential Business Adoption of Server Virtualization Solutions by Company Size:
  • 18. 18 Confidential Physical Topology of the VMware Infrastructure Data Center:
  • 19. 19 Confidential vCenter Management Server Management of VM to Physical Servers:
  • 20. 20 Confidential Virtual Data Center Architecture:
  • 21. 21 Confidential VMware VMotion, VMware DRS and VMware HA: VMware VMotion VMware DRS VMware HA
  • 24. 24 Confidential VMware VMotion, VMware DRS and VMware HA: VMware VMotion VMware DRS VMware HA
  • 26. 26 Confidential • VLAN sprawl • Gap between policy and enforcement • Manual re-implementation of security policies • Heightened risk exposures • Limited control and visibility • Organizational confusion (VI, security, network) • Hindered IT compliance • Slow provisioning • Heightened risk exposures Security Challenges Traditional Security Expensive • Specialized hardware appliances • Multiple point solutions Rigid • Policy directly tied to implementation • Not virtualization and change- aware Effect Complex • Spaghetti of different rules and policies • Security “rationing” • Heightened risk exposures
  • 27. 27 Confidential The vShield Advantage: Increased Security Traditional Security vShield Cost Effective • Single virtual appliance with breadth of functionality • Single framework for comprehensive protection Simple • No sprawl in rules, VLANs, agents • Relevant visibility for VI Admins, network and security teams • Simplified compliance Adaptive • Virtualization and change aware • Program once, execute everywhere • Rapid remediation Expensive • Specialized hardware appliances • Multiple point solutions Rigid • Policy directly tied to implementation • Not virtualization and change- aware Complex • Spaghetti of different rules and policies Deployments on VMware are more secure than physical
  • 28. 28 Confidential Automating Operations Management across the Enterprise:
  • 29. 29 Confidential VMware Transforms Security from Complex… VLAN’s agent Complex • Policies, rules implementation - no clear separation of duties; organizational confusion • Many steps – configure network, firewall and vSphere • Spaghetti of VLANs, Sprawl - Firewall rules, agents Policies, Rules Network admin Security admin VI admin Overlapping Roles / Responsibilities Many steps. Configure •Network •Firewall •vSphere Define, Implement , Monitor, Refine, agent agent agent agent agent agent agent
  • 30. 30 Confidential VMware Turns Security from Rigid…  BEFORE vShield • Security groups tied to physical servers • “Air gaps”, i.e. physical isolation, between security groups • VMs in a security group cannot be vMotioned to other hosts DMZ PCI compliant “Air gap”
  • 31. 31 Confidential … To Disruptively Simple Few steps: Configure vShield Simple • Clear separation of duties • Few steps – configure vShield • Eliminate VLAN sprawl – vNIC firewalls • Eliminate firewall rules, agents sprawl Network admin Security admin VI admin Clear separation of Roles / Responsibilities Define, Monitor, Refine, Implement
  • 32. 32 Confidential PCI CompliantDMZDMZDMZ PCI Compliant ….to Adaptive  AFTER vShield • Security groups becomes a VM construct rather than physical server construct • Security groups enforced with VM movement • Mix VMs from different groups on the same host
  • 33. 33 Confidential Why VMware vShield is a Security Enabler ? 1. Unique introspection 2. Policy abstraction Cost Effective • Single virtual appliance with breadth of functionality • Single framework for comprehensive protection Simple • No sprawl in rules, VLANs, agents • Relevant visibility for VI Admins, network and security teams • Simplified compliance Adaptive • Virtualization and change aware • Program once, execute everywhere • Rapid remediation
  • 34. 34 Confidential Security Enabler: Unique Introspection Introspect detailed VM state and VM-to-VM communications vSphere + vShield Processor memory Network Benefits • Comprehensive host and VM protection • Reduced configuration errors • Quick problem identification • Reduced complexity – no security agents per VM required
  • 35. 35 Confidential Security Enabler: Policy Abstraction Before vShield Policy tied to the physical host; lost during vMotion Policy tied to logical attributes After vShield Benefits • Create and enforce security policies with live migration, automated VM load balancing and automated VM restart • Rapid provisioning of security policies • Easier compliance with continuous monitoring and comprehensive logging Separate the policy definition from the policy implementation Policy tied to logical attributes; follow virtual machine
  • 36. © 2009 VMware Inc. All rights reserved Thank You.. By Alamgir Hossain Email: alamgirgtc@outlook.com M:+8801922688303 Working Experience with VMware vSphere 6.0 (ESXi & vCenter) & VMware Horizon 7 (For VDI): Optical Data Archive and Networking (ODAN 2nd Phase) Project of BBS R&D Project of VMware VDI (virtual desktop infrastructure)