SlideShare a Scribd company logo
Magic Words of VDI Security:
“Agentless” and “Aware”
David Girard, Senior Security Advisor – Trend Micro Canada


                                                     1




                                                             1
Virtualization Project                                            ?
Desktop       Server                            Cloud                    Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   2




                                                                                             2
Security Built for VMware
           The most comprehensive suite
                  of next-generation
           virtualization security solutions
Desktop      Server                           Cloud                      Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   3




                                                                                             3
Security Built for VMware

  IT Operations                  Security                                    Compliance



Consolidation rates        Protect data                                      Ensure
Operational efficiencies   & applications                                    compliance
Flexibility
Savings




                           10/4/2010   Copyright 2009 Trend Micro Inc.   4




                                                                                          4
Security Built for VMware

Desktop      Server                           Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc.   5




                                                                                            5
Key Issue:
Resource Contention

                                High impact : Employee’s arrival or schedule scans


 9:00am Scan
  Typical AV
   Console




 If several, or all, VMs start a full anti-malware scan at the same time, the underlying
 shared hardware will experience extreme load (memory, CPU, I/O), causing a
 slowdown of all virtual systems on the server.
 Large pattern file updates require significant memory and can impact, network and
 storage I/O resources.
                                Classification 10/4/2010   Copyright 2009 Trend Micro Inc.   6




                                                                                                 6
VDI Security option #1: OfficeScan
(First AV optimized for VDI)

           Trend Micro OfficeScan
           Protects virtual & physical endpoints
           • VDI Intelligence with VDI plug-in
           • Serializes updates and scans per VDI-host
           • Leverages base-images to further shorten scan times
           • Smart Scan limit Endpoints pattern updates since it is
             mostly in the cloud




                         10/4/2010   Copyright 2009 Trend Micro Inc.   7




                                                                           7
OfficeScan 10.5 has VDI-Intelligence


• Detects whether endpoints are physical or virtual
  – With VMware View
• Serializes updates and scans per VDI-host
  – Controls the number of concurrent scans and updates per VDI host
  – Maintains availability and performance of the VDI host
  – Faster than concurrent approach
• Leverages Base-Images to further shorten scan times
  – Pre-scans and white-lists VDI base-images
  – Prevents duplicate scanning of unchanged files on a VDI host
  – Further reduces impact on the VDI host



                                 Copyright 2009 Trend Micro Inc.




                                                                       8
OfficeScan 10.5 Integrates with vCenter




                    10/4/2010   Copyright 2009 Trend Micro Inc.   9




                                                                      9
CPU




      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 10




                                                                      10
CPU - Analysis
 • Only 10.5 can support 20+ desktop images with mixed user profile.
 • With no AV, average CPU utilization while 4 heavy and 16 light user
   script is running is 33%
 • With 10.5 with ALL 4 heavy and 16 light user machines scanning,
   CPU utilization is 41%. Very Impressive.
 • With powerful machines typically used in VDI environment CPU’s
   typically are not the breaking point.
 • With 20 desktop images, 10.5 adds marginal load to CPU where as
   other solutions can not even get to support baseline number of
   desktop images
 • With 10 desktop images, 10.5 adds only 11% CPU overhead
   compared to baseline (no AV and no scanning) versus Symantec
   which adds 29% CPU overhead , 10.1 which adds 50% CPU
   overhead and McAfee which is the worst which adds 83% CPU
   overhead
                          Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 11




                                                                                          11
IOPS (vDisk Utilization)




                  Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 12




                                                                                  12
IOPS - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has
   10.95 IOPS, Symantec has 9.02 IOPS and McAfee has
   whopping 22.39 IOPS
 • Trend Micro Office Scan 10.5 IOPS has small deviation of
   0.77 MB/s and 3.66 MB/s only from baseline and mixed
   20 user profile
 • Lets recap why 10.5 is so much better with IOPS
    • 10.5 Serializes updates and scans per VDI-host
    • Pre-scans and white-lists VDI base-images
    • Prevents duplicate scanning of unchanged files on a VDI host
                        Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 13




                                                                                        13
IOPS – How many Systems?

                                                                         • A VDI environment sized for 20
                                                                           desktop images with 4 heavy
                                                                           and 16 light users.
                                                                         • Keep IOPS between 6-8 and
                                                                           see how many desktop images
                                                                           can be supported with each AV
                                                                           deployment (Apples to Apples
                                                                           comparison)
                                                                         • All about return of investment

• If you deploy McAfee, you can deploy ONLY 2 desktop images in an
  environment which supports 20 images without AV
• If you deploy Symantec, you can deploy ONLY 4 desktop images in an
  environment which supports 20 images without AV
• If you deploy Trend 10.5, you can deploy ALL 20 desktop images
      Customers no longer have to choose
      between Security and Return On Investment
                              Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 14




                                                                                                            14
Memory




         Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 15




                                                                         15
Memory - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • Automatic Pool of 20 desktop images without AV in
   Mixed user Profile is consuming around 7.74 GB of
   Active Memory
 • Trend Micro Office scan 10.5 is putting an overhead of
   only 1.32 GB in maximum VDI Density environment.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 16




                                                                                      16
Scan Time with 10.5




   VDI Profile                  Other AV Solution                                        Trend Micro 10.5

   Mixed Maximum High Density   Approx 1-2 Hours                                         16 Minutes
   VDI Pool(4H &16 L)



   Mixed Low Density VDI Pool   Approx. 27- 49 minutes                                   2 Minutes
   (1H & 3 L)
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 17




                                                                                                            17
Scan Time - Analysis
 • Trend Micro Office scan 10.5 is performing Approx. 15 -
   25 times better in Mixed Low Density VDI pool and 4 -8
   times better in Mixed Maximum High Density VDI pool.

 • Trend Micro office scan 10.5 with its Smart Scan and VDI
   aware capability is consuming remarkably less scan time
   than other AV solutions.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 18




                                                                                      18
VDI Security option #2:
Deep Security

            Trend Micro Deep Security
            Protects virtualized endpoints & servers
            • First agent-less anti-malware solution
            • Hypervisor-based introspection
            • Eliminates “AV storms”




                         10/4/2010   Copyright 2009 Trend Micro Inc. 19




                                                                          19
Security Built for VMware

Desktop      Server                          Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 20




                                                                                           20
Key Issue:
Resource Contention



 9:00am Scan
  Typical AV
   Console




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 21




                                                                                21
Key Issue:
Instant On Gaps



                                        Active, with
          Active                    Dormant security
                                    out-of-date




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 22




                                                                                   22
Key Issue:
Mixed Trust Level VMs




          ERP   Email               Web                    Test                    CRM




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 23




                                                                                         23
Trend Micro Deep Security



 IDS / IPS                               Integrity                                       Log
                    Anti-Virus                                                                       Firewall
                                        Monitoring                                    Inspection




    Physical               Virtual                                             Cloud               Desktop/Laptop




Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0.
Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1


                                     10/4/2010   Copyright 2009 Trend Micro Inc. 24




                                                                                                                    24
Co-ordinated Approach
                              • Optimized protection
                              • Operational efficiency



Security virtual   Security
                                                                                       Agent-based
appliance            VM                                                                Security
  Efficiency                                                                            Protection
  Manageability                                                                         Mobility




                                      10/4/2010   Copyright 2009 Trend Micro Inc. 25




                                                                                                     25
Security Built for VMware

Desktop      Server                         Cloud                      Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 26




                                                                                           26
Issue #1:
Multi-tenancy




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 27




                                                                                27
Issue #2:
Data Access & Governance



                       10010011
                       01101100




                  10/4/2010   Copyright 2009 Trend Micro Inc. 28




                                                                   28
Issue #3:
Secure Storage Recycling


                               10011                                 10011
                               01110                                 01110
                               00101                                 00101




                   10/4/2010    Copyright 2009 Trend Micro Inc. 29




                                                                             29
Trend Micro Cloud Security
Solutions
Deep Security                 SecureCloud
• Anti-Virus                  • Encryption
• IDS/IPS                     • Policy-based key management
                              Private & Public
    • + Virtual Patching
    • + Web App Protection
                              Cloud Computing
                                       Flexibility & Confidence

• File Integrity Monitoring
• Log Inspection
• Firewall




                              10/4/2010   Copyright 2009 Trend Micro Inc. 30




                                                                               30
Security Built for VMware

Desktop       Server                            Cloud                   Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc. 31




                                                                                            31
Virtual Appliances
                                                                                 Virtual Appliance

       Application


       Operating
        System



       Hypervisor                                                                  Hypervisor



                     Hardware                                                                 Hardware




                                10/4/2010   Copyright 2009 Trend Micro Inc. 32




                                                                                                         32
Virtual Appliance Benefits

 Virtual Appliance
                        Costs
                                                                                70%
                        IT Flexibility
                                                                                 Per-User
                        Improve Business                                       Cost of Virtual
                        Continuity                                              Appliance




A solution that scale over time. Don’t need to buy a bigger physical
appliance. Just add more resources. Don’t need to buy an extra box
for pre-production environment, just fire a new VM or install on any
box that can run CentOS or Red Hat.

                              10/4/2010   Copyright 2009 Trend Micro Inc. 33




                                                                                                 33
Trend Micro
Security Virtual Appliances
  Virtual Appliance


                          Web Security
                          Email Security




Other Trend Micro Product are offered as a virtual appliance :
-Data Loss Prevention Server
-Threat Discovery Virtual Appliance (part of Threat Management Services (TMS)




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 34




                                                                                  34
Security Built for VMware
Deep Security    Deep Security                  Deep Security                     InterScan Web Security
     OR                                            AND                             InterScan Messaging
 OfficeScan                                     SecureCloud                              Security


  Desktop           Server                                Cloud                       Virtual Appliance*




                                             Encryption of the                      *VMware Certified
                                             virtual file system                       Appliances




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 35




                                                                                                           35
Security Built for VMware




          10/4/2010   Copyright 2009 Trend Micro Inc. 36




                                                           36
Trend Micro
Global leader in Internet content security and threat management.
Catalyst for faster adoption of virtualization.
Our Vision:
A world safe for exchanging digital information

Founded        • United States in 1988

Headquarters • Tokyo, Japan
Offices        • 23 countries
Employees      • 4,350
Leadership     • US $1 Billion annual revenue
               • 3rd largest security company                                              1,000+ Threat Research Experts
                                                                                                  10 labs. 24x7 ops
               • “Global 100 Most Sustainable Corporations”                                Real-time alerts for new threats
               • Top 3 in Messaging, Web and Endpoint security
               • Leader in virtualization & cloud computing
               security




                                                    Copyright 2009 Trend Micro Inc.
                                                                                      37




                                                                                                                              37
Questions?




                           Thank you, merci
New Threats Informations                                                                           For more informations:
http://blog.trendmicro.com/                                                                        Technical:
                                                                                                   david_girard@trendmicro.com
                                                                                                   514-629-1680

         User group                                                                                Sales:
Groupe d’utilisateurs                                                                              Michel_bouasria@trendmicro.com
Trend Micro du Québec                                                                              514-653-2257
http://www.linkedin.com/groups?gid=2296257                                                         Jean_houle@trendmicro.com
                                                                                                   514 893-1512
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 38




                                                                                                                                    38

More Related Content

What's hot

Fortinet
FortinetFortinet
Fortinet
ABEP123
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Evolving Cybersecurity Threats
Evolving Cybersecurity Threats  Evolving Cybersecurity Threats
Evolving Cybersecurity Threats
Nevada County Tech Connection
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Privacy & Security compliance
Cloud Privacy & Security complianceCloud Privacy & Security compliance
Cloud Privacy & Security compliance
Bryan Starbuck
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
DATA SECURITY SOLUTIONS
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
Srishti Ahuja
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
Sam Bowne
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
IBM Integration Bus High Availability Overview
IBM Integration Bus High Availability OverviewIBM Integration Bus High Availability Overview
IBM Integration Bus High Availability Overview
Peter Broadhurst
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ahmed Nour
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
IBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryIBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster Recovery
MarkTaylorIBM
 

What's hot (20)

Fortinet
FortinetFortinet
Fortinet
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Evolving Cybersecurity Threats
Evolving Cybersecurity Threats  Evolving Cybersecurity Threats
Evolving Cybersecurity Threats
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Privacy & Security compliance
Cloud Privacy & Security complianceCloud Privacy & Security compliance
Cloud Privacy & Security compliance
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
IBM Integration Bus High Availability Overview
IBM Integration Bus High Availability OverviewIBM Integration Bus High Availability Overview
IBM Integration Bus High Availability Overview
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
IBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryIBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster Recovery
 

Viewers also liked

Trend Micro Case Study
Trend Micro Case StudyTrend Micro Case Study
Trend Micro Case Study
ADG Online Solutions Pvt Ltd.
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Trend Micro (EMEA) Limited
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3guest83fa4c
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA Iowa
Ian Lintner
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsDegrowth Conference
 
Festividades do meu país (Portugal)
Festividades do meu país  (Portugal)Festividades do meu país  (Portugal)
Festividades do meu país (Portugal)
Ag.Manteigas -coordenadora Erasmus+
 
China fei
China feiChina fei
China feiincomas
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2candipartridge
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historiaHablaGuate
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
bigdavedev
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
1CloudRoad.com
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarismSusan Daniels
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Actionsoccrgrl62
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentationWendy Neave
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategiesguestbb440f9
 

Viewers also liked (20)

Trend Micro Case Study
Trend Micro Case StudyTrend Micro Case Study
Trend Micro Case Study
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
 
Canadian Centre for Court Technology Presentation
Canadian Centre for Court Technology PresentationCanadian Centre for Court Technology Presentation
Canadian Centre for Court Technology Presentation
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA Iowa
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
 
16 abril
16 abril16 abril
16 abril
 
Festividades do meu país (Portugal)
Festividades do meu país  (Portugal)Festividades do meu país  (Portugal)
Festividades do meu país (Portugal)
 
China fei
China feiChina fei
China fei
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
 
...
......
...
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
 
How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?
 

Similar to TrendMicro

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
ncceconnect
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteit
Joan Tuls
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computingManas TI SA
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminar
Markiting_be
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
Unidesk Corporation
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
IBM Danmark
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
solarisyougood
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
M.Ela International Srl
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Novell
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualizationselghaly
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompDigicomp Academy AG
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
Unidesk Corporation
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft Singapore
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
netlogix
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0
Zernike College
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
MarketingArrowECS_CZ
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
Desktone
 
V mware view
V mware viewV mware view
V mware view
Sistemi Qualità
 

Similar to TrendMicro (20)

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteit
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminar
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
V mware view
V mware viewV mware view
V mware view
 

More from 1CloudRoad.com

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
1CloudRoad.com
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
1CloudRoad.com
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal1CloudRoad.com
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM1CloudRoad.com
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
1CloudRoad.com
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
1CloudRoad.com
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
1CloudRoad.com
 
Virtensys
VirtensysVirtensys
Virtensys
1CloudRoad.com
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
1CloudRoad.com
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
1CloudRoad.com
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
1CloudRoad.com
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software1CloudRoad.com
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software1CloudRoad.com
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
1CloudRoad.com
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
1CloudRoad.com
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure1CloudRoad.com
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
1CloudRoad.com
 

More from 1CloudRoad.com (19)

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
 
Virtensys
VirtensysVirtensys
Virtensys
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

TrendMicro

  • 1. Magic Words of VDI Security: “Agentless” and “Aware” David Girard, Senior Security Advisor – Trend Micro Canada 1 1
  • 2. Virtualization Project ? Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 2 2
  • 3. Security Built for VMware The most comprehensive suite of next-generation virtualization security solutions Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 3 3
  • 4. Security Built for VMware IT Operations Security Compliance Consolidation rates Protect data Ensure Operational efficiencies & applications compliance Flexibility Savings 10/4/2010 Copyright 2009 Trend Micro Inc. 4 4
  • 5. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 5 5
  • 6. Key Issue: Resource Contention High impact : Employee’s arrival or schedule scans 9:00am Scan Typical AV Console If several, or all, VMs start a full anti-malware scan at the same time, the underlying shared hardware will experience extreme load (memory, CPU, I/O), causing a slowdown of all virtual systems on the server. Large pattern file updates require significant memory and can impact, network and storage I/O resources. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 6 6
  • 7. VDI Security option #1: OfficeScan (First AV optimized for VDI) Trend Micro OfficeScan Protects virtual & physical endpoints • VDI Intelligence with VDI plug-in • Serializes updates and scans per VDI-host • Leverages base-images to further shorten scan times • Smart Scan limit Endpoints pattern updates since it is mostly in the cloud 10/4/2010 Copyright 2009 Trend Micro Inc. 7 7
  • 8. OfficeScan 10.5 has VDI-Intelligence • Detects whether endpoints are physical or virtual – With VMware View • Serializes updates and scans per VDI-host – Controls the number of concurrent scans and updates per VDI host – Maintains availability and performance of the VDI host – Faster than concurrent approach • Leverages Base-Images to further shorten scan times – Pre-scans and white-lists VDI base-images – Prevents duplicate scanning of unchanged files on a VDI host – Further reduces impact on the VDI host Copyright 2009 Trend Micro Inc. 8
  • 9. OfficeScan 10.5 Integrates with vCenter 10/4/2010 Copyright 2009 Trend Micro Inc. 9 9
  • 10. CPU Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 10 10
  • 11. CPU - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With no AV, average CPU utilization while 4 heavy and 16 light user script is running is 33% • With 10.5 with ALL 4 heavy and 16 light user machines scanning, CPU utilization is 41%. Very Impressive. • With powerful machines typically used in VDI environment CPU’s typically are not the breaking point. • With 20 desktop images, 10.5 adds marginal load to CPU where as other solutions can not even get to support baseline number of desktop images • With 10 desktop images, 10.5 adds only 11% CPU overhead compared to baseline (no AV and no scanning) versus Symantec which adds 29% CPU overhead , 10.1 which adds 50% CPU overhead and McAfee which is the worst which adds 83% CPU overhead Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 11 11
  • 12. IOPS (vDisk Utilization) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 12 12
  • 13. IOPS - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has 10.95 IOPS, Symantec has 9.02 IOPS and McAfee has whopping 22.39 IOPS • Trend Micro Office Scan 10.5 IOPS has small deviation of 0.77 MB/s and 3.66 MB/s only from baseline and mixed 20 user profile • Lets recap why 10.5 is so much better with IOPS • 10.5 Serializes updates and scans per VDI-host • Pre-scans and white-lists VDI base-images • Prevents duplicate scanning of unchanged files on a VDI host Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 13 13
  • 14. IOPS – How many Systems? • A VDI environment sized for 20 desktop images with 4 heavy and 16 light users. • Keep IOPS between 6-8 and see how many desktop images can be supported with each AV deployment (Apples to Apples comparison) • All about return of investment • If you deploy McAfee, you can deploy ONLY 2 desktop images in an environment which supports 20 images without AV • If you deploy Symantec, you can deploy ONLY 4 desktop images in an environment which supports 20 images without AV • If you deploy Trend 10.5, you can deploy ALL 20 desktop images Customers no longer have to choose between Security and Return On Investment Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 14 14
  • 15. Memory Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 15 15
  • 16. Memory - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • Automatic Pool of 20 desktop images without AV in Mixed user Profile is consuming around 7.74 GB of Active Memory • Trend Micro Office scan 10.5 is putting an overhead of only 1.32 GB in maximum VDI Density environment. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 16 16
  • 17. Scan Time with 10.5 VDI Profile Other AV Solution Trend Micro 10.5 Mixed Maximum High Density Approx 1-2 Hours 16 Minutes VDI Pool(4H &16 L) Mixed Low Density VDI Pool Approx. 27- 49 minutes 2 Minutes (1H & 3 L) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 17 17
  • 18. Scan Time - Analysis • Trend Micro Office scan 10.5 is performing Approx. 15 - 25 times better in Mixed Low Density VDI pool and 4 -8 times better in Mixed Maximum High Density VDI pool. • Trend Micro office scan 10.5 with its Smart Scan and VDI aware capability is consuming remarkably less scan time than other AV solutions. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 18 18
  • 19. VDI Security option #2: Deep Security Trend Micro Deep Security Protects virtualized endpoints & servers • First agent-less anti-malware solution • Hypervisor-based introspection • Eliminates “AV storms” 10/4/2010 Copyright 2009 Trend Micro Inc. 19 19
  • 20. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 20 20
  • 21. Key Issue: Resource Contention 9:00am Scan Typical AV Console Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 21 21
  • 22. Key Issue: Instant On Gaps Active, with Active Dormant security out-of-date Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 22 22
  • 23. Key Issue: Mixed Trust Level VMs ERP Email Web Test CRM Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 23 23
  • 24. Trend Micro Deep Security IDS / IPS Integrity Log Anti-Virus Firewall Monitoring Inspection Physical Virtual Cloud Desktop/Laptop Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0. Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1 10/4/2010 Copyright 2009 Trend Micro Inc. 24 24
  • 25. Co-ordinated Approach • Optimized protection • Operational efficiency Security virtual Security Agent-based appliance VM Security Efficiency Protection Manageability Mobility 10/4/2010 Copyright 2009 Trend Micro Inc. 25 25
  • 26. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 26 26
  • 27. Issue #1: Multi-tenancy Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 27 27
  • 28. Issue #2: Data Access & Governance 10010011 01101100 10/4/2010 Copyright 2009 Trend Micro Inc. 28 28
  • 29. Issue #3: Secure Storage Recycling 10011 10011 01110 01110 00101 00101 10/4/2010 Copyright 2009 Trend Micro Inc. 29 29
  • 30. Trend Micro Cloud Security Solutions Deep Security SecureCloud • Anti-Virus • Encryption • IDS/IPS • Policy-based key management Private & Public • + Virtual Patching • + Web App Protection Cloud Computing Flexibility & Confidence • File Integrity Monitoring • Log Inspection • Firewall 10/4/2010 Copyright 2009 Trend Micro Inc. 30 30
  • 31. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 31 31
  • 32. Virtual Appliances Virtual Appliance Application Operating System Hypervisor Hypervisor Hardware Hardware 10/4/2010 Copyright 2009 Trend Micro Inc. 32 32
  • 33. Virtual Appliance Benefits Virtual Appliance Costs 70% IT Flexibility Per-User Improve Business Cost of Virtual Continuity Appliance A solution that scale over time. Don’t need to buy a bigger physical appliance. Just add more resources. Don’t need to buy an extra box for pre-production environment, just fire a new VM or install on any box that can run CentOS or Red Hat. 10/4/2010 Copyright 2009 Trend Micro Inc. 33 33
  • 34. Trend Micro Security Virtual Appliances Virtual Appliance Web Security Email Security Other Trend Micro Product are offered as a virtual appliance : -Data Loss Prevention Server -Threat Discovery Virtual Appliance (part of Threat Management Services (TMS) 10/4/2010 Copyright 2009 Trend Micro Inc. 34 34
  • 35. Security Built for VMware Deep Security Deep Security Deep Security InterScan Web Security OR AND InterScan Messaging OfficeScan SecureCloud Security Desktop Server Cloud Virtual Appliance* Encryption of the *VMware Certified virtual file system Appliances 10/4/2010 Copyright 2009 Trend Micro Inc. 35 35
  • 36. Security Built for VMware 10/4/2010 Copyright 2009 Trend Micro Inc. 36 36
  • 37. Trend Micro Global leader in Internet content security and threat management. Catalyst for faster adoption of virtualization. Our Vision: A world safe for exchanging digital information Founded • United States in 1988 Headquarters • Tokyo, Japan Offices • 23 countries Employees • 4,350 Leadership • US $1 Billion annual revenue • 3rd largest security company 1,000+ Threat Research Experts 10 labs. 24x7 ops • “Global 100 Most Sustainable Corporations” Real-time alerts for new threats • Top 3 in Messaging, Web and Endpoint security • Leader in virtualization & cloud computing security Copyright 2009 Trend Micro Inc. 37 37
  • 38. Questions? Thank you, merci New Threats Informations For more informations: http://blog.trendmicro.com/ Technical: david_girard@trendmicro.com 514-629-1680 User group Sales: Groupe d’utilisateurs Michel_bouasria@trendmicro.com Trend Micro du Québec 514-653-2257 http://www.linkedin.com/groups?gid=2296257 Jean_houle@trendmicro.com 514 893-1512 Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 38 38