SlideShare a Scribd company logo
1 of 38
VMware Security Briefing ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Security Advantages of Virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VMware Security Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Core Platform Security Operationalize Security Security Virtual Appliances Better Than Physical: Adaptive Security Infrastructure .OVF VMware Confidential/Proprietary
Extended Computing Stack and Guest Isolation Hypervisor Standard x86 VMware ESX
Isolation by design Security Design of the VMware Infrastructure Architecture http://www.vmware.com/resources/techresources/727
How Virtualization Affects Datacenter Security
Agenda ,[object Object],[object Object],[object Object],[object Object]
vSphere - Virtual Datacenter OS from VMware Off-premise Cloud vCenter On-premise Infrastructure Make applications more scalable, secure and resilient in a virtual environment than physical.  SaaS Linux Grid Windows J2EE .Net VMware Infrastructure -> virtual datacenter OS Application  vServices Scalability Infrastructure  vServices Security Availability vNetwork vStorage vCompute Cloud  vServices …… . Web 2.0
DPM Hot Add Fault Tolerance Thin Provisioning Data Recovery VMsafe Distributed Switch Host Profiles ,[object Object],[object Object],Dynamically add additional compute, memory or network/storage resources as applications grow  -Hot Add Enables admins the ability to scale VM’s without disruption to end user Ensure continuous availability for virtual machines against hardware failures. -   VMware FT creates virtual machine “pairs” that run in lock step - essentially mirroring the execution state of a VM & eliminating data loss or downtime to any application.  Optimizes storage costs through the most efficient use of storage in virtual environments - Use Thin Provisioning to reduce storage costs by up to 50%. Quick, simple and complete data protection for your VM’s -Data Recovery provides you with agent-less, disk-based backup and recovery (VM or file level) of your VM’s Comply with corporate security policies and regulations on data privacy while still running applications efficiently on shared computing resource pools. - vShield Zones makes it easy to centrally manage and enforce compliance with security policies across large pools of servers and virtual machines. ,[object Object],[object Object],Simplifies and enhances the provisioning, administration and control of virtual machine networking - VMware Distributed Switch is a new type of virtual switch which spans the entire Virtual Infrastructure which enables the network to be treated  s an aggregated resource. Standardize and simplify how customers configure and manage ESX host configurations.   - Host profiles simplify and standardize ESX host configuration. This feature in vCenter Server 4.0 allows the creation of a “golden  profile”  from an existing host and using this as a template to configure other hosts vShield Zones vSphere – New & Improved Enterprise OS
VMware VMsafe Multi-function Security Appliance Security VM vNetwork Distributed Switch Security VM ,[object Object],[object Object],[object Object],[object Object],[object Object],VMware ESX App OS App OS App OS App OS App OS VMware ESX App OS
VMsafe™ APIs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VMware vShield Zones ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Network Visibility ,[object Object],[object Object],[object Object]
VMware VM Wall - Virtual Firewall ,[object Object],[object Object],[object Object]
Secure Design for Virtualization Layer ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Physical Desktop Challenges
Benefits of Centralized Desktops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Server-based Desktop Virtualization Profile Moving the desktop to a virtualized image in the data center allows the complex components to be protected and managed. File  Server User Data Profile File  Server App App App
Universal Operating System “Gold” Image Profile A single encapsulated hardware build for all users allows for better tuning and hardening of the underlying operating system. File  Server User Data Profile File  Server App App App
Patch Management in the Data Center Profile Patches can be delivered at data center network speeds, or virtual machines can be periodically destroyed and rebuilt cleanly. File  Server User Data Profile File  Server App App Patch Server App
Access Control Profile Controlling access to the virtualized desktops provides further protection to applications and user data. File  Server User Data Profile File  Server App App X App
Elimination of Complex Devices at the Edge Profile Users can be issued tamper-proof thin clients with no moving parts to complete the solution. File  Server User Data Profile File  Server App App App
Data Security - Backing Up With a fully virtualized desktop, backups are not only simplified, they’re actually possible. ? Profile File  Server User Data Profiles File  Server App App VM Template App
Secured Client-Side Virtualization ,[object Object],X ,[object Object],[object Object],[object Object],[object Object],Secure Virtual Machines can be overlaid on a insecure or unmanaged device. ,[object Object]
Portable Client-Side Virtualization The client device and it’s unsecured OS become irrelevant – the VM is the true working environment.
Application Virtualization ,[object Object],[object Object],[object Object]
Security Benefits of Application Virtualization ,[object Object],[object Object],[object Object],[object Object]
Integrated Virtualization Solution Profile Users can be issued tamper-proof ACE Instances with virtualized apps and network access only through VIEW instances to complete the solution. File  Server User Data Profile File  Server App App App
Agenda ,[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Criteria Certified Versions ,[object Object],[object Object],[object Object]
VMware Security Briefing ,[object Object],[object Object],[object Object],[object Object]
Enforce Strong Access Controls Anne Harry Joe Security Principle ,[object Object],Least Privileges Roles with only required privileges Separation of Duties Roles applied only to required objects Administrator Operator User
View is much simpler to set up and support
Competitive Pricing/Packaging Comparison * Experimental support only XenDesktop VMware View Advanced Enterprise Platinum Enterprise Premier Virtualization Platform Connection broker Secure remote access Storage Optimization Multi-backend support Application Virtualization Offline Desktop* High Availability Dynamic Provisioning Desktop Monitoring Partner Partner Pricing $195 $295 $395 $150 $250                                 x x x x x x x x x x x x x x x 
Cost Comparison Vmware cost per user Premier Bundle $ 250.00  List price per user Premier Bundle Support and Maintenance $  62.00    ESX Server HW $ 156.25  ESX server $10,000 64 users on 8 core system Provisioning Server HW Cost $  -  Virtual Machine on ESX Connection Broker HW Cost $  -  Virtual Machine on ESX Storage Costs $  30.00  Space for Linked clone   $ 498.25  Total per user cost Citrix cost per user Xen Desktop Advanced $ 295.00 List price per user XenDesktop Platinum Support and Maintenance $  48.75    Xen Desktop Server Hw $ 312.50  XEN server $10,000 32 users on 8 core system Provisioning Server HW Cost $  16.67  Physical server per documentation 300 users for $5,000 Connection Broker HW Cost $  4.17  Physical server per documentation 1200 users for $5,000 Storage Costs $  30.00 In theory, some costs but will be minimal   $ 707.09 Total per user cost  (+ additional server for XenApp, + TSCAL, +,+)

More Related Content

What's hot

VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Securitysyrinxtech
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld
 
Server update management optimization
Server update management optimizationServer update management optimization
Server update management optimizationAllen Brokken
 
Citrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heavenCitrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heavenMarketingArrowECS_CZ
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3VMware
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 

What's hot (20)

VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
Server update management optimization
Server update management optimizationServer update management optimization
Server update management optimization
 
Citrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heavenCitrix solutions - How on earth, as in heaven
Citrix solutions - How on earth, as in heaven
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
vRealize Network Insight 3.3
vRealize Network Insight 3.3vRealize Network Insight 3.3
vRealize Network Insight 3.3
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 

Similar to Why Security Teams should care about VMware

Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Securityguestb09e16
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
Mid term report
Mid term reportMid term report
Mid term reportlokesh039
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex Networks
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5Joe Kaluza
 
Capito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Livingstone
 
VMware vCloud Suite
VMware vCloud SuiteVMware vCloud Suite
VMware vCloud SuiteVMware
 
Ds v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plusDs v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plusChau Tuan Nguyen
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 

Similar to Why Security Teams should care about VMware (20)

Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
VMware
VMwareVMware
VMware
 
Mid term report
Mid term reportMid term report
Mid term report
 
VMware Virtualization 27 09 07
VMware Virtualization  27 09 07VMware Virtualization  27 09 07
VMware Virtualization 27 09 07
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5
 
Capito Ardoe House VMWare Presentation
Capito Ardoe House VMWare PresentationCapito Ardoe House VMWare Presentation
Capito Ardoe House VMWare Presentation
 
VMware vCloud Suite
VMware vCloud SuiteVMware vCloud Suite
VMware vCloud Suite
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
Ds v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plusDs v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plus
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
Cloud Technology: Virtualization
Cloud Technology: VirtualizationCloud Technology: Virtualization
Cloud Technology: Virtualization
 

Why Security Teams should care about VMware

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Extended Computing Stack and Guest Isolation Hypervisor Standard x86 VMware ESX
  • 6. Isolation by design Security Design of the VMware Infrastructure Architecture http://www.vmware.com/resources/techresources/727
  • 7. How Virtualization Affects Datacenter Security
  • 8.
  • 9. vSphere - Virtual Datacenter OS from VMware Off-premise Cloud vCenter On-premise Infrastructure Make applications more scalable, secure and resilient in a virtual environment than physical. SaaS Linux Grid Windows J2EE .Net VMware Infrastructure -> virtual datacenter OS Application vServices Scalability Infrastructure vServices Security Availability vNetwork vStorage vCompute Cloud vServices …… . Web 2.0
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Server-based Desktop Virtualization Profile Moving the desktop to a virtualized image in the data center allows the complex components to be protected and managed. File Server User Data Profile File Server App App App
  • 21. Universal Operating System “Gold” Image Profile A single encapsulated hardware build for all users allows for better tuning and hardening of the underlying operating system. File Server User Data Profile File Server App App App
  • 22. Patch Management in the Data Center Profile Patches can be delivered at data center network speeds, or virtual machines can be periodically destroyed and rebuilt cleanly. File Server User Data Profile File Server App App Patch Server App
  • 23. Access Control Profile Controlling access to the virtualized desktops provides further protection to applications and user data. File Server User Data Profile File Server App App X App
  • 24. Elimination of Complex Devices at the Edge Profile Users can be issued tamper-proof thin clients with no moving parts to complete the solution. File Server User Data Profile File Server App App App
  • 25. Data Security - Backing Up With a fully virtualized desktop, backups are not only simplified, they’re actually possible. ? Profile File Server User Data Profiles File Server App App VM Template App
  • 26.
  • 27. Portable Client-Side Virtualization The client device and it’s unsecured OS become irrelevant – the VM is the true working environment.
  • 28.
  • 29.
  • 30. Integrated Virtualization Solution Profile Users can be issued tamper-proof ACE Instances with virtualized apps and network access only through VIEW instances to complete the solution. File Server User Data Profile File Server App App App
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. View is much simpler to set up and support
  • 37. Competitive Pricing/Packaging Comparison * Experimental support only XenDesktop VMware View Advanced Enterprise Platinum Enterprise Premier Virtualization Platform Connection broker Secure remote access Storage Optimization Multi-backend support Application Virtualization Offline Desktop* High Availability Dynamic Provisioning Desktop Monitoring Partner Partner Pricing $195 $295 $395 $150 $250                                 x x x x x x x x x x x x x x x 
  • 38. Cost Comparison Vmware cost per user Premier Bundle $ 250.00 List price per user Premier Bundle Support and Maintenance $ 62.00   ESX Server HW $ 156.25 ESX server $10,000 64 users on 8 core system Provisioning Server HW Cost $ - Virtual Machine on ESX Connection Broker HW Cost $ - Virtual Machine on ESX Storage Costs $ 30.00 Space for Linked clone   $ 498.25 Total per user cost Citrix cost per user Xen Desktop Advanced $ 295.00 List price per user XenDesktop Platinum Support and Maintenance $ 48.75   Xen Desktop Server Hw $ 312.50 XEN server $10,000 32 users on 8 core system Provisioning Server HW Cost $ 16.67 Physical server per documentation 300 users for $5,000 Connection Broker HW Cost $ 4.17 Physical server per documentation 1200 users for $5,000 Storage Costs $ 30.00 In theory, some costs but will be minimal   $ 707.09 Total per user cost (+ additional server for XenApp, + TSCAL, +,+)

Editor's Notes

  1. 4 areas – continue to enhance core platform Pulling out console OS and vulinerable pience 32M code to eliminate attaches or code Integrate in extrenal technologies – use what they have Protection at the host level instead of the Host and policy driven security – clouds and SLAs and managing at an environment individual Platform security is a core area of focus on making sure the platform is hardened against attack. VMware takes the primary responsibility for this activity. The second is to ensure that existing security processes within the enterprise are enabled to make sure that VI can be operated in a secure fashion in the enterprise Virtual appliances help customers deploy more security than possible in physical datacenters, increasing the overall “density” of security in a virtualized datacenter Lastly, we believe that virtual can be more secure than physical systems. This is all built on the foundation of VMsafe-enabled products, but in addition, changes to the way customers can deploy and operate their systems in a virtual environment will make things more secure.
  2. Application vServices – to recap, are services provided by our platform to applications – uniformly, enabled by simple point and click in most cases. Let’s review the current application vServices provided by VMware and new vServices in 2009
  3. Partner solutions that utilize VMsafe have the following advantages over existing security mechanisms: They can protect VMs without needing to install agents inside each VM They can perform a multitude of tasks that protect a VM holistically ( monitor VM components on the host, nw traffic through the distributed switch) AV, Firewall, IPS can all be in one appliance. They can do all these tasks efficiently in a dynamic environment where the virtual machine moves from host to host. For e.g. if a VM is being monitored on a particular host, it carries its security state with it to the next host where another appliance starts monitoring it.
  4. vShield Zones is a new Application vService providing fundamental and critical network security for the VDC-OS Expanding virtualization deployments in the datacenter are encompassing multiple areas of trust such as DMZ (demilitarized zone) buffers to the Internet and senstive data such as credit card information subject to Payment Card Industry (PCI) compliance or corporate financial data covered by Sarbanes-Oxley. These varying trust zones must be segmented with firewalls and other network security. Existing physical appliances require diverting traffic to external chokepoints, splintering ESX resource pools into small fragments and disrupting the seamless vision of an internal computing cloud. vShield Zones is a vritual appliance that allows you to monitor and restrict inter-VM traffic within and between ESX hosts to provide security and compliance within shared resource pools. vCenter integration lets you create network zones based on familiar VI containers such as hosts, clusters, vswitches and VLAN’s vShield Zones scans VM’s for known applications to present network flows and security policies by application protocol rather than as raw network flows. Virtualization awareness and application awareness increases accuracy and reduces risk of misconfiguration and noncompliance. Consistent security policies can be assured throughout a VM lifecycle, from initial provisioning to VMotion across various hardware to final decommissioning. Comiplete view of virtual machines, networks and security policies allows you to audit security posture fully within the virtual environment to meet defined security SLA’s, irrespective of changes to your external physical network and perimeter.
  5. Here is a screenshot of what you see with the VM Flow monitoring capability The UI allows you to drill down and see what’s happening in more and more detail. Allowed vs. disallowed traffic; Protocol (UDP, TCP, etc); Incoming vs. outgoing Categorized (i.e. traffic which can be attributed to a particular application) vs. uncategorized (other) Application (i.e. which protocol is responsible); Source and destination
  6. The firewall feature in vShield Zones is called VM Wall. This configuration screen reveals one of the most important aspect of the product: the fact that you can create rules based not simply upon individual IP addresses, but upon logical zones. The zones in this case are the ones mentioned earlier: datacenter, cluster, VLAN Because you can create rules based upon zones instead of individual IP addresses, the total number of rules is far fewer than if you simply ported a physical firewall to a virtual appliance. For example, for a typical three-tier app with 4 hosts and 8 VMs per tier, you’d need more than 700 rules if you were using individual IP addresses! By contrast, using logical zones, the number of rules collapses down to a mere 12. A second important point is the fact that these rules need not simply be based on port number, but can be based on application. Due to the built-in application awareness, you can block traffic even for applications that use a range of ports or ephemeral ports. vShield Zones knows when an application is trying to communicate, and block all traffic for that application regardless of which port it tries to use
  7. ! Compliance and governance managers. This group is interested in the fact that a license has been deployed that requires authorization to use, and an audit trail exists that documents use procedures are established and followed. In this case, there need not be a difference between the virtualized and native applications, as either configuration will allow tracking and management of the license through the same tools used today. ThinApp virtualized applications register with WMI (similar to natively installed applications) and can be tracked by the same mechanisms used to inventory and track natively installed applications. Because the virtual package is an .MSI or .EXE, it can also be registered with the Definitive Software Library and tracked through normal change and configuration management and asset management systems used today by natively installed applications.
  8. Pricing considerations are of paramount interest for some customers, but make sure that they also see the value for what they are buying. VMware View is packaged starting at Citrix’s mid tier package offerings, but also compare what is purchased for each option. VMware View Premier offers capabilities not available in Citrix’s top offering, and is priced 36% less.