Trend Micro VForum Agentless Scanning Presentation

Marketing Director, ANZ at cognitive software group
Nov. 18, 2010
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
1 of 36

More Related Content

What's hot

PowerShell: The increased use of PowerShell in cyber attacksPowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksSymantec Security Response
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
DFIR Austin Training (Feb 2020): Remote Access & Deploying AgentsDFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
DFIR Austin Training (Feb 2020): Remote Access & Deploying AgentsChristopher Gerritz
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd

Similar to Trend Micro VForum Agentless Scanning Presentation

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
Post Wannacry UpdatePost Wannacry Update
Post Wannacry UpdateThomas Springer
FireEye Report.pptFireEye Report.ppt
FireEye Report.pptDubemJavapi
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK

More from Graeme Wood

TechCatalyst free assessment TechCatalyst free assessment
TechCatalyst free assessment Graeme Wood
TechCatalyst Corporate Overview TechCatalyst Corporate Overview
TechCatalyst Corporate Overview Graeme Wood
How does semantic technology work? How does semantic technology work?
How does semantic technology work? Graeme Wood
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service SegmentGraeme Wood
Ai and Legal Industy - Executive OverviewAi and Legal Industy - Executive Overview
Ai and Legal Industy - Executive OverviewGraeme Wood
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Graeme Wood

Recently uploaded

Knowledge Graphs and Generative AI_GraphSummit Minneapolis Sept 20.pptxKnowledge Graphs and Generative AI_GraphSummit Minneapolis Sept 20.pptx
Knowledge Graphs and Generative AI_GraphSummit Minneapolis Sept 20.pptxNeo4j
9C Monthly Newsletter - SEPT 20239C Monthly Newsletter - SEPT 2023
9C Monthly Newsletter - SEPT 2023PublishingTeam
GDSC ZHCET Google Study Jams 23.pdfGDSC ZHCET Google Study Jams 23.pdf
GDSC ZHCET Google Study Jams 23.pdfAbhishekSingh313342
Recommendation Modeling with Impression Data at NetflixRecommendation Modeling with Impression Data at Netflix
Recommendation Modeling with Impression Data at NetflixJiangwei Pan
Regain Supply Chain ControlRegain Supply Chain Control
Regain Supply Chain ControlConverge
Lesson 1 - Algorithm and Flowcharting.pdfLesson 1 - Algorithm and Flowcharting.pdf
Lesson 1 - Algorithm and Flowcharting.pdfROWELL MARQUINA

Trend Micro VForum Agentless Scanning Presentation

Editor's Notes

  1. .
  2. New security solutions can be developed and integrated into VMware virtual infrastructure Protect the VM by inspection of virtual components (CPU, Memory, Network and Storage) Provides an unprecedented level of security for the application and the data inside the VM Complete integration with, and awareness of VMotion, Storage VMotion, HA, etc.
  3. CPU/Memory Inspection Inspection of specific memory pages used by the VM or it applications Knowledge of the CPU state Policy enforcement through resource allocation of CPU and memory page Networking View all IO traffic on the host Ability to intercept, view, modify and replicate IO traffic from any one VM or all VM’s on a single host. Capability to provide inline or passive protection Storage Mount and read virtual disks (VMDK) Inspect IO read/writes to the storage devices Transparent to device & inline with ESX Storage stack