SlideShare a Scribd company logo
INTRODUCING KASPERSKY SECURITY FOR VIRTUALIZATION
| LIGHT AGENT
Matvey Voytov
Product Marketing
VIRTUALIZATION BASICS
WHAT IS VIRTUALIZATION
3
HYPERVISOR – CORE OF VIRTUALIZATION
4
Hypervisor – specialized software which allows to create and operate virtual
machines (VM). It manages physical computing resources sharing them
among VM.
Hardware
Hypervisor
VM VM VM VM VM
VIRTUAL MACHINE – BASIC ELEMENT OF VIRTUALIZATION
5
Virtual Machine (VM) – isolated software environment that takes all
necessary computing resources like CPU, RAM, HDD from hypervisor, which
allows you to run different operating systems and applications on single host.
Hardware
Hypervisor
Windows
Server
2008
Windows
Server
2012
Windows
XP
Windows
7
Windows
8
TWO MOST COMMON TYPES OF VIRTUALIZATION
6
Server Virtualization
Infrastructure
Desktop Virtualization
Infrastructure (VDI)
Hardware
Hypervisor
Windows
Server
2008
Windows
Server
2012
Windows
XP
Windows
7
Windows
8
VIRTUALIZATION BENEFITS FOR BUSINESS
VMVM
IT-COSTS REDUCTION
FLEXIBLE MANAGEMENT
RESOURCE OPTIMIZATION
HARDWARE INDEPENDENCE
7
►VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN
PHYSICAL ENVIRONMENTS?
GUEST OS IS THE SAME TARGET FOR MALWARE AS USUAL OS. FROM
MALWARE STANDPOINT THERE IS NO DIFFERENCE BETWEEN VM AND
REAL PC.
FALSE
►CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES?FALSE
MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL
MACHINES, WAS IDENTIFIED IN 2012
►MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF
NON-PERSISTENT VIRTUAL MACHINES?FALSE
RESIDENT MALWARE CAN
SECURITY IN VIRTUAL ENVIRONMENT
8
SERVER VIRTUALIZATION USAGE
9 Security in Private and Public Datacenters
80%
75%
57%
50%
46%
3%
1%
67%
58%
45%
37%
34%
2%
4%
0% 20% 40% 60% 80% 100%
Database applications
E-mail applications
CRM applications
ERP applications
Financial Management
applications
Other
Hard to say
Use in virtual environment
Business critical among them
Kaspersky Lab study | Base: 525 companies over Europe, 2012
VIRTUALIZATION SECURITY SOLUTIONS
&
LIGHT AGENT APPROACH
VIRTUAL SECURITY – THE OPTIONS
11
AGENTLESS
NO PROTECTION
LIGHT AGENT
TRADITIONAL
NOT AN OPTION!
GREAT PROTECTION
/INEFFICIENT
IMPLEMENTATION
EASY
DEPLOY/MANAGE
FOR VMWARE
FEATURE-RICH
SECURITY
Each guest protects itself -
All set of antimalware
bases locally at every VM,
separate kernel to scan
every VM
•Excessive resource consumption
•Update storms
•Instant-On gaps
•Lower VM densities
AGENT-BASED SECURITY
•Keeps VM density
(consolidation ratio) high
•No problems of Agent-
based security, but..
•Less security
•Only VMware
AGENTLESS SECURITY
13
LIGHT AGENT SECURITY
14
PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT
PREVENTION
LIGHT AGENT | FILE LEVEL PROTECTION
15
AWARD-WINNING ANTI-MALWARE ENGINE
REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY
SECURITY NETWORK CLOUD-BASED INTELLIGENCE
DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL,
PROTECTING AGAINST THE MOST ADVANCED MALWARE
LIGHT AGENT | NETWORK LEVEL PROTECTION
16
FEATURES HOST-BASED INTRUSION PROVENSION
SYSTEM (HIPS) AND FIREWALL
NETWORK ATTACK BLOCKER IDENTIFIES AND
RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR
IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
WEB CONTROL
APPLICATION CONTROL
DEVICE CONTROL
LIGHT AGENT | CONTROLS
17
18
Internet
vSphere Microsoft
Hyper-V
Linux-based
hypervisor
VDI for internal use Servers with conf info Test bed
KSV KSV
Endpoint Endpoint
Kaspersky
Security Center (KSC)
KSV | Agentless Kaspersky Endpoint SecurityKSV | Light Agent
REAL LIFE CASE – WHAT SOLUTION TO CHOOSE
19
WHAT OUR SOLUTION IS COMPRISED OF
*NB!! Kaspersky Security for Virtualization is managed via Kaspersky Security Center
WHO CAN BENEFIT THE MOST FROM USING KASPERSKY
SECURITY FOR VIRTUALIZATION?
20
Enterprises
Service Providers
Multi-hypervisor
infrastructure owners
..as well as SMB
WHAT MAKES OUR SOLUTION DIFFERENT?
21
Low performance impact on virtual infrastructure, thanks to optimized
architecture and dedicated virtual appliance for AV-scan tasks1.
Better protection quality, thanks to wide range of protection components
and technologies, including Anti-Malware, Automatic Exploit Prevention,
Application Control, HIPS, Firewall, Network Attack Blocker, and URL Scan.
Comprehensive solution supporting multiple hypervisor platforms (VMware,
Citrix and Hyper-V), set of protection components with flexible configuration.
Efficient deployment and management of the entire IT infrastructure
security with Kaspersky Security Center unified management solution.
1
2
3
4
1 – read more at http://www.kaspersky.com/about/news/compare/2014/Kaspersky-Lab-Tops-
Competitors-in-Testing-of-Security-Software-in-Virtual-Environments
WANT TO KNOW MORE?
Please visit kaspersky.com/business or business.kaspersky.com
Follow us @KasperskyLabB2B
#EnterpriseSec

More Related Content

What's hot

OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introduction
openstackindia
 
Container Security
Container SecurityContainer Security
Container Security
Amazon Web Services
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & How
Aniekan Akpaffiong
 
OpenTelemetry Introduction
OpenTelemetry Introduction OpenTelemetry Introduction
OpenTelemetry Introduction
DimitrisFinas1
 
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
Open Source Consulting
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험
NHN FORWARD
 
Introduction To OpenStack
Introduction To OpenStackIntroduction To OpenStack
Introduction To OpenStack
Haim Ateya
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
Robert Bohne
 
An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017
Haim Ateya
 
IPFS: A Whole New World
IPFS: A Whole New WorldIPFS: A Whole New World
IPFS: A Whole New World
ArcBlock
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
apidays
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
Mhmud Khraibene
 
Storwize v5000
Storwize v5000Storwize v5000
Storwize v5000
liembkeb
 
Red Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptxRed Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptx
ssuser18b1c6
 
OpenStack Tutorial
OpenStack TutorialOpenStack Tutorial
OpenStack Tutorial
Bret Piatt
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
Datapath Consulting
 
OpenShift Container Platform 4.12 Release Notes
OpenShift Container Platform 4.12 Release NotesOpenShift Container Platform 4.12 Release Notes
OpenShift Container Platform 4.12 Release Notes
GerryJamisola1
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
Fernando564134
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Rui Miguel Feio
 

What's hot (20)

OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introduction
 
Container Security
Container SecurityContainer Security
Container Security
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & How
 
OpenTelemetry Introduction
OpenTelemetry Introduction OpenTelemetry Introduction
OpenTelemetry Introduction
 
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
[오픈테크넷서밋2022] 국내 PaaS(Kubernetes) Best Practice 및 DevOps 환경 구축 사례.pdf
 
[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험[2018] 오픈스택 5년 운영의 경험
[2018] 오픈스택 5년 운영의 경험
 
Introduction To OpenStack
Introduction To OpenStackIntroduction To OpenStack
Introduction To OpenStack
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
 
An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017An Intrudction to OpenStack 2017
An Intrudction to OpenStack 2017
 
IPFS: A Whole New World
IPFS: A Whole New WorldIPFS: A Whole New World
IPFS: A Whole New World
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Storwize v5000
Storwize v5000Storwize v5000
Storwize v5000
 
Red Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptxRed Hat Openshift Fundamentals.pptx
Red Hat Openshift Fundamentals.pptx
 
OpenStack Tutorial
OpenStack TutorialOpenStack Tutorial
OpenStack Tutorial
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 
OpenShift Container Platform 4.12 Release Notes
OpenShift Container Platform 4.12 Release NotesOpenShift Container Platform 4.12 Release Notes
OpenShift Container Platform 4.12 Release Notes
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 

Viewers also liked

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
Kaspersky
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
Kaspersky
 
The Empire Strikes Back
The Empire Strikes BackThe Empire Strikes Back
The Empire Strikes Back
Kaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
Kirill Kertsenbaum
 
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Expolink
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
Kaspersky
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
 
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsDotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
Azul Systems Inc.
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
ShapeBlue
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
Spiceworks Ziff Davis
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
Onwubiko Emmanuel
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Kirill Kertsenbaum
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
Citrix
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 

Viewers also liked (20)

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
The Empire Strikes Back
The Empire Strikes BackThe Empire Strikes Back
The Empire Strikes Back
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
Лаборатория Касперского. Алексей Киселев. "Противостояние современным DDoS-ат...
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie EnvironmentsDotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
DotCMS Bootcamp: Enabling Java in Latency Sensitivie Environments
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 

Similar to Introducing Kaspersky Security for Virtualization - Light Agent

Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
Tjylen Veselyj
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
ALAMGIR HOSSAIN
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
Kevin Wharram
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
rajsandhu1989
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
Aruj Thirawat
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
Srinivasa Rao
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
NeenaReji1
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
Erin Banks
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
Yogeshwaran R
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
vivekbhat
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
Morty Eisen
 
Virtualization
VirtualizationVirtualization
Virtualization
kousardiffi
 

Similar to Introducing Kaspersky Security for Virtualization - Light Agent (20)

Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Virtualization
VirtualizationVirtualization
Virtualization
 

More from Kaspersky

A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
Kaspersky
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Kaspersky
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Kaspersky
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Kaspersky
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Kaspersky
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
Kaspersky
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Kaspersky
 
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Kaspersky
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Kaspersky
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Kaspersky
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Kaspersky
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Kaspersky
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Kaspersky
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Kaspersky
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
Kaspersky
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Kaspersky
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Kaspersky
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Kaspersky
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Kaspersky
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Kaspersky
 

More from Kaspersky (20)

A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
 
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
 

Recently uploaded

Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
Edward Blurock
 
Saint Louis University diploma
Saint Louis University diplomaSaint Louis University diploma
Saint Louis University diploma
eufdev
 
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docxBitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
SFC Today
 
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
paridubey2024#G05
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
Bangladesh Network Operators Group
 
Best Skills to Learn for Freelancing.pdf
Best Skills to Learn for Freelancing.pdfBest Skills to Learn for Freelancing.pdf
Best Skills to Learn for Freelancing.pdf
Million-$-Knowledge {Million Dollar Knowledge}
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
Thierry TROUIN ☁
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
eufdev
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
exgf28
 
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
Dolphin Data Lab
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
shamrisumri
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
Preston University
 
Best CSS Animation Libraries for Web Developers
Best CSS Animation Libraries for Web DevelopersBest CSS Animation Libraries for Web Developers
Best CSS Animation Libraries for Web Developers
Shrestha Raaz
 
Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
Bangladesh Network Operators Group
 
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
dilbaagsingh0898
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
adelewhite125
 
DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33
APNIC
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
exchangeid32
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
AirtoryInc
 
Trump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirtsTrump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirts
exgf28
 

Recently uploaded (20)

Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
 
Saint Louis University diploma
Saint Louis University diplomaSaint Louis University diploma
Saint Louis University diploma
 
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docxBitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
 
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
Kolkata @Girls @Call WhatsApp Numbers 🫦0000XX0000🫦 List For Friendship Girls ...
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
 
Best Skills to Learn for Freelancing.pdf
Best Skills to Learn for Freelancing.pdfBest Skills to Learn for Freelancing.pdf
Best Skills to Learn for Freelancing.pdf
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
 
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
 
Best CSS Animation Libraries for Web Developers
Best CSS Animation Libraries for Web DevelopersBest CSS Animation Libraries for Web Developers
Best CSS Animation Libraries for Web Developers
 
Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
 
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
 
DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33DASH, presented by Elly Tawhai at PacNOG 33
DASH, presented by Elly Tawhai at PacNOG 33
 
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In IndiaLordsexch ID: An Ultimate Online Cricket ID Provider In India
Lordsexch ID: An Ultimate Online Cricket ID Provider In India
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
 
Trump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirtsTrump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirts
 

Introducing Kaspersky Security for Virtualization - Light Agent

  • 1. INTRODUCING KASPERSKY SECURITY FOR VIRTUALIZATION | LIGHT AGENT Matvey Voytov Product Marketing
  • 4. HYPERVISOR – CORE OF VIRTUALIZATION 4 Hypervisor – specialized software which allows to create and operate virtual machines (VM). It manages physical computing resources sharing them among VM. Hardware Hypervisor VM VM VM VM VM
  • 5. VIRTUAL MACHINE – BASIC ELEMENT OF VIRTUALIZATION 5 Virtual Machine (VM) – isolated software environment that takes all necessary computing resources like CPU, RAM, HDD from hypervisor, which allows you to run different operating systems and applications on single host. Hardware Hypervisor Windows Server 2008 Windows Server 2012 Windows XP Windows 7 Windows 8
  • 6. TWO MOST COMMON TYPES OF VIRTUALIZATION 6 Server Virtualization Infrastructure Desktop Virtualization Infrastructure (VDI) Hardware Hypervisor Windows Server 2008 Windows Server 2012 Windows XP Windows 7 Windows 8
  • 7. VIRTUALIZATION BENEFITS FOR BUSINESS VMVM IT-COSTS REDUCTION FLEXIBLE MANAGEMENT RESOURCE OPTIMIZATION HARDWARE INDEPENDENCE 7
  • 8. ►VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS? GUEST OS IS THE SAME TARGET FOR MALWARE AS USUAL OS. FROM MALWARE STANDPOINT THERE IS NO DIFFERENCE BETWEEN VM AND REAL PC. FALSE ►CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES?FALSE MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 ►MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES?FALSE RESIDENT MALWARE CAN SECURITY IN VIRTUAL ENVIRONMENT 8
  • 9. SERVER VIRTUALIZATION USAGE 9 Security in Private and Public Datacenters 80% 75% 57% 50% 46% 3% 1% 67% 58% 45% 37% 34% 2% 4% 0% 20% 40% 60% 80% 100% Database applications E-mail applications CRM applications ERP applications Financial Management applications Other Hard to say Use in virtual environment Business critical among them Kaspersky Lab study | Base: 525 companies over Europe, 2012
  • 11. VIRTUAL SECURITY – THE OPTIONS 11 AGENTLESS NO PROTECTION LIGHT AGENT TRADITIONAL NOT AN OPTION! GREAT PROTECTION /INEFFICIENT IMPLEMENTATION EASY DEPLOY/MANAGE FOR VMWARE FEATURE-RICH SECURITY
  • 12. Each guest protects itself - All set of antimalware bases locally at every VM, separate kernel to scan every VM •Excessive resource consumption •Update storms •Instant-On gaps •Lower VM densities AGENT-BASED SECURITY
  • 13. •Keeps VM density (consolidation ratio) high •No problems of Agent- based security, but.. •Less security •Only VMware AGENTLESS SECURITY 13
  • 15. PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION LIGHT AGENT | FILE LEVEL PROTECTION 15 AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE
  • 16. LIGHT AGENT | NETWORK LEVEL PROTECTION 16 FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
  • 17. WEB CONTROL APPLICATION CONTROL DEVICE CONTROL LIGHT AGENT | CONTROLS 17
  • 18. 18 Internet vSphere Microsoft Hyper-V Linux-based hypervisor VDI for internal use Servers with conf info Test bed KSV KSV Endpoint Endpoint Kaspersky Security Center (KSC) KSV | Agentless Kaspersky Endpoint SecurityKSV | Light Agent REAL LIFE CASE – WHAT SOLUTION TO CHOOSE
  • 19. 19 WHAT OUR SOLUTION IS COMPRISED OF *NB!! Kaspersky Security for Virtualization is managed via Kaspersky Security Center
  • 20. WHO CAN BENEFIT THE MOST FROM USING KASPERSKY SECURITY FOR VIRTUALIZATION? 20 Enterprises Service Providers Multi-hypervisor infrastructure owners ..as well as SMB
  • 21. WHAT MAKES OUR SOLUTION DIFFERENT? 21 Low performance impact on virtual infrastructure, thanks to optimized architecture and dedicated virtual appliance for AV-scan tasks1. Better protection quality, thanks to wide range of protection components and technologies, including Anti-Malware, Automatic Exploit Prevention, Application Control, HIPS, Firewall, Network Attack Blocker, and URL Scan. Comprehensive solution supporting multiple hypervisor platforms (VMware, Citrix and Hyper-V), set of protection components with flexible configuration. Efficient deployment and management of the entire IT infrastructure security with Kaspersky Security Center unified management solution. 1 2 3 4 1 – read more at http://www.kaspersky.com/about/news/compare/2014/Kaspersky-Lab-Tops- Competitors-in-Testing-of-Security-Software-in-Virtual-Environments
  • 22. WANT TO KNOW MORE? Please visit kaspersky.com/business or business.kaspersky.com Follow us @KasperskyLabB2B #EnterpriseSec

Editor's Notes

  1. Чтобы добавить фон, нажмите на иконку в центре слайда и выберите файл. Изображение окажется над другими элементами слайда. Кликните на картинке правой кнопкой мыши и выберите опцию «send to back» («отправить назад»).
  2. Basically virtualization is the simulation of software and/or a hardware platform, which other software runs on.
  3. The hypervisor isolates the guests so that each guest only has access to its own resources.
  4. Actually there are many types of virtualization – application virtualization, storage virtualization, network virtualization, etc. But as we focused on platform/hardware virtualization there are the next main types:   Depending on the OS type inside VM distinguish Server virtualization – With server virtualization, you can create multiple virtual servers on a single host. It allows to save capital, floor space, and energy by consolidating multiple workloads onto fewer physical servers. The traditional server-per-workload paradigm ties up valuable capital, drains operational resources and is typically underutilized.   Desktop virtualization or a certain case of it - Virtual Desktop Infrastructure (VDI) - is a desktop-centric service that hosts user desktop environments on remote host, which are accessed over a network using a remote display protocol. A connection brokering service is used to connect users to their assigned desktop sessions. For users, this means they can access their desktop from any location, without being tied to a single client device. Since the resources are centralized, users moving between work locations can still access the same desktop environment with their applications and data.
  5. IT costs reduction: Server utilization raise up to 80% CapEx decrease by 50% OpEx decrease by 60% Reliability raise: Simplifying data backup and data recovery Automated disaster recovery scenarios Hardware independence Simplified management: Rapid launch of new services Easy-scalable IT infrastructure Centralization of management and monitoring tools
  6. There is a pervasive myth that virtual machines are inherently more secure than physical machines. The truth is that while virtual machines may be less prone to threats such as spyware and ransomware, they are just as vulnerable to malware in the form of malicious email attachments, drive-by-downloads, botnet Trojans and even targeted ‘spear-fishing’ attacks.
  7. Traditional, agent-based antimalware products are not well suited to virtualized environments. Virtualization is all about maximizing the utilization rates for the IT infrastructure – in order to maximize return on investment. However, agent-based antimalware products require the antivirus software and signature database to be installed on every virtual machine, which partly defeats the object of virtualization. Customer will experience serious issues with performance and security if he will use agent-based security software in virtualized environment: AV storm is the demand on computing resources that occurs when antimalware software simultaneously scans multiple guest virtual machines on a single physical host. In this context, the word "storm" means a bombardment or blitz. The result is degradation of service.   I/O storms – similar to a scanning storm, this may occur when all virtual machines with local signature database download updates simultaneously.   Duplication/redundancy – duplication of signature databases and redundant file scanning unnecessarily consumes valuable system resources.   Instant-on gaps Virtual machines can be easily taken off line and go dormant for long intervals. When they are brought back online (awakened), the virtual machines may have security gaps, such as unpatched software vulnerabilities and outdated virus signature databases.   VM sprawl and security visibility Virtual machines can be created in minutes, often without the IT department’s knowledge or consent. Visibility then becomes an issue; as security managers cannot protect virtual machines that they cannot see. Agent-based anti-virus in virtual environments, particularly in virtual desktops, can hamper ROI as it impedes the performance of the guest, limits the density of the virtual cluster and allows for unnecessary risk.
  8. Kaspersky Lab released its first dedicated solution for virtualization in early 2011. We were among the first vendors to support the VMware vShield – API that allows security vendors to seamlessly implement an “agentless” antimalware solution into VMware environments. Citrix and Microsoft don’t provide special APIs for security vendors to connect into hypervisor as VMware does (vShield API). That is why agentless security solution is not possible for non-VMware hypervisor.
  9. In 2014 KL presented a new approach for virtual environment protection. KSV | LA solution provides advanced anti-malware and network protection for virtual machines through a combination of a dedicated virtual appliance and small software agents (so called Light Agents) which are installed onto each persistent virtual machine or template. This architecture allows KL to bring efficient virtualization- security solutions to platforms without an agentless option – Citrix and Hyper-V while maintaining the performance advantages of a Virtualization-optimized solution against traditional agent-based solutions. Actically this approach gives better level of protection than VMware agentless technology – due to agents solution can apply all advanced endpoint protection – proactive technologies incl. exploit prevention; application and web controls; HIPS/firewall and more. This allows KSV LA to detect uncatchable for agentless solution malware – e.g. memory resident viruses.
  10. Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. WEB CONTROLS ALLOW INAPPROPRIATE INTERNET CONTENT – INCLUDING SOCIAL NETWORKS, MUSIC, VIDEO ETC - TO BE BLOCKED OR LIMITED DURING BUSINESS HOURS. APPLICATION CONTROLS REGULATE AND CONTROL THE OPENING OF PROGRAMS ON INDIVIDUAL VIRTUAL MACHINES. DEVICE CONTROLS PERMIT OR RESTRICT THE USE OF REMOVABLE DEVICES, INCLUDING EXTERNAL DRIVES, PRINTERS, CDS/DVDS, WI-FI OR BLUETOOTH.
  11. Kaspersky Lab solutions are highly effective at protecting highly heterogeneous infrastructures, managed centrally through a single console. In this example: VMware internal storage servers benefit from the density available through agentless security The Hyper-V platform environment enjoys advanced security and controls from a light-agent solution The Linux based test bed is protected by Kaspersky Security for Business.* Security for all three platforms is managed together with physical endpoint security through Kaspersky Security Center. * Kaspersky Endpoint Security for Business was deliberately designed to perform effectively in virtual as well as physical environments, so can play a valuable role in a multi-platform, multi-functional IT environment.
  12. NB!! In May 2014 the third technical version/generation of KSV | Agentless will be released. It means that starting from that time all applications inside the product will be in third version, so we can publicly tell that KSV product is in its third generation (though we do not use versioning of this product in basic materials).
  13. Midsize and enterprise customers who seek protection for on-premise or private cloud form the main Target Audience for Kaspersky Security for Virtualization. The product can also be effectively offered to data center and cloud-level businesses (or even to IaaS providers - they could offer value-added AV scanning and network protection as built-in security to their clients). With broad hypervisor coverage KSV will also be a strong solution for multi-hypervisor datacenters. The product provides simplified deployment and use – which is especially important for the companies with small IT teams. High scalability together with simplified management makes Kaspersky Security for Virtualization attractive to big companies as well. Actual research about preferences in multi-hypervisor datacenters http://wikibon.org/wiki/v/VMware_Dominant_in_Multi-Hypervisor_Data_Centers#Multi-Hypervisor_Impact_on_Cloud_Deployments