SlideShare a Scribd company logo
1 of 37
Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Tuesday, November 27, 12
My
                                  Friends


                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                  Friends
                                                   My	
  Stuff!

                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                    Friends
                                                     My	
  Stuff!

                                    My Apps
                           Threat
                             My
                             Life     My
                                               My
                                              Work
                                     Stuff




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust




   Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust
   v Our systems cannot protect us from unknown threats




   Bromium Confidential

Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Protect the system
                           core by isolating it
                               completely




Tuesday, November 27, 12
Decouple execution        Protect the system
  dependencies into mutually   core by isolating it
       distrustful tasks           completely




Tuesday, November 27, 12
Decouple execution         Protect the system
  dependencies into mutually    core by isolating it
       distrustful tasks            completely



    Control communication
   between all tasks and with
       the outside world




Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access
   to data & resources, based
       on “least privilege”

Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access        Never trust
   to data & resources, based    information from an
       on “least privilege”       untrustworthy task

Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
10

Tuesday, November 27, 12
Tiny code base for
                               Bromium
       maximum security        Microvisor   I/O MMU (VT-d)

                                            TXT & TPM based
                                            hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                    10

Tuesday, November 27, 12
Bromium Micro-virtualization

       Isolate vulnerable                             Lightweight, fast,
    tasks within a single                             hidden, with an
       Windows desktop                                unchanged native UX

       Tiny code base for
                                    Bromium
       maximum security             Microvisor        I/O MMU (VT-d)

                                                      TXT & TPM based
                                                      hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                          10

Tuesday, November 27, 12
Tuesday, November 27, 12
Windows	
  and	
  IT	
  
       provisioned	
  apps	
  
          are	
  trusted



                                  Apps OS	
  Libs Kernel




Tuesday, November 27, 12
The	
  Microvisor	
  isolates	
  
                                vulnerable	
  tasks	
  from	
  
                               Windows,	
  each	
  other	
  &	
  
                                key	
  system	
  resources

                                                       Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor
                                                                             Each	
  vulnerable	
  task	
  is	
  
                                                                              instantly	
  isolated	
  in	
  a	
  
                                                                             micro-­‐VM,	
  invisible	
  to	
  




                                                          Hypercall	
  API
                           Apps OS	
  Libs Kernel                                      the	
  user




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Tuesday, November 27, 12

More Related Content

Viewers also liked

Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4producmultimedia3
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en públicoEmagister
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Andris Soroka
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна ГраусоваSergey Korobov
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXLuis Rodríguez
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 

Viewers also liked (12)

nandini.resume
nandini.resumenandini.resume
nandini.resume
 
Gr9Presentation
Gr9PresentationGr9Presentation
Gr9Presentation
 
Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en público
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна Граусова
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOX
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
CV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_RoyCV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_Roy
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 

More from Gigaom

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanGigaom
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceGigaom
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsGigaom
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionGigaom
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryGigaom
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Gigaom
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Gigaom
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovGigaom
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Gigaom
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Gigaom
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherGigaom
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadGigaom
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Gigaom
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathGigaom
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellGigaom
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteGigaom
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013Gigaom
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013Gigaom
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013Gigaom
 

More from Gigaom (20)

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe Weinman
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - Rackspace
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey results
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad Competition
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshop
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - Battery
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

SECURE EVERYTHING from Structure 2012

  • 5. My Friends My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 6. My Friends My  Stuff! My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 7. My Friends My  Stuff! My Apps Threat My Life My My Work Stuff Tuesday, November 27, 12
  • 11. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 12. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 14. v We have to enter domains of unfathomable trust Bromium Confidential Tuesday, November 27, 12
  • 15. v We have to enter domains of unfathomable trust v Our systems cannot protect us from unknown threats Bromium Confidential Tuesday, November 27, 12
  • 16. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 17. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 20. Protect the system core by isolating it completely Tuesday, November 27, 12
  • 21. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Tuesday, November 27, 12
  • 22. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Tuesday, November 27, 12
  • 23. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access to data & resources, based on “least privilege” Tuesday, November 27, 12
  • 24. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access Never trust to data & resources, based information from an on “least privilege” untrustworthy task Tuesday, November 27, 12
  • 26. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 28. Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 29. Bromium Micro-virtualization Isolate vulnerable Lightweight, fast, tasks within a single hidden, with an Windows desktop unchanged native UX Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 31. Windows  and  IT   provisioned  apps   are  trusted Apps OS  Libs Kernel Tuesday, November 27, 12
  • 32. The  Microvisor  isolates   vulnerable  tasks  from   Windows,  each  other  &   key  system  resources Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12
  • 33. Microvisor Each  vulnerable  task  is   instantly  isolated  in  a   micro-­‐VM,  invisible  to   Hypercall  API Apps OS  Libs Kernel the  user Tuesday, November 27, 12
  • 34. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 35. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 36. Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12