Security in a Virtualized Environment with TrendMicro
|
|
- Dwayne Holmes
- 6 years ago
- Views:
Transcription
1 Security in a Virtualized Environment with TrendMicro Bob van der Werf Partner Systems Engineer Andre Noordam Trend Micro
2 Agenda VMware vshield VMware VMSafe API TrendMicro solutions integration Smart Protection Strategy introduction Virtualization Security for VMware
3 VMware vsphere 4.0.Net Windows Linux J2EE Grid Web 2.0 SaaS v vcenter Suite Availability Security Scalability lication Services VMotion Storage VMotion HA Fault Tolerance Data Recovery vshield Zones VMSafe DRS Hot Add Infrastructure Services vcompute vstorage vnetwork ESX ESXi DRS/DPM VMFS Thin Provisioning Distributed Switch VMware vsphere 4.0 Internal Cloud External Cloud
4 Challenges with Traditional Network Security Physical Network Security in Virtual Environments External chokepoints that splinter resource pools Disrupts cloud vision of seamless pool of resources No inter-vm visibility Unable to monitor traffic within an ESX host Statically configured Too rigid to adapt to changes in infrastructure Unable to maintain network session state with live migration (VMotion) or live failover (FT)
5 vshield Zones Capabilities Bridge, firewall, or isolate VM zones based on familiar VI containers Monitor allowed and disallowed activity by application-based protocols (Windows RPC, Oracle TNS, FTP, etc) One-click flow-to-firewall blocks precise network traffic Benefits Well-defined security posture within virtual environment Monitoring and assured policies, even through Vmotion and VM lifecycle events Simple zone-based rules reduces policy errors
6 Key Use Cases for vshield Zones Virtualizing the datacenter DMZ servers Collapsing DMZ boundary using virtual firewalls Compliance Intrusion prevention, web app firewalls, other prescribed network security Monitoring of successful and unsuccessful network connections Consistent network security policies for replicated environments Failover and high availability backups Datacenter-in-a-box for SMB and Remote Office/Branch Office Network isolation for multi-tenant clouds
7 VMware vshield Zones Architecture vshield Host Gateway Virtual Network Monitoring Virtual Network Firewall Transparently Managed vshield Manager Centralized Monitoring Centralized Policy Assignment Web-based interface VMware vcenter vshield VMware ESX vshield VMware ESX vshield VMware ESX VMware vshield Manager
8 Introducing VMsafe Security VM HIPS Firewall IPS/IDS Anti-Virus Security API ESX New security solutions can be developed and integrated into VMware virtual infrastructure Protect the VM by inspection of virtual components (CPU, Memory, Network and Storage) Complete integration and awareness of VMotion, Storage VMotion, HA, etc. Provides an unprecedented level of security for the application and the data inside the VM
9 VMsafe APIs API s for all virtual hardware components of the VM CPU/Memory Inspection Inspection of specific memory pages being used by the VM or it applications Knowledge of the CPU state Policy enforcement through resource allocation of CPU and memory pages Networking View all IO traffic on the host Ability to intercept, view, modify and replicate IO traffic from any one VM or all VM s on a single host. Capability to provide inline or passive protection Storage Ability to mount and read virtual disks (VMDK) Inspect IO read/writes to the storage devices Transparent to the device and inline of the ESX Storage stack
10 TrendMicro START Trend Micro solutions integration Immediate protection, less complexity, greater flexibility Andre Noordam Senior Pre Sales Engineer
11 Agenda VMware vshield VMware VMSafe API TrendMicro solutions integration Smart Protection Strategy introduction Virtualization Security for VMware
12 Agenda VMware vshield VMware VMSafe API TrendMicro solutions integration Smart Protection Strategy introduction Virtualization Security for VMware
13 Company overview Founded Headquarters Employees Market 2008 Revenue United States in 1988 Tokyo, Japan 4,120 Internet Content Security US $985 Million CEO Eva Chen 10 global TrendLabs locations; 9 global R&D centers Tokyo Stock Exchange (4704)
14 Security Evolution Continuous Innovation Integrated Gateway Content Security InterScan Messaging Security Suite Botnet Identification Service Data Leak Prevention LeakProof LAN Server Virus Protection ServerProtect Server-based Virus Protection ScanMail Threat Lifecycle Management Strategy Enterprise Protection Strategy (EPS) Trend Micro and Cisco Integrated Security in the Network Trend Micro Smart Protection Network Gateway Virus Protection InterScan Web Filtering InterScan WebManager 2-Hour Virus Response SLA Compliance Message Archiver & Encryption Web-based Centralized Management Trend Micro Control Manager Reputation Services Network Access Control Network VirusWall Software as a Service SecureCloud Web Threat Protection Web Reputation
15 Threat Environment Evolution to Crimeware Web Threats Crimeware Intelligent Botnets Complexity Vulnerabilities Worm Outbreaks Spam Mass Mailers Spyware Information Stealing Botnet Enabled Multi-Vector Multi-Component Web Polymorphic Rapid Variants Single Instance Single Target Regional Attacks Silent, Hidden Hard to Clean
16 Example of todays threats Social engineering takes on a physical form as flyers are placed on car windshields in a North Dakota parking lot. These flyers bear a malicious URL.
17 Example of todays threats This series of malicious activities happens when a user tries to access the URL printed in the flyer
18 Pattern Matching a challenge for everyone -Test.org s Sample Collection 11,000,000+ Unique Samples Added Actual Forecast Source: -Test.org, June 2008
19 Traditional Endpoint Security Can t Keep Up Signature file updates take too long Delay protection across all clients and servers Leave a critical security gap Require multiple updates a day to keep up with threats, complicating signature management 16,438 26,598 Signature files are becoming too big Increase endpoint memory footprint 10,160 Increase impact on endpoint performance Increase bandwidth utilization 6,279 Unpredictable increase of client size ,484 2,397 3,881 Unique threat samples PER HOUR
20 Next generation architecture Threat Protection Databases Slowly Updating Patterns < 50 Per Day Small Pattern DB PAST Patterns Past
21 Trend Micro Smart Protection Network Security Made Smarter Threats WEB REPUTATION REPUTATION FILE REPUTATION Threat Collection Back-end Correlation
22 Trend Micro Smart Protection Network Trend Micro Multi-Layered Architecture Management Threats EXTERNAL THREATS Viruses Spyware & Adware Spam & Phishing Web Threats Gateway Servers Trend Micro Control Manager Endpoint Services ScanMail Solutions LeakProof Data Leak Prevention Solution InterScan Web Security Solutions IM Security for LCS Solution Web and Reputation InterScan Messaging Hosted Security ServerProtect Security Solutions OfficeScan Client Security Solution Reputation Anti-Spyware Antivirus INTERNAL THREATS Information Leaks Compliance Vulnerabilities InterScan Messaging Security Solutions SharePoint Portal Security Solution Trend Micro Mobile Security Solution Off Network Anti-Spam Anti-Phishing Inappropriate Content OfficeScan Client Security Solution
23 Trend Micro OfficeScan Client-Server Suite Immediate Protection Endpoint Defense Web and File Reputation in the Smart Protection Network Endpoint-centric security HIPS and new device control A complete suite of endpoint security products protecting all clients, servers, and mobile devices regardless of location or network connectivity. Less Complexity Easy Management Single Web-based management console Role-based administration Active Directory integration More Flexibility Plug-in Architecture Adaptive approach to changing threats Multiple device and OS support
24 OfficeScan Client-Server Suite More Flexibility More Protection Points Desktops Laptops Servers Virtual Machines Macs Smartphones PDAs Storage liances More Platforms Windows XP Windows Vista Windows Server2003 Windows Server2008 Mac OS Linux Windows Mobile 5.x Windows Mbile 6.x Symbian OS VMware ESX
25 OfficeScan Client-Server Suite More Flexibility OfficeScan Plug-in architecture Select the security you want to deploy, when, and where Easily add new modules, as needed As soon as new technologies become available At any time your needs change Extends your solution lifecycle Protects your investment No need to rip-and-replace to be protected Plug-in Manager Anti-malware File & Folder Encryption HIPS & Vulnerability shielding Mobile Security Security for Macintosh Virtualization Security MODULAR PLUG-IN ARCHITECTURE
26 Agenda VMware vshield VMware VMSafe API TrendMicro solutions integration Smart Protection Strategy introduction Virtualization Security for VMware
27 Trend Micro Virtualization Security Current Market Situation Existing content security solutions underperform in virtual environments They are unable to scan vulnerable dormant VMs Virtual Machines ESX Server (X86) Physical Server Simultaneous full system malware scans causes huge performance degradation
28 Trend Micro Virtualization Security Dormant Virtual Machines Need Protection Dormant VM Dormant VM Active VM Active VM Active VM ESX Server Dormant VMs have no anti-malware agent running but can still get infected Aged dormant VMs will be way behind with pattern update
29 Trend Micro Virtualization Security Scheduled Scanning with Existing Solutions Scan 3:00AM Scan 3:00AM Scan 3:00AM Scan 3:00AM Scan 3:00AM Scan 3:00AM Typical Console ESX Server Typical solutions are not VI-aware Simultaneous full scans will cause system thrashing
30 Trend Micro Virtualization Security Anti-malware protection for offline and online virtual machines. Signature update for offline Virtual Machines. Full integration with OfficeScan and Vmware ESX. Supports VMsafe API. Management via vcenter console. Plug-in for Trend Micro OfficeScan. Supports Trend Micro Lightweight Smart Protection agent for realtime protection
31 Trend Micro Virtualization Security Scanning with Virtualization Security Dormant VM Dormant VM Active VM Active VM Active VM Scanning agent Virtualization Security Console VMsafe APIs VirtualCenter ESX Server Virtualization Security scans and remediates offline VMs Virtualization Security integrates with VMware Virtual Center
32 Trend Micro Virtualization Security Scheduled Scanning Scan 3:00AM Scan 3:00AM Scan 3:10AM Scan 3:00AM Scan 3:10AM Dormant VM Dormant VM Active VM Active VM Active VM Scanning agent Virtual Center Virtualization Security Console VMsafe APIs ESX Server VMsafe APIs ESX Server VMsafe APIs ESX Server Virtualization Security is set up to be VI Aware Scheduled scans on the same physical server are automatically staggered
33 Trend Micro Virtualization Security Summary We solve the pattern volume problem File Reputation Web Reputation Vulnerability shielding We solve the Endpoint performance drop problem Cloud-Client Architecture Frees resources Offloads growing patterns to the cloud We provide full VMware support OfficeScan VMSafe Plug-in architecture Virtual liances All current products are support in a vmware environment
34 Thank you
Securing the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationPotpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.
Potpuna virtualizacija od servera do desktopa Saša Hederić Senior Systems Engineer VMware Inc. VMware ESX: Even More Reliable than a Mainframe! 2 The Problem Where the IT Budget Goes 5% Infrastructure
More informationThe Future of Virtualization. Jeff Jennings Global Vice President Products & Solutions VMware
The Future of Virtualization Jeff Jennings Global Vice President Products & Solutions VMware From Virtual Infrastructure to VDC- Windows Linux Future Future Future lication Availability Security Scalability
More informationThe Future of Virtualization Desktop to the Datacentre. Raghu Raghuram Vice President Product and Solutions VMware
The Future of Virtualization Desktop to the Datacentre Raghu Raghuram Vice President Product and Solutions VMware Virtualization- Desktop to the Datacentre VDC- vcloud vclient With our partners, we are
More informationVMware vsphere 4.0 The best platform for building cloud infrastructures
VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationVMware vsphere 4. The Best Platform for Building Cloud Infrastructures
Table of Contents Get the efficiency and low cost of cloud computing with uncompromising control over service levels and with the freedom of choice................ 3 Key Benefits........................................................
More informationBack To The Future - VMware Product Directions. Andre Kemp Sr. Product Marketing Manager Asia - Pacific
Back To The Future - VMware Product Directions Andre Kemp Sr. Product Marketing Manager Asia - Pacific Disclaimer This session contains product features that are currently under development. This session/overview
More informationKaspersky Security for Virtualization Frequently Asked Questions
Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for
More informationAS Stallion. Security for Virtual Server Environments. Urmas Püss
AS Stallion 110311 Security for Virtual Server Environments Urmas Püss 1 Trend 1: Threat Evolution & Perimeter Porosity Trend 2: Challenges of Dynamic Datacenter Deep Security: Make Servers Self-Defending
More informationEnsure Virtualization Security and Improve Business Productivity with Kaspersky
Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product
More informationVMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager
VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationIT Infrastructure: Poised for Change
IT Infrastructure: Poised for Change David Freund Corporate Virtual Architect EMC Corporation October, 2009 Copyright 2009 EMC Corporation. All rights reserved. 1 Things Change The Big Question What s
More informationTrend Micro and IBM Security QRadar SIEM
Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro
More informationSecuring Your Virtual World Harri Kaikkonen Channel Manager
Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000
More informationOfficeScan 10 Cloud Client File Reputation Technology
OfficeScan 10 Cloud Client File Reputation Technology Stallion Spring Seminar 2009 Veli-Pekka Kusmin Pre-Sales Engineer Trend Micro 3 rd June 2009 OfficeScan 10 (OSCE) Cloud Client File Reputation Technology
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationProtecting Your Digital World
Protecting Your Digital World C O R P O R A T E O V E R V I E W With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by
More informationSAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012
SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating
More informationCisco Expo 2009 Bratislava. Chief Technology Officer VMware, Inc.
Cisco Expo 009 Bratislava Chief Technology Officer VMware, Inc. Jan Kvinta Territory Sales Manager jkvinta@vmware.com +40 75 73 33 Chief Technology Officer VMware, Inc. Marek Bražina System Engeneer mbrazina@vmware.com
More informationSaaS Flyer for Trend Micro
SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationIT as a Service (Internally or Externally Provisioned) Efficiency. Control. Choice. VMware vsphere 4.0
1 VMware vsphere 4.0 The best platform for building cloud infrastructures The Problem Where the IT Budget Goes 5% Infrastructure Investment 23% Application Investment 42% Infrastructure Maintenance Overwhelming
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationAutomated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend
SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security
More informationRet h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s
I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream
More informationVMware - VMware vsphere: Install, Configure, Manage [V6.7]
VMware - VMware vsphere: Install, Configure, Manage [V6.7] Code: Length: URL: EDU-VSICM67 5 days View Online This five-day course features intensive hands-on training that focuses on installing, configuring,
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationDeep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationProactive Approach to Cyber Security
Proactive roach to Cyber Security Jeffrey Neo Sales Director HP Enterprise Security Products Customers struggle to manage the security challenge Today, security is a board-level agenda item 2 Trends driving
More informationDeep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationVMware Vision and Future Directions Jan Kvinta
VMware Vision and Future Directions Jan Kvinta Click to edit Master text styles The Worldwide Server Market CY2007: 8M total server units shipped (x86 server units =7.6M) Other Servers 5% x86 servers
More informationEnterprise X-Architecture 5th Generation And VMware Virtualization Solutions
Steve Sue VMware PSE June-8 th -2010 Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions 2010 IBM Corporation Virtualization Spending Priority Goldman Sachs 2010 Key Tech Trends
More informationBUFFERZONE Advanced Endpoint Security
BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,
More informationNew Features in VMware vsphere (ESX 4)
New Features in VMware vsphere (ESX 4) VMware vsphere Fault Tolerance FT VMware Fault Tolerance or FT is a new HA solution from VMware for VMs. It is only available in vsphere 4 and above and provides
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationTrend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
More informationVMware vsphere 6.5: Install, Configure, Manage (5 Days)
www.peaklearningllc.com VMware vsphere 6.5: Install, Configure, Manage (5 Days) Introduction This five-day course features intensive hands-on training that focuses on installing, configuring, and managing
More informationHerd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist
Herd Intelligence: true protection from targeted attacks Ryan Sherstobitoff, Chief Corporate Evangelist Complexity Web Based Malware Attacks Crimeware Intelligent Botnets Vulnerabilities Worm/ Outbreaks
More informationKASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security
KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationVMware vsphere Administration Training. Course Content
VMware vsphere Administration Training Course Content Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Fast Track Course Duration : 10 Days Class Duration : 8 hours
More informationACCELERATE THE JOURNEY TO YOUR CLOUD
ACCELERATE THE JOURNEY TO YOUR CLOUD With Products Built for VMware Rob DeCarlo and Rob Glanzman NY/NJ Enterprise vspecialists 1 A Few VMware Statistics from Paul Statistics > 50% of Workloads Virtualized
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationVMware vsphere with ESX 4.1 and vcenter 4.1
QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.
More informationCombating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi
Combating APTs with the Custom Defense Solution Hans Liljedahl Peter Szendröi RSA Attack Overview : 1. Two spear phishing emails were sent over a two-day period targeted at low to mid- xls attachment with
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationBUFFERZONE Advanced Endpoint Security
BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationVMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2
VSPP Product Usage Guide VMware Service Providers Program (VSPP) VSPP Product Usage Guide VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2 2011 VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304
More informationVblock Architecture Accelerating Deployment of the Private Cloud
Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationSecurity for the Cloud Era
Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises
More informationVMware vsphere Beginner s Guide
The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros
More informationVI3 to vsphere 4.0 Upgrade and New Technology Ultimate Bootcamp
VI3 to vsphere 4.0 Upgrade and New Technology Ultimate Bootcamp Course Length: 2 Days Course Overview This instructor-led course covers everything the student needs to know to upgrade from VMware 3.x to
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationAnnexure E Technical Bid Format
Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationHardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012
Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What
More information[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5]
[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5] Length Delivery Method : 5 Days : Instructor-led (Classroom) Course Overview This five-day course features intensive hands-on training that
More informationVirtualizing Oracle on VMware
Virtualizing Oracle on VMware Sudhansu Pati, VCP Certified 4/20/2012 2011 VMware Inc. All rights reserved Agenda Introduction Oracle Databases on VMware Key Benefits Performance, Support, and Licensing
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationTrend Micro Deep Security
Trend Micro Deep Security Endpoint Security Similarities and Differences with Cisco CSA A Trend Micro White Paper May 2010 I. INTRODUCTION Your enterprise invested in Cisco Security Agent (CSA) because
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationAnd do it with less...
Operating Systems The Foundation of the Private Cloud Prevailing CIO Challenges Cut Power Consumption Better Support the Business Get a Better Return on Investments Address Technological Complexity Today
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationVMware vsphere: Fast Track [V6.7] (VWVSFT)
VMware vsphere: Fast Track [V6.7] (VWVSFT) Formato do curso: Presencial Preço: 3950 Nível: Avançado Duração: 50 horas This five-day, intensive course takes you from introductory to advanced VMware vsphere
More informationFoundation for Cloud Computing with VMware vsphere 4
21 Short Topics in System Administration Jane-Ellen Long, Series Editor Foundation for Cloud Computing with VMware vsphere 4 John Arrasjid, Duncan Epping, and Steve Kaplan Published by the USENIX Association
More informationSecurity Gateway Virtual Edition
Security Gateway Virtual Edition R71 Release Notes 9 February 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
More information