SlideShare a Scribd company logo
1 of 22
INTRODUCING KASPERSKY SECURITY FOR VIRTUALIZATION
| LIGHT AGENT
Matvey Voytov
Product Marketing
VIRTUALIZATION BASICS
WHAT IS VIRTUALIZATION
3
HYPERVISOR – CORE OF VIRTUALIZATION
4
Hypervisor – specialized software which allows to create and operate virtual
machines (VM). It manages physical computing resources sharing them
among VM.
Hardware
Hypervisor
VM VM VM VM VM
VIRTUAL MACHINE – BASIC ELEMENT OF VIRTUALIZATION
5
Virtual Machine (VM) – isolated software environment that takes all
necessary computing resources like CPU, RAM, HDD from hypervisor, which
allows you to run different operating systems and applications on single host.
Hardware
Hypervisor
Windows
Server
2008
Windows
Server
2012
Windows
XP
Windows
7
Windows
8
TWO MOST COMMON TYPES OF VIRTUALIZATION
6
Server Virtualization
Infrastructure
Desktop Virtualization
Infrastructure (VDI)
Hardware
Hypervisor
Windows
Server
2008
Windows
Server
2012
Windows
XP
Windows
7
Windows
8
VIRTUALIZATION BENEFITS FOR BUSINESS
VMVM
IT-COSTS REDUCTION
FLEXIBLE MANAGEMENT
RESOURCE OPTIMIZATION
HARDWARE INDEPENDENCE
7
►VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN
PHYSICAL ENVIRONMENTS?
GUEST OS IS THE SAME TARGET FOR MALWARE AS USUAL OS. FROM
MALWARE STANDPOINT THERE IS NO DIFFERENCE BETWEEN VM AND
REAL PC.
FALSE
►CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES?FALSE
MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL
MACHINES, WAS IDENTIFIED IN 2012
►MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF
NON-PERSISTENT VIRTUAL MACHINES?FALSE
RESIDENT MALWARE CAN
SECURITY IN VIRTUAL ENVIRONMENT
8
SERVER VIRTUALIZATION USAGE
9 Security in Private and Public Datacenters
80%
75%
57%
50%
46%
3%
1%
67%
58%
45%
37%
34%
2%
4%
0% 20% 40% 60% 80% 100%
Database applications
E-mail applications
CRM applications
ERP applications
Financial Management
applications
Other
Hard to say
Use in virtual environment
Business critical among them
Kaspersky Lab study | Base: 525 companies over Europe, 2012
VIRTUALIZATION SECURITY SOLUTIONS
&
LIGHT AGENT APPROACH
VIRTUAL SECURITY – THE OPTIONS
11
AGENTLESS
NO PROTECTION
LIGHT AGENT
TRADITIONAL
NOT AN OPTION!
GREAT PROTECTION
/INEFFICIENT
IMPLEMENTATION
EASY
DEPLOY/MANAGE
FOR VMWARE
FEATURE-RICH
SECURITY
Each guest protects itself -
All set of antimalware
bases locally at every VM,
separate kernel to scan
every VM
•Excessive resource consumption
•Update storms
•Instant-On gaps
•Lower VM densities
AGENT-BASED SECURITY
•Keeps VM density
(consolidation ratio) high
•No problems of Agent-
based security, but..
•Less security
•Only VMware
AGENTLESS SECURITY
13
LIGHT AGENT SECURITY
14
PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT
PREVENTION
LIGHT AGENT | FILE LEVEL PROTECTION
15
AWARD-WINNING ANTI-MALWARE ENGINE
REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY
SECURITY NETWORK CLOUD-BASED INTELLIGENCE
DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL,
PROTECTING AGAINST THE MOST ADVANCED MALWARE
LIGHT AGENT | NETWORK LEVEL PROTECTION
16
FEATURES HOST-BASED INTRUSION PROVENSION
SYSTEM (HIPS) AND FIREWALL
NETWORK ATTACK BLOCKER IDENTIFIES AND
RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR
IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
WEB CONTROL
APPLICATION CONTROL
DEVICE CONTROL
LIGHT AGENT | CONTROLS
17
18
Internet
vSphere Microsoft
Hyper-V
Linux-based
hypervisor
VDI for internal use Servers with conf info Test bed
KSV KSV
Endpoint Endpoint
Kaspersky
Security Center (KSC)
KSV | Agentless Kaspersky Endpoint SecurityKSV | Light Agent
REAL LIFE CASE – WHAT SOLUTION TO CHOOSE
19
WHAT OUR SOLUTION IS COMPRISED OF
*NB!! Kaspersky Security for Virtualization is managed via Kaspersky Security Center
WHO CAN BENEFIT THE MOST FROM USING KASPERSKY
SECURITY FOR VIRTUALIZATION?
20
Enterprises
Service Providers
Multi-hypervisor
infrastructure owners
..as well as SMB
WHAT MAKES OUR SOLUTION DIFFERENT?
21
Low performance impact on virtual infrastructure, thanks to optimized
architecture and dedicated virtual appliance for AV-scan tasks1.
Better protection quality, thanks to wide range of protection components
and technologies, including Anti-Malware, Automatic Exploit Prevention,
Application Control, HIPS, Firewall, Network Attack Blocker, and URL Scan.
Comprehensive solution supporting multiple hypervisor platforms (VMware,
Citrix and Hyper-V), set of protection components with flexible configuration.
Efficient deployment and management of the entire IT infrastructure
security with Kaspersky Security Center unified management solution.
1
2
3
4
1 – read more at http://www.kaspersky.com/about/news/compare/2014/Kaspersky-Lab-Tops-
Competitors-in-Testing-of-Security-Software-in-Virtual-Environments
WANT TO KNOW MORE?
Please visit kaspersky.com/business or business.kaspersky.com
Follow us @KasperskyLabB2B
#EnterpriseSec

More Related Content

What's hot

What's hot (20)

Log yonetimi
Log yonetimiLog yonetimi
Log yonetimi
 
Linux Performance Profiling and Monitoring
Linux Performance Profiling and MonitoringLinux Performance Profiling and Monitoring
Linux Performance Profiling and Monitoring
 
Redhat ha cluster with pacemaker
Redhat ha cluster with pacemakerRedhat ha cluster with pacemaker
Redhat ha cluster with pacemaker
 
Best practices for MySQL/MariaDB Server/Percona Server High Availability
Best practices for MySQL/MariaDB Server/Percona Server High AvailabilityBest practices for MySQL/MariaDB Server/Percona Server High Availability
Best practices for MySQL/MariaDB Server/Percona Server High Availability
 
Running MariaDB in multiple data centers
Running MariaDB in multiple data centersRunning MariaDB in multiple data centers
Running MariaDB in multiple data centers
 
Kudu Deep-Dive
Kudu Deep-DiveKudu Deep-Dive
Kudu Deep-Dive
 
Ceph Introduction 2017
Ceph Introduction 2017  Ceph Introduction 2017
Ceph Introduction 2017
 
Ceph Performance and Sizing Guide
Ceph Performance and Sizing GuideCeph Performance and Sizing Guide
Ceph Performance and Sizing Guide
 
Log Yonetimi ve SIEM Kontrol Listesi
Log Yonetimi ve SIEM Kontrol Listesi Log Yonetimi ve SIEM Kontrol Listesi
Log Yonetimi ve SIEM Kontrol Listesi
 
XCP-ng - Olivier Lambert
XCP-ng - Olivier Lambert XCP-ng - Olivier Lambert
XCP-ng - Olivier Lambert
 
Hardware & Software Platforms for HPC, AI and ML
Hardware & Software Platforms for HPC, AI and MLHardware & Software Platforms for HPC, AI and ML
Hardware & Software Platforms for HPC, AI and ML
 
Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail
 
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
Room 3 - 6 - Nguyễn Văn Thắng & Dzung Nguyen - Ứng dụng openzfs làm lưu trữ t...
 
Linux Huge Pages
Linux Huge PagesLinux Huge Pages
Linux Huge Pages
 
Static partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-VStatic partitioning virtualization on RISC-V
Static partitioning virtualization on RISC-V
 
Kernel Recipes 2019 - No NMI? No Problem! – Implementing Arm64 Pseudo-NMI
Kernel Recipes 2019 - No NMI? No Problem! – Implementing Arm64 Pseudo-NMIKernel Recipes 2019 - No NMI? No Problem! – Implementing Arm64 Pseudo-NMI
Kernel Recipes 2019 - No NMI? No Problem! – Implementing Arm64 Pseudo-NMI
 
Aix overview
Aix overviewAix overview
Aix overview
 
Seastore: Next Generation Backing Store for Ceph
Seastore: Next Generation Backing Store for CephSeastore: Next Generation Backing Store for Ceph
Seastore: Next Generation Backing Store for Ceph
 
Machine Intelligence & Physics
Machine Intelligence & PhysicsMachine Intelligence & Physics
Machine Intelligence & Physics
 
Continguous Memory Allocator in the Linux Kernel
Continguous Memory Allocator in the Linux KernelContinguous Memory Allocator in the Linux Kernel
Continguous Memory Allocator in the Linux Kernel
 

Viewers also liked

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
The Empire Strikes Back
The Empire Strikes BackThe Empire Strikes Back
The Empire Strikes Back
Kaspersky
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
Kirill Kertsenbaum
 
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Expolink
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
Onwubiko Emmanuel
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Kirill Kertsenbaum
 

Viewers also liked (20)

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
The Empire Strikes Back
The Empire Strikes BackThe Empire Strikes Back
The Empire Strikes Back
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsDotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 

Similar to Introducing Kaspersky Security for Virtualization - Light Agent

Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
rajsandhu1989
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
vivekbhat
 

Similar to Introducing Kaspersky Security for Virtualization - Light Agent (20)

Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Virtualization
VirtualizationVirtualization
Virtualization
 

More from Kaspersky

Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Kaspersky
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Kaspersky
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
Kaspersky
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Kaspersky
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Kaspersky
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Kaspersky
 

More from Kaspersky (20)

A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
 
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
 

Recently uploaded

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 

Introducing Kaspersky Security for Virtualization - Light Agent

  • 1. INTRODUCING KASPERSKY SECURITY FOR VIRTUALIZATION | LIGHT AGENT Matvey Voytov Product Marketing
  • 4. HYPERVISOR – CORE OF VIRTUALIZATION 4 Hypervisor – specialized software which allows to create and operate virtual machines (VM). It manages physical computing resources sharing them among VM. Hardware Hypervisor VM VM VM VM VM
  • 5. VIRTUAL MACHINE – BASIC ELEMENT OF VIRTUALIZATION 5 Virtual Machine (VM) – isolated software environment that takes all necessary computing resources like CPU, RAM, HDD from hypervisor, which allows you to run different operating systems and applications on single host. Hardware Hypervisor Windows Server 2008 Windows Server 2012 Windows XP Windows 7 Windows 8
  • 6. TWO MOST COMMON TYPES OF VIRTUALIZATION 6 Server Virtualization Infrastructure Desktop Virtualization Infrastructure (VDI) Hardware Hypervisor Windows Server 2008 Windows Server 2012 Windows XP Windows 7 Windows 8
  • 7. VIRTUALIZATION BENEFITS FOR BUSINESS VMVM IT-COSTS REDUCTION FLEXIBLE MANAGEMENT RESOURCE OPTIMIZATION HARDWARE INDEPENDENCE 7
  • 8. ►VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS? GUEST OS IS THE SAME TARGET FOR MALWARE AS USUAL OS. FROM MALWARE STANDPOINT THERE IS NO DIFFERENCE BETWEEN VM AND REAL PC. FALSE ►CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES?FALSE MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 ►MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES?FALSE RESIDENT MALWARE CAN SECURITY IN VIRTUAL ENVIRONMENT 8
  • 9. SERVER VIRTUALIZATION USAGE 9 Security in Private and Public Datacenters 80% 75% 57% 50% 46% 3% 1% 67% 58% 45% 37% 34% 2% 4% 0% 20% 40% 60% 80% 100% Database applications E-mail applications CRM applications ERP applications Financial Management applications Other Hard to say Use in virtual environment Business critical among them Kaspersky Lab study | Base: 525 companies over Europe, 2012
  • 11. VIRTUAL SECURITY – THE OPTIONS 11 AGENTLESS NO PROTECTION LIGHT AGENT TRADITIONAL NOT AN OPTION! GREAT PROTECTION /INEFFICIENT IMPLEMENTATION EASY DEPLOY/MANAGE FOR VMWARE FEATURE-RICH SECURITY
  • 12. Each guest protects itself - All set of antimalware bases locally at every VM, separate kernel to scan every VM •Excessive resource consumption •Update storms •Instant-On gaps •Lower VM densities AGENT-BASED SECURITY
  • 13. •Keeps VM density (consolidation ratio) high •No problems of Agent- based security, but.. •Less security •Only VMware AGENTLESS SECURITY 13
  • 15. PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION LIGHT AGENT | FILE LEVEL PROTECTION 15 AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE
  • 16. LIGHT AGENT | NETWORK LEVEL PROTECTION 16 FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
  • 17. WEB CONTROL APPLICATION CONTROL DEVICE CONTROL LIGHT AGENT | CONTROLS 17
  • 18. 18 Internet vSphere Microsoft Hyper-V Linux-based hypervisor VDI for internal use Servers with conf info Test bed KSV KSV Endpoint Endpoint Kaspersky Security Center (KSC) KSV | Agentless Kaspersky Endpoint SecurityKSV | Light Agent REAL LIFE CASE – WHAT SOLUTION TO CHOOSE
  • 19. 19 WHAT OUR SOLUTION IS COMPRISED OF *NB!! Kaspersky Security for Virtualization is managed via Kaspersky Security Center
  • 20. WHO CAN BENEFIT THE MOST FROM USING KASPERSKY SECURITY FOR VIRTUALIZATION? 20 Enterprises Service Providers Multi-hypervisor infrastructure owners ..as well as SMB
  • 21. WHAT MAKES OUR SOLUTION DIFFERENT? 21 Low performance impact on virtual infrastructure, thanks to optimized architecture and dedicated virtual appliance for AV-scan tasks1. Better protection quality, thanks to wide range of protection components and technologies, including Anti-Malware, Automatic Exploit Prevention, Application Control, HIPS, Firewall, Network Attack Blocker, and URL Scan. Comprehensive solution supporting multiple hypervisor platforms (VMware, Citrix and Hyper-V), set of protection components with flexible configuration. Efficient deployment and management of the entire IT infrastructure security with Kaspersky Security Center unified management solution. 1 2 3 4 1 – read more at http://www.kaspersky.com/about/news/compare/2014/Kaspersky-Lab-Tops- Competitors-in-Testing-of-Security-Software-in-Virtual-Environments
  • 22. WANT TO KNOW MORE? Please visit kaspersky.com/business or business.kaspersky.com Follow us @KasperskyLabB2B #EnterpriseSec

Editor's Notes

  1. Чтобы добавить фон, нажмите на иконку в центре слайда и выберите файл. Изображение окажется над другими элементами слайда. Кликните на картинке правой кнопкой мыши и выберите опцию «send to back» («отправить назад»).
  2. Basically virtualization is the simulation of software and/or a hardware platform, which other software runs on.
  3. The hypervisor isolates the guests so that each guest only has access to its own resources.
  4. Actually there are many types of virtualization – application virtualization, storage virtualization, network virtualization, etc. But as we focused on platform/hardware virtualization there are the next main types:   Depending on the OS type inside VM distinguish Server virtualization – With server virtualization, you can create multiple virtual servers on a single host. It allows to save capital, floor space, and energy by consolidating multiple workloads onto fewer physical servers. The traditional server-per-workload paradigm ties up valuable capital, drains operational resources and is typically underutilized.   Desktop virtualization or a certain case of it - Virtual Desktop Infrastructure (VDI) - is a desktop-centric service that hosts user desktop environments on remote host, which are accessed over a network using a remote display protocol. A connection brokering service is used to connect users to their assigned desktop sessions. For users, this means they can access their desktop from any location, without being tied to a single client device. Since the resources are centralized, users moving between work locations can still access the same desktop environment with their applications and data.
  5. IT costs reduction: Server utilization raise up to 80% CapEx decrease by 50% OpEx decrease by 60% Reliability raise: Simplifying data backup and data recovery Automated disaster recovery scenarios Hardware independence Simplified management: Rapid launch of new services Easy-scalable IT infrastructure Centralization of management and monitoring tools
  6. There is a pervasive myth that virtual machines are inherently more secure than physical machines. The truth is that while virtual machines may be less prone to threats such as spyware and ransomware, they are just as vulnerable to malware in the form of malicious email attachments, drive-by-downloads, botnet Trojans and even targeted ‘spear-fishing’ attacks.
  7. Traditional, agent-based antimalware products are not well suited to virtualized environments. Virtualization is all about maximizing the utilization rates for the IT infrastructure – in order to maximize return on investment. However, agent-based antimalware products require the antivirus software and signature database to be installed on every virtual machine, which partly defeats the object of virtualization. Customer will experience serious issues with performance and security if he will use agent-based security software in virtualized environment: AV storm is the demand on computing resources that occurs when antimalware software simultaneously scans multiple guest virtual machines on a single physical host. In this context, the word "storm" means a bombardment or blitz. The result is degradation of service.   I/O storms – similar to a scanning storm, this may occur when all virtual machines with local signature database download updates simultaneously.   Duplication/redundancy – duplication of signature databases and redundant file scanning unnecessarily consumes valuable system resources.   Instant-on gaps Virtual machines can be easily taken off line and go dormant for long intervals. When they are brought back online (awakened), the virtual machines may have security gaps, such as unpatched software vulnerabilities and outdated virus signature databases.   VM sprawl and security visibility Virtual machines can be created in minutes, often without the IT department’s knowledge or consent. Visibility then becomes an issue; as security managers cannot protect virtual machines that they cannot see. Agent-based anti-virus in virtual environments, particularly in virtual desktops, can hamper ROI as it impedes the performance of the guest, limits the density of the virtual cluster and allows for unnecessary risk.
  8. Kaspersky Lab released its first dedicated solution for virtualization in early 2011. We were among the first vendors to support the VMware vShield – API that allows security vendors to seamlessly implement an “agentless” antimalware solution into VMware environments. Citrix and Microsoft don’t provide special APIs for security vendors to connect into hypervisor as VMware does (vShield API). That is why agentless security solution is not possible for non-VMware hypervisor.
  9. In 2014 KL presented a new approach for virtual environment protection. KSV | LA solution provides advanced anti-malware and network protection for virtual machines through a combination of a dedicated virtual appliance and small software agents (so called Light Agents) which are installed onto each persistent virtual machine or template. This architecture allows KL to bring efficient virtualization- security solutions to platforms without an agentless option – Citrix and Hyper-V while maintaining the performance advantages of a Virtualization-optimized solution against traditional agent-based solutions. Actically this approach gives better level of protection than VMware agentless technology – due to agents solution can apply all advanced endpoint protection – proactive technologies incl. exploit prevention; application and web controls; HIPS/firewall and more. This allows KSV LA to detect uncatchable for agentless solution malware – e.g. memory resident viruses.
  10. Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. WEB CONTROLS ALLOW INAPPROPRIATE INTERNET CONTENT – INCLUDING SOCIAL NETWORKS, MUSIC, VIDEO ETC - TO BE BLOCKED OR LIMITED DURING BUSINESS HOURS. APPLICATION CONTROLS REGULATE AND CONTROL THE OPENING OF PROGRAMS ON INDIVIDUAL VIRTUAL MACHINES. DEVICE CONTROLS PERMIT OR RESTRICT THE USE OF REMOVABLE DEVICES, INCLUDING EXTERNAL DRIVES, PRINTERS, CDS/DVDS, WI-FI OR BLUETOOTH.
  11. Kaspersky Lab solutions are highly effective at protecting highly heterogeneous infrastructures, managed centrally through a single console. In this example: VMware internal storage servers benefit from the density available through agentless security The Hyper-V platform environment enjoys advanced security and controls from a light-agent solution The Linux based test bed is protected by Kaspersky Security for Business.* Security for all three platforms is managed together with physical endpoint security through Kaspersky Security Center. * Kaspersky Endpoint Security for Business was deliberately designed to perform effectively in virtual as well as physical environments, so can play a valuable role in a multi-platform, multi-functional IT environment.
  12. NB!! In May 2014 the third technical version/generation of KSV | Agentless will be released. It means that starting from that time all applications inside the product will be in third version, so we can publicly tell that KSV product is in its third generation (though we do not use versioning of this product in basic materials).
  13. Midsize and enterprise customers who seek protection for on-premise or private cloud form the main Target Audience for Kaspersky Security for Virtualization. The product can also be effectively offered to data center and cloud-level businesses (or even to IaaS providers - they could offer value-added AV scanning and network protection as built-in security to their clients). With broad hypervisor coverage KSV will also be a strong solution for multi-hypervisor datacenters. The product provides simplified deployment and use – which is especially important for the companies with small IT teams. High scalability together with simplified management makes Kaspersky Security for Virtualization attractive to big companies as well. Actual research about preferences in multi-hypervisor datacenters http://wikibon.org/wiki/v/VMware_Dominant_in_Multi-Hypervisor_Data_Centers#Multi-Hypervisor_Impact_on_Cloud_Deployments