How Security can maximise your Virtualisation
ROI

  Name
  Title, Date
                     Copyright 2009 Trend Micro Inc.   1
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   2
The Evolving Datacenter
  Lowering Costs, Increasing Flexibility                                             Public Cloud




                                     Private Cloud



                  Virtual


  Physical                                                                         Select enterprise
                                                                                   applications in
                                                                                   public cloud

              Servers virtualized with   Servers virtualized in
               minimal changes to         scalable, shared,
               datacenter processes       automated & elastic
Traditional
                                          environment
 datacenter

                                             Copyright 2009 Trend Micro Inc.   3
Securing Cloud Computing Securing…
Pillars of the Cloud is About
        Virtualisation                                                       Highly Mobile Devices


 Cloud Infrastructure                                                             Endpoint
                                                                                  Revolution
    Dynamic Data Center with                                                   Ubiquitous, Borderless
    Shared System, Share Storage                                               Data Access, Data Everywhere
                                    Hybrid Cloud
                                    Management
                                      Security
                                      That Fits
   Shared Data Storage                                                        Application Platform


      Cloud Data                                                            Cloud Application

 Ownership of Data vs. Computing                                           New Platform for New Apps. Example,
 Confidentiality & Access Control                                          Web Defacing, SQL Injection

                                         Copyright 2009 Trend Micro Inc.
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   5
The Dynamic Datacenter

88% of North American enterprises                   2012, 60% of virtualized servers.. less
[no] virtualization security strategy               secure than… physical servers….
Forrester Research / Info Week                      “Addressing the Most Common Security Risks in Data Center
                                                    Virtualization Projects” Gartner, 25 January 2010




                                  Physical   Virtual                              Cloud




  Technologies and practices for
                                                                   Number one concern (87.5%)
  securing physical servers won’t
                                                                   about cloud services is security.
  provide sufficient protections for VMs.                          Frank Gens, IDC, Senior VP & Chief Analyst
  Neil MacDonald, Gartner, June 2009


                                                Copyright 2009 Trend Micro Inc.
Security: the #1 Cloud Challenge
Security and privacy were the foremost concerns by far, with a weighted
score higher than the next three (performance, immaturity and regulatory
compliance) combined.




       Gartner (April 2010)
                                   Copyright 2009 Trend Micro Inc.   7
Assessing Risk in the Cloud Journey
        IT Production   Business Production                                   ITaaS



                                                                              Data destruction    12


                                                                                 Multi-tenancy    11

                                                                          Diminished perimeter    10


                                                                 Data access & governance         9


                                                          Data confidentiality & integrity        8


                                                        Compliance / Lack of audit trail          7


                                                                Complexity of Management          6


                                                                          Resource contention     5


                                                                          Mixed trust level VMs   4

                                                                               Instant-on gaps    3


                                                                               Inter-VM attacks   2


                                                            Host controls under-deployed          1
                                        Copyright 2009 Trend Micro Inc.

08-31
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   9
VMware Solutions for IT as a Service

               End User Computing




• Secure

• Manageable                                                      Management,
               Cloud Application Platform                           Security,
                                                                  Compliance.
• Open



               Cloud Infrastructure
               and Management




                                Copyright 2009 Trend Micro Inc.
vShield Security
Securing the Private Cloud End to End: from the Edge to the Endpoint
                                                                                         vShield App 1.0 and
   vShield Edge 1.0               vShield Endpoint 1.0
                                                                                                Zones
 Edge                          Endpoint = VM                                           Security Zone
  Secure the edge of             Enables offloaded anti-virus                          Application protection from
  the virtual datacenter                                                               network based threats

               Virtual Datacenter 1                                                          Virtual Datacenter 2
                                                            VMware                                                     VMware
   DMZ           PCI                       HIPAA            vShield                    Web                      View   vShield

               compliant                 compliant




                                      VMware vShield Manager




                                                     Copyright 2009 Trend Micro Inc.
VMware and Trend Micro have partnered to deliver
                the first and only agentless anti-virus solution
        architected for VMware virtualized datacenters and desktops.


•   Enable our customers to maximize the benefits of virtualization,
•   Securely accelerating the journey to the cloud
•   Trend FIRST to partner with VMware to fully leverage the new vShield
    EndPoint platform


“While their competitors talk about virtualization, Trend Micro is leading the way
with product”                                                                 Sept 3, 2010




                                       12   Copyright 2009 Trend Micro Inc.
Agentless Anti-Virus Overview
   These are the key “building blocks” for VMware customers


                                   Agent-less Anti-Virus for VMware
The idea
                                         Protection for virtualized
                                         desktops and datacenters




                                                                              Trend Micro
The components                   VMware
                                                                             Deep Security
                             vShield Endpoint
                                                                             Anti-malware

                       Enables offloading of antivirus  A virtual appliance that detects
                       processing to Trend Micro Deep and blocks malware (web threats,
                       Security Anti-malware – a        viruses & worms, Trojans).
                       dedicated, security-hardened VM.



Customer
Benefits         Higher                Faster                                 Better         Stronger
              Consolidation         Performance                       Manageability          Security

Differ-
entiator   The first and only agentless anti-virus solution architected for VMware

                                                 13   Copyright 2009 Trend Micro Inc.
Protection beyond Anti-Malware
Beyond providing Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers

                                       DEEP SECURITY
                                                   Agentless
                                                                1
vShield                                                             Detects and blocks malware (web threats,
                                       Anti-Malware                 viruses & worms, Trojans). (PCI*)
Endpoint

                                                   Agentless
                                                                2 Detects and blocks known and zero-day
                                IDS / IPS                           attacks that target vulnerabilities (PCI*)
VMsafe
APIs                            Web Application Protection          Shields web application vulnerabilities (PCI*)
                                                                    Provides increased visibility into, or control
                                Application Control
                                                                    over, applications accessing the network
                                Firewall                            Reduces attack surface. Prevents DoS &
                                                                    detects reconnaissance scans (PCI*)

                                                Agent-based
                                                                3
                                                                    Detects malicious and unauthorized changes
                               Integrity Monitoring
                                                                    to directories, files, registry keys. (PCI*)

                                                Agent-based
                                                                4
                                      Log Inspection                Optimizes the identification of important
                                                                    security events buried in log entries. (PCI*)

    (PCI*): Helps address one or more PCI Data Security Standards and other compliance
                                                   14 Copyright 2009 Trend Micro Inc.

    requirements
Benefits that Matter to Customers

• Higher consolidation                                   Now, with Deep Security 7.5
  − Inefficient operations removed                       AV
                                                         Virtual          VM   VM   VM   VM
• Faster performance                                     Appliance

  − Freedom from AV Storms
• Better manageability
  − No agents to configure,
    update & patch
• Stronger security                                      Previously
  − Instant ON protection
  − Tamper-proofing                                         VM                 VM        VM




                                     Copyright 2009 Trend Micro Inc. 15
Deep Security enables higher VM densities
 • SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle
   more than 25 desktop VMs/host
 • DS supports 2-3 times no. of desktop VMs/host than traditional AV
 • DS supports 40-60% more server VMs/host than traditional AV


             CPU                                                                          IOPS
  Symantec     Trend   McAfee                                                   Symantec     Trend    McAfee

                                                                                 2143
                       307%                                                                           2053
                                                                                  %
                                                                                                       %
  273%




                                                                                           692%
             81%




 Symantec    Trend     McAfee                                                  Symantec    Trend     McAfee


             Scheduled scan resource usage over baseline – 50 VMs per host
                                             Copyright 2009 Trend Micro Inc.
Data Security Challenges in the Cloud
Encryption rarely used:
                                                                                              Name: John Doe
- Who can see your information?                                                               SSN: 425-79-0053
                                                                                              Visa #: 4456-8732…




Storage volumes and servers are mobile:
- Where is your data? Has it moved?


Rogue servers might access data:                                                                                   Name: John Doe
- Who is attaching to your storage?
                                                                                                                   SSN: 425-79-0053
                                                                                                                   Visa #: 4456-8732…
Audit and alerting modules lacking:
- What happened when you weren’t looking?


Encryption keys tied to vendor:
- Are you locked into a single security solution?
  Who has access to your keys?


Storage volumes contain residual data:
- Are your storage devices recycled securely?




                                           Classification 4/5/2011   Copyright 2009 Trend Micro Inc. 19
Protection at the Data Level
  Encryption designed to secure the cloud




                        Copyright 2009 Trend Micro Inc.
Identity and Integrity are paramount

Identity - “Is it mine?”                   Integrity - “Is it OK?”
 • Mounted data store                         • Firewall
 • Location                                   • AV
 • Start-up time                              • Self integrity check
 • Embedded keys                              • Deep Security




 Auto or Manual rules based key approval



                                     Copyright 2009 Trend Micro Inc. 21
Trend Micro Mapped Along the Journey
        IT Production   Business Production                                 ITaaS


                                                                         Data destruction   12

                                                                           Multi-tenancy    11

                                                            Diminished perimeter            10

                                               Data access & governance                     9

                                       Data confidentiality & integrity                     8

                                                         Mixed Trust Level VMs              7

                                             Complexity of Management                       6

                                                              Resource contention           5

                                      Compliance / Lack of audit trail                      4

                                                                         Instant-on gaps    3

                                                                         Inter-VM attacks   2

                                        Host controls under-deployed
                                       Copyright 2009 Trend Micro Inc.
                                                                                            1
08-31
Trend Micro: Server Security Leadership
 IDC Market Analysis: Worldwide Corporate Server Security Market Share

                                            Trend Micro
                                               22.9%




                                        All Others
                                          77.1%


These products are generally more robust than desktop endpoint security
 and are available for a much wider set of operating systems (Windows, Unix, and Linux).
This category also includes products that are designed to protect hypervisors and virtual
servers.”                                                        Source: Worldwide Endpoint Security 2010-2014
                                                                         Forecast and 2009 Vendor Shares, IDC

                                                     Copyright 2009 Trend Micro Inc. 23
Improves Security                                 Improves Virtualization
                                                           by providing security solutions
       by providing the most
                                                            architected to fully leverage
secure virtualization infrastructure,
                                                                the VMware platform
with APIs, and certification programs


The most comprehensive suite of next-generation,
virtualization security solutions:

  Virtual appliance- and guest-based

  Tightly integrated with, and leverages,
     VMware APIs and technologies.

 Architected to fully leverage the VMware platform
     for delivering better-than-physical security.
                                        Copyright 2009 Trend Micro Inc.
                                                                          24
Thank you from Trend Micro
            Copyright 2009 Trend Micro Inc.

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance

  • 1.
    How Security canmaximise your Virtualisation ROI Name Title, Date Copyright 2009 Trend Micro Inc. 1
  • 2.
    The journey tothe cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 2
  • 3.
    The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud Virtual Physical Select enterprise applications in public cloud Servers virtualized with Servers virtualized in minimal changes to scalable, shared, datacenter processes automated & elastic Traditional environment datacenter Copyright 2009 Trend Micro Inc. 3
  • 4.
    Securing Cloud ComputingSecuring… Pillars of the Cloud is About Virtualisation Highly Mobile Devices Cloud Infrastructure Endpoint Revolution Dynamic Data Center with Ubiquitous, Borderless Shared System, Share Storage Data Access, Data Everywhere Hybrid Cloud Management Security That Fits Shared Data Storage Application Platform Cloud Data Cloud Application Ownership of Data vs. Computing New Platform for New Apps. Example, Confidentiality & Access Control Web Defacing, SQL Injection Copyright 2009 Trend Micro Inc.
  • 5.
    The journey tothe cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 5
  • 6.
    The Dynamic Datacenter 88%of North American enterprises 2012, 60% of virtualized servers.. less [no] virtualization security strategy secure than… physical servers…. Forrester Research / Info Week “Addressing the Most Common Security Risks in Data Center Virtualization Projects” Gartner, 25 January 2010 Physical Virtual Cloud Technologies and practices for Number one concern (87.5%) securing physical servers won’t about cloud services is security. provide sufficient protections for VMs. Frank Gens, IDC, Senior VP & Chief Analyst Neil MacDonald, Gartner, June 2009 Copyright 2009 Trend Micro Inc.
  • 7.
    Security: the #1Cloud Challenge Security and privacy were the foremost concerns by far, with a weighted score higher than the next three (performance, immaturity and regulatory compliance) combined. Gartner (April 2010) Copyright 2009 Trend Micro Inc. 7
  • 8.
    Assessing Risk inthe Cloud Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Compliance / Lack of audit trail 7 Complexity of Management 6 Resource contention 5 Mixed trust level VMs 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed 1 Copyright 2009 Trend Micro Inc. 08-31
  • 9.
    The journey tothe cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 9
  • 10.
    VMware Solutions forIT as a Service End User Computing • Secure • Manageable Management, Cloud Application Platform Security, Compliance. • Open Cloud Infrastructure and Management Copyright 2009 Trend Micro Inc.
  • 11.
    vShield Security Securing thePrivate Cloud End to End: from the Edge to the Endpoint vShield App 1.0 and vShield Edge 1.0 vShield Endpoint 1.0 Zones Edge Endpoint = VM Security Zone Secure the edge of Enables offloaded anti-virus Application protection from the virtual datacenter network based threats Virtual Datacenter 1 Virtual Datacenter 2 VMware VMware DMZ PCI HIPAA vShield Web View vShield compliant compliant VMware vShield Manager Copyright 2009 Trend Micro Inc.
  • 12.
    VMware and TrendMicro have partnered to deliver the first and only agentless anti-virus solution architected for VMware virtualized datacenters and desktops. • Enable our customers to maximize the benefits of virtualization, • Securely accelerating the journey to the cloud • Trend FIRST to partner with VMware to fully leverage the new vShield EndPoint platform “While their competitors talk about virtualization, Trend Micro is leading the way with product” Sept 3, 2010 12 Copyright 2009 Trend Micro Inc.
  • 13.
    Agentless Anti-Virus Overview These are the key “building blocks” for VMware customers Agent-less Anti-Virus for VMware The idea Protection for virtualized desktops and datacenters Trend Micro The components VMware Deep Security vShield Endpoint Anti-malware Enables offloading of antivirus A virtual appliance that detects processing to Trend Micro Deep and blocks malware (web threats, Security Anti-malware – a viruses & worms, Trojans). dedicated, security-hardened VM. Customer Benefits Higher Faster Better Stronger Consolidation Performance Manageability Security Differ- entiator The first and only agentless anti-virus solution architected for VMware 13 Copyright 2009 Trend Micro Inc.
  • 14.
    Protection beyond Anti-Malware Beyondproviding Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers DEEP SECURITY Agentless 1 vShield Detects and blocks malware (web threats, Anti-Malware viruses & worms, Trojans). (PCI*) Endpoint Agentless 2 Detects and blocks known and zero-day IDS / IPS attacks that target vulnerabilities (PCI*) VMsafe APIs Web Application Protection Shields web application vulnerabilities (PCI*) Provides increased visibility into, or control Application Control over, applications accessing the network Firewall Reduces attack surface. Prevents DoS & detects reconnaissance scans (PCI*) Agent-based 3 Detects malicious and unauthorized changes Integrity Monitoring to directories, files, registry keys. (PCI*) Agent-based 4 Log Inspection Optimizes the identification of important security events buried in log entries. (PCI*) (PCI*): Helps address one or more PCI Data Security Standards and other compliance 14 Copyright 2009 Trend Micro Inc. requirements
  • 15.
    Benefits that Matterto Customers • Higher consolidation Now, with Deep Security 7.5 − Inefficient operations removed AV Virtual VM VM VM VM • Faster performance Appliance − Freedom from AV Storms • Better manageability − No agents to configure, update & patch • Stronger security Previously − Instant ON protection − Tamper-proofing VM VM VM Copyright 2009 Trend Micro Inc. 15
  • 16.
    Deep Security enableshigher VM densities • SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle more than 25 desktop VMs/host • DS supports 2-3 times no. of desktop VMs/host than traditional AV • DS supports 40-60% more server VMs/host than traditional AV CPU IOPS Symantec Trend McAfee Symantec Trend McAfee 2143 307% 2053 % % 273% 692% 81% Symantec Trend McAfee Symantec Trend McAfee Scheduled scan resource usage over baseline – 50 VMs per host Copyright 2009 Trend Micro Inc.
  • 17.
    Data Security Challengesin the Cloud Encryption rarely used: Name: John Doe - Who can see your information? SSN: 425-79-0053 Visa #: 4456-8732… Storage volumes and servers are mobile: - Where is your data? Has it moved? Rogue servers might access data: Name: John Doe - Who is attaching to your storage? SSN: 425-79-0053 Visa #: 4456-8732… Audit and alerting modules lacking: - What happened when you weren’t looking? Encryption keys tied to vendor: - Are you locked into a single security solution? Who has access to your keys? Storage volumes contain residual data: - Are your storage devices recycled securely? Classification 4/5/2011 Copyright 2009 Trend Micro Inc. 19
  • 18.
    Protection at theData Level Encryption designed to secure the cloud Copyright 2009 Trend Micro Inc.
  • 19.
    Identity and Integrityare paramount Identity - “Is it mine?” Integrity - “Is it OK?” • Mounted data store • Firewall • Location • AV • Start-up time • Self integrity check • Embedded keys • Deep Security Auto or Manual rules based key approval Copyright 2009 Trend Micro Inc. 21
  • 20.
    Trend Micro MappedAlong the Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Mixed Trust Level VMs 7 Complexity of Management 6 Resource contention 5 Compliance / Lack of audit trail 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed Copyright 2009 Trend Micro Inc. 1 08-31
  • 21.
    Trend Micro: ServerSecurity Leadership IDC Market Analysis: Worldwide Corporate Server Security Market Share Trend Micro 22.9% All Others 77.1% These products are generally more robust than desktop endpoint security and are available for a much wider set of operating systems (Windows, Unix, and Linux). This category also includes products that are designed to protect hypervisors and virtual servers.” Source: Worldwide Endpoint Security 2010-2014 Forecast and 2009 Vendor Shares, IDC Copyright 2009 Trend Micro Inc. 23
  • 22.
    Improves Security Improves Virtualization by providing security solutions by providing the most architected to fully leverage secure virtualization infrastructure, the VMware platform with APIs, and certification programs The most comprehensive suite of next-generation, virtualization security solutions:  Virtual appliance- and guest-based  Tightly integrated with, and leverages, VMware APIs and technologies.  Architected to fully leverage the VMware platform for delivering better-than-physical security. Copyright 2009 Trend Micro Inc. 24
  • 23.
    Thank you fromTrend Micro Copyright 2009 Trend Micro Inc.