Data Center Evolution:Physical. Virtual. Cloud.Securing Your Journey to the Cloud


Published on

The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But are we secure in the new cloud environments? Are data assets protected as they move around in the cloud? The answer to both is yes – as long as your underlying security architecture has been designed for the cloud. In this session, Trend Micro, examines security concerns along the cloud journey and provides a framework to assess and prioritise security efforts. We then explore new technologies from VMware and Trend Micro that are already helping businesses to maintain privacy, integrity and confidentiality in virtualised environments.

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Data Center Evolution:Physical. Virtual. Cloud.Securing Your Journey to the Cloud

  1. 1. Data Center Evolution:Physical. Virtual. Cloud.Securing Your Journey to the Cloud Copyright 2011 Trend Micro Inc.
  2. 2. Platform-specific Security RisksPhysical Virtual CloudManageability Performance & Threats Visibility & Threats• Glut of security products • Security degrades • Less visibility performance• Less security • External multi-tenant • Inter-VM threats risks• Higher TCOReduce Complexity Increase Efficiency Deliver Agility Integrated Security Single Management Console Copyright 2011 Trend Micro Inc. 2
  3. 3. Reduce ComplexityConsolidate Physical Security Vendors Physical Copyright 2011 Trend Micro Inc.
  4. 4. Consolidated Physical SecurityBenefits of Integrated Server Security Threat Management Data Protection HIPS / Web File Integrity Log Virtual Application Firewall Antivirus Monitoring Inspection Patching Protection Single Management Console Advanced Reporting Module Copyright 2011 Trend Micro Inc.
  5. 5. Increase EfficiencyServer and Desktop Virtualization Security Virtual Copyright 2011 Trend Micro Inc.
  6. 6. VirtualizationSecurity Inhibitors Typical AV Console 3:00am Scan1 Resource ContentionConsolidation Ratios Antivirus Storm Baseline (no AV) 20 Virtualization Aware 20 Traditional Security 2-4 0 5 10 15 20Source: Indusface June 2010 Automatic antivirus scans overburden the system Solution: Agentless AV with staggered scans from a separate scanning VM Copyright 2011 Trend Micro Inc. 6
  7. 7. VirtualizationSecurity Inhibitors Reactivated with1 Resource Contention Active out-of-date security New VMs Dormant2 Instant-on Gaps        Cloned VMs must have a configured agent and updated pattern files Solution: Dedicated scanning VMs with layered protection Copyright 2011 Trend Micro Inc. 7
  8. 8. VirtualizationSecurity Inhibitors1 Resource Contention2 Instant-on Gaps3 Inter-VM Attacks / Blind Spots Attacks can spread across VMs Solution: VM-aware security with virtualization platform integration Copyright 2011 Trend Micro Inc. 8
  9. 9. VirtualizationFitting into the VMware Ecosystem Trend Micro Deep Security Agentless 1 vShield Antivirus Endpoint Agentless 2 Security Integrity Monitoring vShield Virtual v Endpoint Machine S Agentless p 3 IDS / IPS VMsafe h Integrates Web Application Protection APIs e with r vCenter Application Control e Firewall Agent-based 4 Log Inspection Security agent on individual VMs Copyright 2011 Trend Micro Inc.
  10. 10. Deliver AgilityCloud Deployments and Security Cloud Computing Copyright 2011 Trend Micro Inc.
  11. 11. What Are Cloud Security Concerns? • Your data is mobile — has it moved? • Who can see your information? • Who is attaching to your volumes? • Do you have visibility into who has accessed your data? Rogue server access No visibility to data accessName: John Doe Name: John Doe nSSN: 425-79-0053 SSN: 425-79-0053Visa #: 4456-8732… Visa #: 4456-8732… Data can be moved and leave residual data behind Copyright 2011 Trend Micro Inc. 11
  12. 12. What is the Solution?Data Protection in the Cloud Encryption Cloud Security Credit Card Payment SensitiveMedical Numbers Social Security Records Patient Policy-based with Research Results Information Modular Protection Key Management • Data is unreadable to unauthorized users • Policies control when and • Self-Defending VM where data is accessed Security in the Cloud • Server validation limits • Agent on VM allows travel access to data between cloud solutions • Custody of keys to avoid • One management portal vendor lock-in for all modules Copyright 2011 Trend Micro Inc.
  13. 13. Data Protection Using EncryptionFitting Into a VMware Ecosystem Trend Micro SecureCloud vCloud Director VMware vCloud VMware vSphere Data Center Private Cloud Public Cloud VM VM VM VM VM VM VM VM VM VM VM VM Encryption throughout your cloud journey— data protection for virtual & cloud environments Copyright 2011 Trend Micro Inc. 13
  14. 14. Securing Your Journey to the Cloud • Integrate security—server, web, email,Physical endpoint, networkReduce Complexity • Improve security and availability • Lower costs • Apply VM-aware securityVirtual • Ensure higher VM densitiesIncrease Efficiency • Get better performance and better protection • Encrypt with policy-based key managementCloud • Deploy self-defending VMs in the cloudDeliver Agility • Use security that travels with your data Use Data Center Security to Drive Your Business Forward Copyright 2011 Trend Micro Inc. 14
  15. 15. Thank you! Copyright 2011 Trend Micro Inc.
  16. 16. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  17. 17. THE WHOLETECHNOLOGY STACKfrom start to finish
  18. 18. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  19. 19. VIDEOYour source of live information – all the presentations from our live events
  20. 20. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  21. 21. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  22. 22. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  23. 23. ALL FREE TO ACCESS 24/7
  24. 24.