SlideShare a Scribd company logo
Copyright @ Bitdefender 2014 
27-Oct-14 1 
Page 1 
27 October 2014 | Copyright @ Bitdefender 2014 
GravityZone Enterprise 
High Availability and scalability for your 
datacenter security 
Andrei IONESCU| Professional Services Engineer
Copyright @ Bitdefender 2014 
Agenda 
27-Oct-14 2 
Page 2 
1. Introduction 
2. Architecture 
3. High Availability GravityZone Architecture 
4. Easy Management with Control Center 
5. Security for Virtualized Environments 
6. Agentless protection with VMware vSphere 
7. Traditional Agent vs. Agentless 
8. Hypervisor-agnostic security for complex datacenters 
9. Security for Endpoints 
10. Security for Mobile Devices 
11. Case study – Customer 1 
12. Case study – Customer 2 
13. Case study – Customer 3 
14. Q&A
Copyright @ Bitdefender 2014 
27-Oct-14 3 
Page 3 
Introduction 
Bitdefender GravityZone addresses the needs of the most demanding 
enterprises by providing cross-platform security for physical desktops and 
servers, virtualized endpoints and mobile devices.
Copyright @ Bitdefender 2014 
27-Oct-14 4 
Page 4 
Architecture
Copyright @ Bitdefender 2014 
27-Oct-14 5 
Page 5 
GravityZone All-in-One Architecture
Copyright @ Bitdefender 2014 
27-Oct-14 6 
Page 6 
High Availability GravityZone Architecture
Copyright @ Bitdefender 2014 
27-Oct-14 7 
Page 7 
Easy Management with Control Center 
Web based console that allows administrators to manage the security for 
physical, virtualized, and mobile environments. 
 Microsoft Active Directory integration 
 Multiple VMware vCenter integration 
 Multiple XenServer integration
Copyright @ Bitdefender 2014 
27-Oct-14 8 
Page 8 
Security for Virtualized Environments 
Provides security that is build specifically for the virtualized environments 
allowing organizations to maintain higher consolidation ratios across their 
datacenters. 
 Compatible with VMware ESXi, Citrix Xen, Microsoft Hyper-V, Red Hat 
KVM, Oracle VM 
 Integrates with vShield Endpoint 5 for agentless antimalware 
 Supports Windows and Linux VMs
Copyright @ Bitdefender 2014 
27-Oct-14 9 
Page 9 
Traditional Agent vs. Agentless
Copyright @ Bitdefender 2014 
27-Oct-14 10 
Page 10 
Agentless protection with VMware vSphere 
 Tightly integrated with 
VMware vShield Endpoint 
EPSEC API 
 VMware vCenter integrated 
management for unified 
visibility 
 Bitdefender Tools 
• Extends coverage to non- 
Windows environments. 
• Provides deep 
introspection capabilities: 
file systems, processes and 
memory
Copyright @ Bitdefender 2014 
 Universal platform coverage - full support for any hypervisor: 
VMware, Citrix, Microsoft, Red Hat, KVM, Oracle, or any other virtualization. 
27-Oct-14 11 
Page 11 
Hypervisor-agnostic security for complex 
datacenters 
 Protects virtualized desktops 
and servers running on: 
Windows & Linux 
 Pre-trained, self-learning 
cache mechanisms 
 Centralized antimalware 
for improved performance 
 Security Server redundancy
Copyright @ Bitdefender 2014 
27-Oct-14 12 
Page 12 
Security for Endpoints 
Protects any number of Windows/MacOS laptops, desktops and servers. To 
protect your physical computers with Security for Endpoints, you must install 
Endpoint Security (the client software) on each of them. 
Includes the following modules: 
 Antimalware 
 Firewall 
 Content Control 
(web access, application control)
Copyright @ Bitdefender 2014 
27-Oct-14 13 
Page 13 
Security for Mobile Devices 
Unifies enterprise-wide security with management and compliance control of 
iPhone, iPad and Android devices by providing simple software and update 
distribution via Apple or Android marketplaces. 
Security features include: 
 screen lock 
 authentication control 
 device location 
 remote wipe 
 detection of rooted or jailbroken devices 
 security profiles. 
On Android devices the security level is enhanced with 
real-time scanning and removable media encryption.
Copyright @ Bitdefender 2014 
27-Oct-14 14 
Page 14 
Case study – Customer 1 
Customer 1 is a leading distribution services and e-commerce provider for 
the global travel industry. 
GravityZone is used by Customer 1 to protect all physical endpoints 
organization-wide and all running VMs running in all 2 datacenters world-wide. 
Datacenters vCenter Servers Number of 
Clusters 
Number of VMs Number of 
physical machines 
Location A 2 59 5463 5470 
Location B 1 4
Copyright @ Bitdefender 2014 
27-Oct-14 15 
Page 15 
Case study – Customer 1
Copyright @ Bitdefender 2014 
27-Oct-14 16 
Page 16 
Case study – Customer 1 
GravityZone Virtual Appliance vCPUs RAM Memory Storage 
GravityZone VA-1 (Database, Update, Web Console, 
Communication) 
8 12 GB 80 GB 
GravityZone VA-2 (Web Console, Communication) 8 8 GB 80 GB 
GravityZone VA-3 (Load Balancer) 2 2 GB 80 GB 
vCenter Servers Clusters Number # VMs Security Servers 
Total 3 63 Clusters 5463 VMs 32 SS
Copyright @ Bitdefender 2014 
27-Oct-14 17 
Page 17 
Case study – Customer 2 
Customer 2 is a bank from US operating over 260 branches. 
GravityZone is used by Customer 2 to protect all physical endpoints 
organization-wide and all running VMs running in all 2 datacenters. 
Datacenters vCenter Servers Number of Hosts Number of VMs Number of physical 
machines/ATM 
Location A 1 64 1641 1700 
Location B 1 30
Copyright @ Bitdefender 2014 
27-Oct-14 18 
Page 18 
Case study – Customer 2
Copyright @ Bitdefender 2014 
Server Role Managed Endpoints vCPUs RAM Memory Storage 
Web Console <5,000 2 2 GB 40 GB 
Communication Server <5,000 2 2 GB 10 GB 
Database Server <5,000 2 4 GB 40 GB 
Update Server <5,000 1 1 GB 10 GB 
27-Oct-14 19 
Page 19 
Case study – Customer 2 
vCenter Servers Cluster Number # VMs Security Servers 
Total 2 13 Clusters 1641 VMs 24 SS
Copyright @ Bitdefender 2014 
27-Oct-14 20 
Page 20 
Case study – Customer 3 
Customer 3 is a leader in secure cloud hosting. 
GravityZone is used by Customer 3 to protect all the VMware cloud 
infrastructure in all 5 datacenters (70% Linux based and 30% Windows 
based virtual machines).
Copyright @ Bitdefender 2014 
27-Oct-14 21 
Page 21 
Case study – Customer 3
Copyright @ Bitdefender 2014 
Server Role Managed Endpoints vCPUs RAM Memory Storage 
Web Console <20,000 6 6 GB 80 GB 
Communication Server <20,000 6 6 GB 80 GB 
Database Server <20,000 3 8 GB 80 GB 
Update Server <20,000 1 2 GB 80 GB 
27-Oct-14 22 
Page 22 
Case study – Customer 3 
vCenter Servers Hosts Number # VMs Security Servers 
Total 20 450 Hosts ~20000 VMs 114 SS
Copyright @ Bitdefender 2014 
27-Oct-14 23 
Page 23 
Copyright @ Bitdefender 2014 
www.bitdefender.com/enterprise 
Twitter: @virt_sec 
LinkedIn: www.linkedin.com/bitdefenderenterprise 
Thank you! 
Q&A

More Related Content

What's hot

Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
team-WIBU
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
Bitdefender Enterprise
 
Introduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisorIntroduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisor
Viller Hsiao
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
Kaspersky
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Trend Micro
 
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времениПрезентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
journalrubezh
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
SecPod: A Framework for Virtualization-based Security Systems
SecPod: A Framework for Virtualization-based Security SystemsSecPod: A Framework for Virtualization-based Security Systems
SecPod: A Framework for Virtualization-based Security Systems
Yue Chen
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
Sylvain Martinez
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
Mirco Vanini
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
Mirco Vanini
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
Mirco Vanini
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knox
Javier Gonzalez
 

What's hot (15)

Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Introduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisorIntroduction to ARM mbed-OS 3.0 uvisor
Introduction to ARM mbed-OS 3.0 uvisor
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времениПрезентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
Презентация компании KiwiSecurity. Анализ видеосъемки в режиме реального времени
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
 
SecPod: A Framework for Virtualization-based Security Systems
SecPod: A Framework for Virtualization-based Security SystemsSecPod: A Framework for Virtualization-based Security Systems
SecPod: A Framework for Virtualization-based Security Systems
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knox
 

Viewers also liked

Elaine Tindill-Rohr DIY Zombie
Elaine Tindill-Rohr DIY ZombieElaine Tindill-Rohr DIY Zombie
Elaine Tindill-Rohr DIY Zombie
PaintedPersonalities
 
Daniel's diary
Daniel's diaryDaniel's diary
Daniel's diary
emily_rust
 
Daniel's diary
Daniel's diaryDaniel's diary
Daniel's diary
emily_rust
 
Off cycle order fee (2)
Off cycle order fee (2)Off cycle order fee (2)
Off cycle order fee (2)
Anna Mickell
 
LOAD 2014 - Prezentare Zitec - Microsoft
LOAD 2014 - Prezentare Zitec - MicrosoftLOAD 2014 - Prezentare Zitec - Microsoft
LOAD 2014 - Prezentare Zitec - MicrosoftSilviu Cojocaru
 
LAOD 2014 - Prezenter FINkers United
LAOD 2014 - Prezenter FINkers UnitedLAOD 2014 - Prezenter FINkers United
LAOD 2014 - Prezenter FINkers United
Silviu Cojocaru
 
LOAD 2014 - Prezentare Spearhead
LOAD 2014 - Prezentare SpearheadLOAD 2014 - Prezentare Spearhead
LOAD 2014 - Prezentare SpearheadSilviu Cojocaru
 
Elizabeth's journal
Elizabeth's journalElizabeth's journal
Elizabeth's journal
emily_rust
 
Linux2 lap trinhshellchohocvien
Linux2 lap trinhshellchohocvienLinux2 lap trinhshellchohocvien
Linux2 lap trinhshellchohocvienasakebigone
 
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalam
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalamJurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalam
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalamsharifahmunirah1002
 
Slides Lập trình mạng
Slides Lập trình mạngSlides Lập trình mạng
Slides Lập trình mạngasakebigone
 

Viewers also liked (13)

Elaine Tindill-Rohr DIY Zombie
Elaine Tindill-Rohr DIY ZombieElaine Tindill-Rohr DIY Zombie
Elaine Tindill-Rohr DIY Zombie
 
Daniel's diary
Daniel's diaryDaniel's diary
Daniel's diary
 
Daniel's diary
Daniel's diaryDaniel's diary
Daniel's diary
 
TUGASAN 1: ANALISIS JURNAL
TUGASAN 1: ANALISIS JURNALTUGASAN 1: ANALISIS JURNAL
TUGASAN 1: ANALISIS JURNAL
 
Off cycle order fee (2)
Off cycle order fee (2)Off cycle order fee (2)
Off cycle order fee (2)
 
LOAD 2014 - Prezentare Zitec - Microsoft
LOAD 2014 - Prezentare Zitec - MicrosoftLOAD 2014 - Prezentare Zitec - Microsoft
LOAD 2014 - Prezentare Zitec - Microsoft
 
LAOD 2014 - Prezenter FINkers United
LAOD 2014 - Prezenter FINkers UnitedLAOD 2014 - Prezenter FINkers United
LAOD 2014 - Prezenter FINkers United
 
LOAD 2014 - Prezentare Spearhead
LOAD 2014 - Prezentare SpearheadLOAD 2014 - Prezentare Spearhead
LOAD 2014 - Prezentare Spearhead
 
Elizabeth's journal
Elizabeth's journalElizabeth's journal
Elizabeth's journal
 
Linux2 lap trinhshellchohocvien
Linux2 lap trinhshellchohocvienLinux2 lap trinhshellchohocvien
Linux2 lap trinhshellchohocvien
 
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalam
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalamJurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalam
Jurnal: kesedaran, penilaian dan penerimaan e pembelajaran dalam
 
Slides Lập trình mạng
Slides Lập trình mạngSlides Lập trình mạng
Slides Lập trình mạng
 
TUGASAN 3
TUGASAN 3TUGASAN 3
TUGASAN 3
 

Similar to LOAD 2014-Prezentare BitDefender

Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
Bunmi Sowande
 
VMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Developer-Ready Transformation
VMware Developer-Ready Transformation
VMware Tanzu
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
Aruj Thirawat
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
Yitao Cen
 
Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014
Citrix
 
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Principled Technologies
 
vProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryvProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recovery
Pawel Maczka
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
princescorpio
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
Icomm Technologies
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
VMware Tanzu
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integration
VMUG IT
 
2014 08-21 Citrix cloud works with a single management platform technical web...
2014 08-21 Citrix cloud works with a single management platform technical web...2014 08-21 Citrix cloud works with a single management platform technical web...
2014 08-21 Citrix cloud works with a single management platform technical web...
Citrix
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Netgear Italia
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
csharney
 
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
VMUG IT
 
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
Lee Bushen
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
 
Security gateway
Security gatewaySecurity gateway
Security gateway
Melvin174623
 

Similar to LOAD 2014-Prezentare BitDefender (20)

Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
VMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Developer-Ready Transformation
VMware Developer-Ready Transformation
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
 
Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014Citrix Cloud Master Class June 2014
Citrix Cloud Master Class June 2014
 
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
Multi-feature VDI comparison: VMware Horizon View 5.2 vs. Citrix XenDesktop 7
 
vProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryvProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recovery
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integration
 
2014 08-21 Citrix cloud works with a single management platform technical web...
2014 08-21 Citrix cloud works with a single management platform technical web...2014 08-21 Citrix cloud works with a single management platform technical web...
2014 08-21 Citrix cloud works with a single management platform technical web...
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
 
V Mworld 2010 Lab Cloud
V Mworld 2010 Lab CloudV Mworld 2010 Lab Cloud
V Mworld 2010 Lab Cloud
 
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
 
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
XenDesktop Master Class - Live Installation of XenDesktop/XenApp 7.6
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Security gateway
Security gatewaySecurity gateway
Security gateway
 

LOAD 2014-Prezentare BitDefender

  • 1. Copyright @ Bitdefender 2014 27-Oct-14 1 Page 1 27 October 2014 | Copyright @ Bitdefender 2014 GravityZone Enterprise High Availability and scalability for your datacenter security Andrei IONESCU| Professional Services Engineer
  • 2. Copyright @ Bitdefender 2014 Agenda 27-Oct-14 2 Page 2 1. Introduction 2. Architecture 3. High Availability GravityZone Architecture 4. Easy Management with Control Center 5. Security for Virtualized Environments 6. Agentless protection with VMware vSphere 7. Traditional Agent vs. Agentless 8. Hypervisor-agnostic security for complex datacenters 9. Security for Endpoints 10. Security for Mobile Devices 11. Case study – Customer 1 12. Case study – Customer 2 13. Case study – Customer 3 14. Q&A
  • 3. Copyright @ Bitdefender 2014 27-Oct-14 3 Page 3 Introduction Bitdefender GravityZone addresses the needs of the most demanding enterprises by providing cross-platform security for physical desktops and servers, virtualized endpoints and mobile devices.
  • 4. Copyright @ Bitdefender 2014 27-Oct-14 4 Page 4 Architecture
  • 5. Copyright @ Bitdefender 2014 27-Oct-14 5 Page 5 GravityZone All-in-One Architecture
  • 6. Copyright @ Bitdefender 2014 27-Oct-14 6 Page 6 High Availability GravityZone Architecture
  • 7. Copyright @ Bitdefender 2014 27-Oct-14 7 Page 7 Easy Management with Control Center Web based console that allows administrators to manage the security for physical, virtualized, and mobile environments.  Microsoft Active Directory integration  Multiple VMware vCenter integration  Multiple XenServer integration
  • 8. Copyright @ Bitdefender 2014 27-Oct-14 8 Page 8 Security for Virtualized Environments Provides security that is build specifically for the virtualized environments allowing organizations to maintain higher consolidation ratios across their datacenters.  Compatible with VMware ESXi, Citrix Xen, Microsoft Hyper-V, Red Hat KVM, Oracle VM  Integrates with vShield Endpoint 5 for agentless antimalware  Supports Windows and Linux VMs
  • 9. Copyright @ Bitdefender 2014 27-Oct-14 9 Page 9 Traditional Agent vs. Agentless
  • 10. Copyright @ Bitdefender 2014 27-Oct-14 10 Page 10 Agentless protection with VMware vSphere  Tightly integrated with VMware vShield Endpoint EPSEC API  VMware vCenter integrated management for unified visibility  Bitdefender Tools • Extends coverage to non- Windows environments. • Provides deep introspection capabilities: file systems, processes and memory
  • 11. Copyright @ Bitdefender 2014  Universal platform coverage - full support for any hypervisor: VMware, Citrix, Microsoft, Red Hat, KVM, Oracle, or any other virtualization. 27-Oct-14 11 Page 11 Hypervisor-agnostic security for complex datacenters  Protects virtualized desktops and servers running on: Windows & Linux  Pre-trained, self-learning cache mechanisms  Centralized antimalware for improved performance  Security Server redundancy
  • 12. Copyright @ Bitdefender 2014 27-Oct-14 12 Page 12 Security for Endpoints Protects any number of Windows/MacOS laptops, desktops and servers. To protect your physical computers with Security for Endpoints, you must install Endpoint Security (the client software) on each of them. Includes the following modules:  Antimalware  Firewall  Content Control (web access, application control)
  • 13. Copyright @ Bitdefender 2014 27-Oct-14 13 Page 13 Security for Mobile Devices Unifies enterprise-wide security with management and compliance control of iPhone, iPad and Android devices by providing simple software and update distribution via Apple or Android marketplaces. Security features include:  screen lock  authentication control  device location  remote wipe  detection of rooted or jailbroken devices  security profiles. On Android devices the security level is enhanced with real-time scanning and removable media encryption.
  • 14. Copyright @ Bitdefender 2014 27-Oct-14 14 Page 14 Case study – Customer 1 Customer 1 is a leading distribution services and e-commerce provider for the global travel industry. GravityZone is used by Customer 1 to protect all physical endpoints organization-wide and all running VMs running in all 2 datacenters world-wide. Datacenters vCenter Servers Number of Clusters Number of VMs Number of physical machines Location A 2 59 5463 5470 Location B 1 4
  • 15. Copyright @ Bitdefender 2014 27-Oct-14 15 Page 15 Case study – Customer 1
  • 16. Copyright @ Bitdefender 2014 27-Oct-14 16 Page 16 Case study – Customer 1 GravityZone Virtual Appliance vCPUs RAM Memory Storage GravityZone VA-1 (Database, Update, Web Console, Communication) 8 12 GB 80 GB GravityZone VA-2 (Web Console, Communication) 8 8 GB 80 GB GravityZone VA-3 (Load Balancer) 2 2 GB 80 GB vCenter Servers Clusters Number # VMs Security Servers Total 3 63 Clusters 5463 VMs 32 SS
  • 17. Copyright @ Bitdefender 2014 27-Oct-14 17 Page 17 Case study – Customer 2 Customer 2 is a bank from US operating over 260 branches. GravityZone is used by Customer 2 to protect all physical endpoints organization-wide and all running VMs running in all 2 datacenters. Datacenters vCenter Servers Number of Hosts Number of VMs Number of physical machines/ATM Location A 1 64 1641 1700 Location B 1 30
  • 18. Copyright @ Bitdefender 2014 27-Oct-14 18 Page 18 Case study – Customer 2
  • 19. Copyright @ Bitdefender 2014 Server Role Managed Endpoints vCPUs RAM Memory Storage Web Console <5,000 2 2 GB 40 GB Communication Server <5,000 2 2 GB 10 GB Database Server <5,000 2 4 GB 40 GB Update Server <5,000 1 1 GB 10 GB 27-Oct-14 19 Page 19 Case study – Customer 2 vCenter Servers Cluster Number # VMs Security Servers Total 2 13 Clusters 1641 VMs 24 SS
  • 20. Copyright @ Bitdefender 2014 27-Oct-14 20 Page 20 Case study – Customer 3 Customer 3 is a leader in secure cloud hosting. GravityZone is used by Customer 3 to protect all the VMware cloud infrastructure in all 5 datacenters (70% Linux based and 30% Windows based virtual machines).
  • 21. Copyright @ Bitdefender 2014 27-Oct-14 21 Page 21 Case study – Customer 3
  • 22. Copyright @ Bitdefender 2014 Server Role Managed Endpoints vCPUs RAM Memory Storage Web Console <20,000 6 6 GB 80 GB Communication Server <20,000 6 6 GB 80 GB Database Server <20,000 3 8 GB 80 GB Update Server <20,000 1 2 GB 80 GB 27-Oct-14 22 Page 22 Case study – Customer 3 vCenter Servers Hosts Number # VMs Security Servers Total 20 450 Hosts ~20000 VMs 114 SS
  • 23. Copyright @ Bitdefender 2014 27-Oct-14 23 Page 23 Copyright @ Bitdefender 2014 www.bitdefender.com/enterprise Twitter: @virt_sec LinkedIn: www.linkedin.com/bitdefenderenterprise Thank you! Q&A