Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Kaspersky security for virtualization light agent launch presentation

1,082 views

Published on

Talk given by Andrew Potgieter, Director of Security Solutions, Westcon SA at ShapeBlue launch event, 4th July 2014

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Kaspersky security for virtualization light agent launch presentation

  1. 1. INTRODUCING: KASPERSKY SECURITY FORVIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIXVIRTUAL ENVIRONMENTS
  2. 2. FASTER DISASTER RECOVERY REDUCED IT COSTS OS MIGRATIONS STABILITYCENTRALIZED HW MANAGEMENT DATA SECURITY VMVM WHAT IS VIRTUALIZATION SUPPOSED TO BRING?
  3. 3. ►VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS? ‘IN 2012, 60% OFVIRTUALIZED SERVERSWILL BE LESS SECURE THANTHE PHYSICAL SERVERSTHEY REPLACE’ Gartner FALS E ►CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES ?FALS E MORCUT (AKA CRISIS),THE FIRSTTROJANTARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 ►MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES?FALS E RESIDENT MALWARE CAN VIRTUAL ENVIRONMENTS IMMUNITY: TRUE OR FALSE?
  4. 4. 1999 2001 2003 2005 2007 2009 2011 2013 THE GROWING MALWARE THREAT …
  5. 5. 4 CHOICES TO MAKE 5 AGENTLESS NO PROTECTION LIGHT AGENT TRADITION AL OPTIONS FOR VIRTUAL PROTECTIO N NOT AN OPTION! PROTECTION GAPS VMWARE SUPPORT ONLY SUPERIOR SECURITY
  6. 6. MALWARE CAN SURVIVE “TEAR-DOWN” OF NON- PERSISTENT MACHINES NO PROTECTION – NOT AN OPTION 6 VIRTUAL INFECTION AND SPREAD VIRTUAL EAVESDROPPING TARGET OF CYBERCRIMINALS
  7. 7. REDUCED CONSOLIDATION RATIOS TRADITIONAL PROTECTION APPLIED TO VIRTUAL ENVIRONMENTS 7 AV-STORMS REDUNDANT ANTI-MALWARE AND SIGNATURE FILES HIGHER BOOT LATENCY
  8. 8. VIRTUAL, PHYSICAL AND MOBILE - MANAGED THROUGH A SINGLE CONSOLE THE LIGHT AGENT APPROACH 8 OPTIMIZED PERFORMANCE THROUGH TIGHT HYPERVISOR INTEGRATION LIGHT AGENT ALLOWS IN-DEPTH INDIVIDUAL MACHINE SCANNING FOR MAXIMUM PROTECTION SEPARATE DEDICATED SECURITY VIRTUAL MACHINE HANDLES THE HEAVY WORK. HIGHLY SCALABLE FROM SMB TO LARGE ENTERPRISE ORGANIZATIONS
  9. 9. HOW KSV | LIGHT AGENT WORKS
  10. 10. SUPPORTS ALL KEY MICROSOFT AND CITRIX VIRTUALIZATION TECHNOLOGIES KSV | LIGHT AGENT HIGHLIGHTS 10 NO ADVERSE EFFECT ON HYPERVISOR PERFORMANCE FAST, STRAIGHTFORWARD DEPLOYMENT WITH NO REBOOTS CONTROLS LIMIT OR BLOCK TIME- AND SPACE- WASTING SOCIAL WEBSITES AND APPLICATIONS SHARED CACHE TECHNOLOGY AVOIDS UNNECESSARY RE-SCANNING
  11. 11. PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION FILE LEVEL PROTECTION 11 AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE
  12. 12. NETWORK LEVEL PROTECTION 12 FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
  13. 13. WEB CONTROL APPLICATION CONTROL DEVICE CONTROL CONTROLS
  14. 14. MANAGEMENT - KASPERSKY SECURITY CENTER 14 SINGLE INTUITIVE CONSOLE PHYSICAL, VIRTUAL AND MOBILE ENVIRONMENT MANAGED TOGETHER COMBINED VIRTUAL AND PHYSICAL MACHINE ADMINISTRATION AND REPORTING ‘SINGLE-PANE” APPROACH CREATES EFFICIENCY & SAVINGS FOR STRETCHED IT RESOURCES SCALABLE TO THE MOST COMPLEX ENTERPRISE ENVIRONMENTS
  15. 15. MICROSOFT HYPER-V AND CITRIX XEN SUPPORT 15 KEY SUPPORTED FEATURES: • DYNAMIC MEMORY • CLUSTER SHARED VOLUMES • LIVE BACKUP KEY SUPPORTED FEATURES: • DYNAMIC MEMORY CONTROL • VM PROTECTION & RECOVERY (VMPR) • XENMOTION (LIVE MIGRATION) • MULTI-STREAM ICA • CITRIX RECEIVER • PERSONAL VDISK A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS
  16. 16. A SINGLE LICENCE COVERS BOTH HYPER-V, XEN AND VMWARE (AGENTLESS) PLATFORMS FLEXIBLE LICENSING CHOOSE BETWEEN “PER-MACHINE” OR “PER-CORE” 16 ‘PER MACHINE’ –BASED ON MAXIMUM NUMBER OF ACTIVATED VIRTUAL MACHINES RUNNING CONCURRENTLY ‘PER CORE’ – COVERS ALL HARDWARE CORES ACROSS THE ORGANIZATION /DATA CENTER. ‘PER CORE’ - IDEAL FOR INFRASTRUCTURE AS A SERVICE (IAAS), WHERE VM COUNT FLUCTUATES
  17. 17. FLEXIBLE LICENSING - HOW IT WORKS 17 BAND: 1+ CORE KEY FILE: 1 TERM: 1, 2, 3 YEARS BAND: 1+ SERVERS | 10+ WORKSTATIONS KEY FILE: 1 TERM: 1, 2, 3 YEARS PER- CORE PER- MACHINE A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS Virtual Servers and Workstations •BASE •RENEWAL •CROSS-GRADE •EDUCATIONAL •PUBLIC SECTOR •GOVERNMENTAL EACH APPROACH APPLIES TO:
  18. 18. SIMPLIFIED MANAGEMENT ADVANCED FILE LEVEL PROTECTION NETWORK PROTECTION VIRTUAL MACHINE CONTROLS PERFORMANCE KSV | LIGHT AGENT IS:
  19. 19. KASPERSKY SECURITY FOR VIRTUALIZATION - LIGHT AGENT PROVIDES OUTSTANDING PROTECTION AND CONTROLS FOR HYPER-V AND XEN PLATFORMS AT FILE AND NETWORK LEVEL, WITHOUT COMPROMISING PERFORMANCE.
  20. 20. 20 KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION* 1 0% 20% 40% 60% 80% 100% 0 20 40 60 80 N of independent tests/ reviews ScoreofTOP3places Kaspersky Lab 1st places – 41 Participation in 79 tests/ reviews TOP3 = 77%Bitdefender Sophos G-Data Symantec F-Secure McAfee Trend Micro Avira Avast BullGuard AVG Eset AhnLab Microsoft Panda In 2013 Kaspersky Lab products participated in 79 independent tests and reviews. Our products were awarded 41 firsts and received 61 top-three finishes. * Notes: • According to summary result of independent test in 2013 for corporate, consumer and mobile products • Summary includes tests conducted by the following independent test labs and magazines: • Test labs: Anti-Malware.ru, AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, Tolly Group, VB100 • Magazines: CHIP Online, ComputerBild, Micro Hebdo, PC Magazine, PCWorld, PC Welt • The size of the bubble is number of 1st places © 2014 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners.
  21. 21. Contact Kaspersky or your preferred reseller for more information on Kaspersky’s virtualization security options THANK YOU!

×