1©2018 VMware, Inc.
Flipping the Script-
Imagining a New Security
Model
Robert Ames
Senior Director, National Technology Strategy
Vmware Research
rames@vmware.com
2©2018 VMware, Inc.
Perimeter Security is Eroded
Device
Choice
Apps
Everywhere
Flexible
Workstyles
©2018 VMware, Inc.
Our approach is not working
Security investments are increasing, yet the cost of breaches are rising faster
3
IT Spend Security Spend Security Breaches
Annual Cost of Security
Breaches: $445B
(Source: Center for Strategic and Int’l
Studies)
Security as a % of IT
Spend:
2012: 11%
2015: 21 %
(Source: Forrester)
Projected Growth Rate
in IT Spend from 2014-
2019: Zero (Flat)
(Source: Gartner)
4©2018 VMware, Inc.
Cyber Hygiene
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
Transforming Security – A Comprehensive Approach
5©2018 VMware, Inc.
Cyber Hygiene
Integrated Ecosystem
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
StorageNetwork ComputeDevicesUsers
Workspace ONE AirWatch
Secure Infrastructure
5
6©2018 VMware, Inc.
Situational Awareness
Context
Governance
Compliance
Building a Secure End-to-End Infrastructure
Micro-segmentation
VPN
Secure end user
VM-level encryption
Encrypted vMotion
Multi-factor
authentication
Data at rest encryption
Cluster-level key mgmt
Hardware agnostic (no self-
encrypting drives)
7©2018 VMware, Inc.
Cyber Hygiene
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
The Partner Ecosystem
8©2018 VMware, Inc.
The Crowded Cyber Solution Ecosystem
9©2018 VMware, Inc.
Rationalize The Ecosystem And Deliver Tight Integration
Compute
Infrastructure
Network
Infrastructure
Networking
& Security
Services
Orchestration
& Management
Platforms
Operations &
Visibility
vRealize
Automation
vCloud
Directo
r
vRealize
Orchestrato
r
VIO
vSAN
Ready Node
10©2018 VMware, Inc.
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
Cyber Hygiene
Cyber Hygiene
10
11©2018 VMware, Inc.
Reduce the Attack Surface – Cyber Hygiene
Apps Data
EncryptionMicro-
Segmentation
PatchingLeast
Privilege
Multi-Factor
Authentication
Attack Surface
Attacks
12©2018 VMware, Inc.
Using Hypervisor to Enforce the Intended State – Learn, Lock and Adapt
Learn
VM Manifest
VM Manifest
VM Manifest
Intended
State Engine
vCenter ESX
App
Scope
Off-the-shelf apps
OTS
Software
Database
Custom apps
CI/CD pipeline
[Provisioning systems]
[Automation frameworks]Machine Learning
Capture & Analyze
Protect
Processes
Processes
Processes
OS
AppDefense
Monitor
Protected Zone
VM Manifest
Detect
Snapshot Suspend
Block/Alarm
Quarantine Network Blocking
Service Insertion
Respond&
Compute Network
13©2018 VMware, Inc.
Thank You

Flipping the Script & Changing the Game in Cyber

  • 1.
    1©2018 VMware, Inc. Flippingthe Script- Imagining a New Security Model Robert Ames Senior Director, National Technology Strategy Vmware Research rames@vmware.com
  • 2.
    2©2018 VMware, Inc. PerimeterSecurity is Eroded Device Choice Apps Everywhere Flexible Workstyles
  • 3.
    ©2018 VMware, Inc. Ourapproach is not working Security investments are increasing, yet the cost of breaches are rising faster 3 IT Spend Security Spend Security Breaches Annual Cost of Security Breaches: $445B (Source: Center for Strategic and Int’l Studies) Security as a % of IT Spend: 2012: 11% 2015: 21 % (Source: Forrester) Projected Growth Rate in IT Spend from 2014- 2019: Zero (Flat) (Source: Gartner)
  • 4.
    4©2018 VMware, Inc. CyberHygiene Secure Infrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem Transforming Security – A Comprehensive Approach
  • 5.
    5©2018 VMware, Inc. CyberHygiene Integrated Ecosystem Secure Infrastructure StorageNetwork ComputeDevicesUsers StorageNetwork ComputeDevicesUsers Workspace ONE AirWatch Secure Infrastructure 5
  • 6.
    6©2018 VMware, Inc. SituationalAwareness Context Governance Compliance Building a Secure End-to-End Infrastructure Micro-segmentation VPN Secure end user VM-level encryption Encrypted vMotion Multi-factor authentication Data at rest encryption Cluster-level key mgmt Hardware agnostic (no self- encrypting drives)
  • 7.
    7©2018 VMware, Inc. CyberHygiene Secure Infrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem The Partner Ecosystem
  • 8.
    8©2018 VMware, Inc. TheCrowded Cyber Solution Ecosystem
  • 9.
    9©2018 VMware, Inc. RationalizeThe Ecosystem And Deliver Tight Integration Compute Infrastructure Network Infrastructure Networking & Security Services Orchestration & Management Platforms Operations & Visibility vRealize Automation vCloud Directo r vRealize Orchestrato r VIO vSAN Ready Node
  • 10.
    10©2018 VMware, Inc. SecureInfrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem Cyber Hygiene Cyber Hygiene 10
  • 11.
    11©2018 VMware, Inc. Reducethe Attack Surface – Cyber Hygiene Apps Data EncryptionMicro- Segmentation PatchingLeast Privilege Multi-Factor Authentication Attack Surface Attacks
  • 12.
    12©2018 VMware, Inc. UsingHypervisor to Enforce the Intended State – Learn, Lock and Adapt Learn VM Manifest VM Manifest VM Manifest Intended State Engine vCenter ESX App Scope Off-the-shelf apps OTS Software Database Custom apps CI/CD pipeline [Provisioning systems] [Automation frameworks]Machine Learning Capture & Analyze Protect Processes Processes Processes OS AppDefense Monitor Protected Zone VM Manifest Detect Snapshot Suspend Block/Alarm Quarantine Network Blocking Service Insertion Respond& Compute Network
  • 13.