SlideShare a Scribd company logo
Securing Virtual and Cloud Environments

January 15th 2014
Securing Virtual and Cloud
Environments
Agenda

Bunmi Sowande
Technical Specialist – F-Secure (UK)
bunmi_Sowande@f-secure.com
07818 515 687

•
•
•
•
•

What is virtualization?
Benefits of virtualization
Virtualization = Cloud ??
Security in Virtual and Cloud Environments
F-Secure Security for Virtual and Cloud
Environments
Awarded Best Protection & Praised by
Certified and Awarded by
Analysts
numerous 3 parties!
rd

“Out of all corporate endpoint
protection products
reviewed, F-Secure Client
Security offered by far the best
protection.”
Andreas Marx, CEO of AV-TEST

The Forrester Wave™: Endpoint Security, Q1 2013

Received highest score among all vendors for
our product roadmap and strategy.

Top ranking scores on performance and
satisfaction, in addition to our advanced
anti-malware technologies.
Comprehensive Protection
Providing 360 protection from all threats
Protection Service for Business

Business Suite
In-House IT

Policy Manager

Management as a Service

Internet Gatekeeper Messaging Security
Gateway

PSB Portal

Out-sourced IT

Server Security

Client Security

Email and Server
Security

Mobile Security

Linux Security

AV for
Workstations

PSB Server
Security

PSB Email and
Server Security

PSB Workstation
Security

Protection
Service for Email

PSB Mobile Security
Karmina
Senior Analyst

Security in the news
Security in the News
Security in the News
Security in the News
Security in the News
What is virtualization ?
In the beginning………
……….Cueball and Associates buy their first server

Domain
Controller

•
•
•

Email
Server

File and
Storage

F-Secure
Policy
Manager

Backup
Domain
Controller

CRM

Accounting
Software

Each application requires a separate server
Most of the time, the server’s use 5-25% of their resources – VERY INEFFICIENT
In large datacenters, most of the power consumed by hardware is just heating the room
in idle cycles.
Hardware Resources
Sharing is caring
Benefits of Virtualization
•
•
•
•

Hardware Cost savings
Resource Utilisation is around 80%, better efficiency
Reduced power costs (servers and air-conditioning)
Capital and operations expenses cut by half, with
annual savings of more than £1,000 for each server
virtualized

• Less space needed in datacentre for physical servers
• High Availability, better disaster recovery without
complicated clustering
• Faster Provisioning of servers
• Easy to upgrade
• Allows for easy testing and evaluation of applications
and Operating Systems
Virtual machines are already mainstream
“Roughly two-thirds of x86 server workloads are
virtualized, the market is mature and
competitive, and enterprises have viable choices”
– Gartner, June 2013,
Magic Quadrant for x86 Server Virtualization Infrastructure

16

February 14, 2014

© F-Secure Confidential
Other types of Virtualization
•
•
•
•

Desktop Virtualization – Thin Clients, VDI
Storage Virtualization
Network Virtualization
Application Virtualization
Desktop Virtualization Trends

SMB’s are increasingly using virtual desktops
Source: Virtualization: A 2013 HorizonWatching Trend Report
Virtualization = Cloud Computing ??

Virtualization – Physical
Infrastructure

Cloud Computing – Software or a
service.
Most common cloud services
Web
hosting

Virtual
servers

20

February 14, 2014

Email and
collaboration
tools

Virtual
desktops
(VDI for BYOD)

© F-Secure Confidential
Security for Virtual
Environments
with optimal performance
Which is more important?
Protection
level

Performance

22

February 14, 2014

© F-Secure Confidential
Special demands in virtual
environments
Traditional security threats apply, but…
Limited hardware capacity
Shared hardware usage

Added weight to the
scanning process

23

February 14, 2014

© F-Secure Confidential

Significant impact on desktop
virtualization
Need to optimize and offer
a good user experience
Need to invest in additional
capacity
Traditional anti-virus in virtual machines
Takes up a lot of resources from the hardware
Difficult to manage

Higher costs
High performance impact

24

February 14, 2014

© F-Secure Confidential
F-Secure
Security for Virtual
and Cloud Environments
25

February 14, 2014

© F-Secure Confidential
Optimized performance
Reduced resource usage for
virtual environments

Performance
optimized to
reduce
hardware costs

Light (small footprint) security
client for virtual machines
Optimized use of hardware
capacity
High availability and scalability
with multi-server deployment

26

February 14, 2014

© F-Secure Confidential
Multi-platform coverage
Supports all popular
virtualization
platforms, including
mixed and hybrid
environments with
multiple virtual
platforms

27

February 14, 2014

© F-Secure Confidential

Hypervisor agnostic –
works with
VMware, Citrix, MS
Hyper-V, etc
Hybrid solution
supports different
environment
combinations
Reduced complexity
Single unified central management and standard clients

Built-in
functionality in
standard clients

28

February 14, 2014

© F-Secure Confidential

All parts of the
solution centrally
managed with
the same
management tool

Reduced
complexity due to
easy deployment
Security for Virtual and Cloud Environments

Virtual Machine
Physical Machine
Security solution for virtual and cloud
environments
1. Uncompromised, best protection against
malware, exploits, phishing and other network based
attacks

2. Reduced memory, CPU and disk space consumption on
virtual machines

3. Can be deployed in any virtualization or cloud
environment including mixed and hybrid environments

4. An added feature for the award-winning endpoint and
server protection products

5. Scanning offloaded to a dedicated Scanning and
Reputation Server
How it works?
Client
• Standard F-Secure
workstation and
server software
• One-time installation
on virtual machine
template
• Includes F-Secure
award-winning
technologies
• Centrally managed
with a single unified
management
console

Scanning and
Reputation Server
• Easy deployment
with pre-configured
virtual appliance
• Isolates
performance
consuming
operations from
clients
• Centrally managed
with the same
management
console as clients

Elements

Management,
provisioning,
monitoring
• F-Secure Policy
Manager installed on
Windows or Linux
server
• Provides policies
, configuration and
updates for all
managed parts of the
solution
• Status, monitoring, st
atistics and licensing
Security for Virtual
and Cloud Environments
SVCE Licensing
The things you
need to know
• What is the number
of
• End points in total
• Virtualized end
points

The products you
need
1) Client installations
• Client Security or
Server Security
• Amount of devices
2) Offload scanning
server
• Scanning and
Reputation
Server
• Amount of clients
offloading the
scanning

How to sell it?

n x CS/SS SKU
+
n x SRS SKU
=
SVCE Price
SVCE Pricing example –
From physical to hybrid environment
200 workstations
(100 Physical PCs
and 100 Virtualised)

200 x Client Security (100-499)
100 Connections to Scanning and Reputation Server

• Multiple SRS Servers can be deployed for scalability and redundancy.
• 1 Scanning and Reputation Server (4GB RAM and 4 vCPU) for 100
virtual machines running on the same hypervisor host
No more compromises!
Request trial

Bunmi.Sowande@f-secure.com
Robert.morgan@f-secure.com
Questions ??

Next webinars
12th February - Why SMBs are outsourcing Security to Managed
Service Providers – bit.ly/fswebinar4

12th March – Why do you need to protect your mobile devices?
- bit.ly/fswebinar5
How it works
Component

What it does?

Policy Manager

provides centralized management for products installed on physical
and virtual machines

Policy Manager Console

the administration console to define policies, deploy F-Secure
software and monitor status of security

Client Security, Server Security
and Email and Server Security

endpoint security protection installed on physical or virtual
desktops and servers respectively

Management Agent

communicates with Policy Manager, applies defined policies and
sends status information and alerts to the Policy Manager Server

Automatic Update Agent

responsible for downloading and installing software and database
updates

Offload Scanning Agent

offloads malware scanning and content reputation checking to
minimize the performance impact

Scanning and Reputation
Server

the virtual appliance based on hardened Linux platform. It provides
malware scanning and content reputation services.

More Related Content

What's hot

vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
VMware
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
 
Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
4sl
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
Icomm Technologies
 
CyberCloud
CyberCloud CyberCloud
CyberCloud
kylefharvey
 
Crm implementation (oracle)
Crm implementation (oracle)Crm implementation (oracle)
Crm implementation (oracle)
Lauren Taylor
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
Jan Robin
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Ciaran Roche
 
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
POST Telecom for Business
 
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
VMware
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud Hosting
Mike Ricca
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
Coenraad Smith
 
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
POST Telecom for Business
 
TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0
Robb Boyd
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
PT Datacomm Diangraha
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Netgear Italia
 
Nutanix
NutanixNutanix
Nutanix
rosslili
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
AISDC
 

What's hot (18)

vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
CyberCloud
CyberCloud CyberCloud
CyberCloud
 
Crm implementation (oracle)
Crm implementation (oracle)Crm implementation (oracle)
Crm implementation (oracle)
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
[Event] Digital transformation : Empower digital workspace - PRESENTATION VMWARE
 
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
VMware: Enabling Software-Defined Storage Using Virtual SAN (Business Decisio...
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud Hosting
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
 
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
[Event] Digital transformation : Enterprise cloud one os one click - PRESENTA...
 
TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
 
Nutanix
NutanixNutanix
Nutanix
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
 

Similar to Securing Virtual and Cloud Environments

Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
John Rhoton
 
Datacenter virtualization
Datacenter virtualizationDatacenter virtualization
Datacenter virtualization
Netmagic Solutions Pvt. Ltd.
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
Nazneen Sheikh
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
Bhavesh Khandelwal
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
Ingram Micro Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityIngram Micro Cloud
 
iland Cloud Infrastructure
iland Cloud Infrastructureiland Cloud Infrastructure
iland Cloud Infrastructure
midtownchic
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Primend
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
Smarter.World
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
Chris Sparshott
 
CloudOps evening presentation from Savvis
CloudOps evening presentation from SavvisCloudOps evening presentation from Savvis
CloudOps evening presentation from Savvis
Alistair Croll
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
Aditi Shrivastava
 
Mindshare Hosting Presentation
Mindshare Hosting PresentationMindshare Hosting Presentation
Mindshare Hosting Presentation
Christian_A_Breaux
 

Similar to Securing Virtual and Cloud Environments (20)

Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Datacenter virtualization
Datacenter virtualizationDatacenter virtualization
Datacenter virtualization
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape Opportunity
 
iland Cloud Infrastructure
iland Cloud Infrastructureiland Cloud Infrastructure
iland Cloud Infrastructure
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
CloudOps evening presentation from Savvis
CloudOps evening presentation from SavvisCloudOps evening presentation from Savvis
CloudOps evening presentation from Savvis
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Mindshare Hosting Presentation
Mindshare Hosting PresentationMindshare Hosting Presentation
Mindshare Hosting Presentation
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Securing Virtual and Cloud Environments

  • 1. Securing Virtual and Cloud Environments January 15th 2014
  • 2. Securing Virtual and Cloud Environments Agenda Bunmi Sowande Technical Specialist – F-Secure (UK) bunmi_Sowande@f-secure.com 07818 515 687 • • • • • What is virtualization? Benefits of virtualization Virtualization = Cloud ?? Security in Virtual and Cloud Environments F-Secure Security for Virtual and Cloud Environments
  • 3.
  • 4. Awarded Best Protection & Praised by Certified and Awarded by Analysts numerous 3 parties! rd “Out of all corporate endpoint protection products reviewed, F-Secure Client Security offered by far the best protection.” Andreas Marx, CEO of AV-TEST The Forrester Wave™: Endpoint Security, Q1 2013 Received highest score among all vendors for our product roadmap and strategy. Top ranking scores on performance and satisfaction, in addition to our advanced anti-malware technologies.
  • 5. Comprehensive Protection Providing 360 protection from all threats Protection Service for Business Business Suite In-House IT Policy Manager Management as a Service Internet Gatekeeper Messaging Security Gateway PSB Portal Out-sourced IT Server Security Client Security Email and Server Security Mobile Security Linux Security AV for Workstations PSB Server Security PSB Email and Server Security PSB Workstation Security Protection Service for Email PSB Mobile Security
  • 12. In the beginning……… ……….Cueball and Associates buy their first server Domain Controller • • • Email Server File and Storage F-Secure Policy Manager Backup Domain Controller CRM Accounting Software Each application requires a separate server Most of the time, the server’s use 5-25% of their resources – VERY INEFFICIENT In large datacenters, most of the power consumed by hardware is just heating the room in idle cycles.
  • 15. Benefits of Virtualization • • • • Hardware Cost savings Resource Utilisation is around 80%, better efficiency Reduced power costs (servers and air-conditioning) Capital and operations expenses cut by half, with annual savings of more than £1,000 for each server virtualized • Less space needed in datacentre for physical servers • High Availability, better disaster recovery without complicated clustering • Faster Provisioning of servers • Easy to upgrade • Allows for easy testing and evaluation of applications and Operating Systems
  • 16. Virtual machines are already mainstream “Roughly two-thirds of x86 server workloads are virtualized, the market is mature and competitive, and enterprises have viable choices” – Gartner, June 2013, Magic Quadrant for x86 Server Virtualization Infrastructure 16 February 14, 2014 © F-Secure Confidential
  • 17. Other types of Virtualization • • • • Desktop Virtualization – Thin Clients, VDI Storage Virtualization Network Virtualization Application Virtualization
  • 18. Desktop Virtualization Trends SMB’s are increasingly using virtual desktops Source: Virtualization: A 2013 HorizonWatching Trend Report
  • 19. Virtualization = Cloud Computing ?? Virtualization – Physical Infrastructure Cloud Computing – Software or a service.
  • 20. Most common cloud services Web hosting Virtual servers 20 February 14, 2014 Email and collaboration tools Virtual desktops (VDI for BYOD) © F-Secure Confidential
  • 22. Which is more important? Protection level Performance 22 February 14, 2014 © F-Secure Confidential
  • 23. Special demands in virtual environments Traditional security threats apply, but… Limited hardware capacity Shared hardware usage Added weight to the scanning process 23 February 14, 2014 © F-Secure Confidential Significant impact on desktop virtualization Need to optimize and offer a good user experience Need to invest in additional capacity
  • 24. Traditional anti-virus in virtual machines Takes up a lot of resources from the hardware Difficult to manage Higher costs High performance impact 24 February 14, 2014 © F-Secure Confidential
  • 25. F-Secure Security for Virtual and Cloud Environments 25 February 14, 2014 © F-Secure Confidential
  • 26. Optimized performance Reduced resource usage for virtual environments Performance optimized to reduce hardware costs Light (small footprint) security client for virtual machines Optimized use of hardware capacity High availability and scalability with multi-server deployment 26 February 14, 2014 © F-Secure Confidential
  • 27. Multi-platform coverage Supports all popular virtualization platforms, including mixed and hybrid environments with multiple virtual platforms 27 February 14, 2014 © F-Secure Confidential Hypervisor agnostic – works with VMware, Citrix, MS Hyper-V, etc Hybrid solution supports different environment combinations
  • 28. Reduced complexity Single unified central management and standard clients Built-in functionality in standard clients 28 February 14, 2014 © F-Secure Confidential All parts of the solution centrally managed with the same management tool Reduced complexity due to easy deployment
  • 29. Security for Virtual and Cloud Environments Virtual Machine Physical Machine
  • 30. Security solution for virtual and cloud environments 1. Uncompromised, best protection against malware, exploits, phishing and other network based attacks 2. Reduced memory, CPU and disk space consumption on virtual machines 3. Can be deployed in any virtualization or cloud environment including mixed and hybrid environments 4. An added feature for the award-winning endpoint and server protection products 5. Scanning offloaded to a dedicated Scanning and Reputation Server
  • 32. Client • Standard F-Secure workstation and server software • One-time installation on virtual machine template • Includes F-Secure award-winning technologies • Centrally managed with a single unified management console Scanning and Reputation Server • Easy deployment with pre-configured virtual appliance • Isolates performance consuming operations from clients • Centrally managed with the same management console as clients Elements Management, provisioning, monitoring • F-Secure Policy Manager installed on Windows or Linux server • Provides policies , configuration and updates for all managed parts of the solution • Status, monitoring, st atistics and licensing
  • 33.
  • 34. Security for Virtual and Cloud Environments
  • 35. SVCE Licensing The things you need to know • What is the number of • End points in total • Virtualized end points The products you need 1) Client installations • Client Security or Server Security • Amount of devices 2) Offload scanning server • Scanning and Reputation Server • Amount of clients offloading the scanning How to sell it? n x CS/SS SKU + n x SRS SKU = SVCE Price
  • 36. SVCE Pricing example – From physical to hybrid environment 200 workstations (100 Physical PCs and 100 Virtualised) 200 x Client Security (100-499) 100 Connections to Scanning and Reputation Server • Multiple SRS Servers can be deployed for scalability and redundancy. • 1 Scanning and Reputation Server (4GB RAM and 4 vCPU) for 100 virtual machines running on the same hypervisor host
  • 37. No more compromises! Request trial Bunmi.Sowande@f-secure.com Robert.morgan@f-secure.com
  • 38. Questions ?? Next webinars 12th February - Why SMBs are outsourcing Security to Managed Service Providers – bit.ly/fswebinar4 12th March – Why do you need to protect your mobile devices? - bit.ly/fswebinar5
  • 39. How it works Component What it does? Policy Manager provides centralized management for products installed on physical and virtual machines Policy Manager Console the administration console to define policies, deploy F-Secure software and monitor status of security Client Security, Server Security and Email and Server Security endpoint security protection installed on physical or virtual desktops and servers respectively Management Agent communicates with Policy Manager, applies defined policies and sends status information and alerts to the Policy Manager Server Automatic Update Agent responsible for downloading and installing software and database updates Offload Scanning Agent offloads malware scanning and content reputation checking to minimize the performance impact Scanning and Reputation Server the virtual appliance based on hardened Linux platform. It provides malware scanning and content reputation services.

Editor's Notes

  1. We have been awarded Best Protection..
  2. Let’s look at the detail of our security offering…
  3. Target – Originally 40 million people, this weekend 70, some say 110 millionNeiman Marcus – This weekendUSB Sticks – Cut hole in ATM, installed malware, patched the security vulnerabilities. Required 2 codes from different gangs, trust issuesWindows XP, usually old versions. End of Life in April 2014, may yet be the security story of 2014
  4. Skype – Twitter, Facebook and Wordpress accounts. Not using two factor authentication. This weekend, Microsoft news and Xbox accounts were also hacked.
  5. Snapchat was warned about the attack, however, they brushed it off, saying the risk was theoretical. After the attack, they blamed the researcher who found the vulnerability, did not apologise until Jan 9th. Improvements, not clear, but users can now opt out.
  6. From December 31 to January 3, Adverts on Yahoo’s websites lead to malware. 27,000 infections every hour the malware was live on the site. Over the period of the attack that could mean as many as two million machines were infected.
  7. Number of Servers very quickly add upServers are designed to run one operating system and one application at a timeAsk the admin what his five most important applications are, and he will point to 5 or more servers.
  8. Reductions in hardware requirements by a ratio of 10:1 or better.
  9. This is up from around 50% in June 2012…….a very rapid upward trend !!
  10. Desktop - Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.Storage - the amalgamation of multiple network storage devices into what appears to be a single storage unit. Network -
  11. Virtualization makes cloud computing possible by decoupling software from hardware. Virtualisation – high upfront costs (save money in the long run), cloud – subscription service. virtualization can be a method for delivering a private cloud, but it doesn’t work the other way around. “Every square is a rectangle but not every rectangle is a square. Every cloud is composed of virtual infrastructure but not every virtual infrastructure is part of a cloud.”
  12. Our performance is on par with the best competition – but with the best protection level
  13. Competition does not offer support for mixed / hybrid environments
  14. F-Secure Security for Virtual and Cloud Environments (SVCE) is a security solution for virtual environments. It is hypervisor agnostic and thus can be deployed in any virtualization (VI or VDI) environment. Unlike other security vendors offering agent-less or silent-agent based solutions, F-Secure SVCE is an added feature for the existing F-Secure award-winning end-point and server protection products. It allows to offload CPU intensive scanning operations to a dedicated F-Secure Scanning and Reputation Server (SRS) and reduce CPU and/or memory consumption on virtual machines. While this results increased VM density per hypervisor, it still provides the best protection possible against malware, exploits, phishing and other network based attacks. 
  15. Adding SRS increases the license cost, butSAVES MORE IN HARDWARE