SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012
|
|
- Sheryl Bates
- 5 years ago
- Views:
Transcription
1 SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012
2 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating Costs Capital Savings Millions Installed Servers Source: IDC 2 Copyright 2010 Juniper Networks, Inc.
3 LARGER POOL, MORE CONSOLIDATION Waste Waste Waste Waste Waste Physical Servers Work Work Work Work Work Work Work Work Work Work Virtualised Servers 3 Copyright 2010 Juniper Networks, Inc.
4 SAME PRINCIPLE, FOR WHOLE DATA CENTERS Small DCs Consolidated DCs 4 Copyright 2010 Juniper Networks, Inc.
5 SECURITY IMPLICATIONS OF VIRTUALIZATION: DYNAMIC VMS CREATE BLIND SPOTS AND INCREASE RISK VMworld 2010 Survey Respondents 55% Move VMs multiple times per day 70% Consolidating mixed trust workloads Lack of clear responsibility for virtualization security Inter VM traffic is handled by the vswitch Flows between VMs on the same machine don t go through the physical security infrastructure VMs change all the time At-a-click provisioning means new VMs sprawl in number and may proliferate risky configurations VMs move VMs can migrate between trust zones automatically and security configuration is not tracked 5 Copyright Copyright Juniper Networks, Inc. Inc.
6 SECURITY IMPLICATION OF VIRTUALIZATION Physical Network Virtual Network VM1 VM2 VM3 Virtual Switch ESX Host HYPERVISOR Firewall/IDS Sees/Protects All Traffic Between Servers Physical Security is Blind to Traffic Between Virtual Machines 6 Copyright 2010 Juniper Networks, Inc.
7 THE ISOLATION CHALLENGE IN THE VSWITCH VM Isolation Challenge vswitches provide only basic connectivity VMs plugged into the same vswitch have direct access via the hypervisor Port groups that are assigned VLAN IDs need a layer 3 device for routing Distributed vswitches don t realistically address security VM admins can assign vnics to any network (even accidentally) 7 Copyright 2010 Juniper Networks, Inc.
8 APPROACHES TO SECURING VIRTUAL NETWORKS 1. VLAN Segmentation 2. Agent-based 3. Kernel-based Firewall VMs segmented into separate VLANs; Inter-VM communications must route through the firewall Drawbacks: Complex VLAN networking; Lacks hypervisor visibility; High overhead VM1 VM2 VM3 Each VM has a software firewall Drawbacks: Significant performance implications; Huge management overhead of maintaining software and signature on 1000s of VMs VM1 VM2 VM3 Inter-VM traffic always protected; Micro-segmenting capabilities High-Performance from implementing firewall in the kernel Secures Hypervisor connections VM1 VM2 VM3 VS ESX Host VS ESX Host FW as Kernel Module ESX Host HYPERVISOR HYPERVISOR VS HYPERVISOR FW Agents 8 Copyright 2010 Juniper Networks, Inc.
9 THE VGW PURPOSE-BUILT APPROACH Service Provider & Enterprise Grade Three Tiered Model VMware Certified (signed binaries!) Protects each VM and the hypervisor Fault-tolerant architecture (i.e., HA) Virtual Center 1 Security Design for vgw VM 2 VM1 VM2 VM3 Virtualization-aware Secure VMotion scales to 1,000+ hosts Auto Secure detects/protects new VMs Granular, Tiered Defense Stateful firewall, integrated IDS, and AV Flexible Policy Enforcement zone, VM group, VM, individual vnic Partner Server (IDS, SIM, Syslog, Netflow) Packet Data 3 THE vgw ENGINE VMWARE API s Any vswitch (Standard, DVS, 3 rd Party) HYPERVISOR VMware Kernel ESX or ESXi Host 9 Copyright 2010 Juniper Networks, Inc.
10 SOLUTION - VGW MODULES Policy Model and Automation VM Visibility Scalability and Performance 10 Copyright 2010 Juniper Networks, Inc.
11 POLICY MODEL Each VM protected by a vgw firewall can be thought of as having its own firewall. To simplify firewall policy management for a large number of VMs, policy can be defined at three different levels: Global policy that applies to each VM. Group policy that applies to each VM in the corresponding policy group. VM policy that applies to a particular VM. The default policy is a special group policy that applies to each VM that does not belong to any policy group. 11 Copyright 2010 Juniper Networks, Inc.
12 AUTOMATION SMART GROUPING OF VM 12 Copyright 2010 Juniper Networks, Inc.
13 VM NETWORK USAGE 13 Copyright 2010 Juniper Networks, Inc.
14 VM INTROSPECTION (APPS INSTALLED) 14 Copyright 2010 Juniper Networks, Inc.
15 COMPLIANCE STATUS 15 Copyright 2010 Juniper Networks, Inc.
16 ANTIVIRUS PERFORMANCE % Performance Degradation (30 VMs MS Office On-Access Execution Time) 4.013% vgw AntiVirus % Competitive AntiVirus (Typical Agent) 2 On-Demand File Scans Run at ~5MB/second!! 3 VM Memory Usage (MB) 4 VM Disk Usage (MB) vgw AntiVirus 5.0 Competitive Antivirus (Typical Agents) vgw AntiVirus 5.0 Competitive Antivirus (Typical Agents) VMs 30 VMs 45 VMs VMs 30 VMs 45 VMs 16 Copyright 2010 Juniper Networks, Inc.
17 PERFORMANCE & SCALABILITY TCP Throughput Test (Standard 1500 Byte packet size). See slide notes for details 17 Copyright 2010 Juniper Networks, Inc.
18 SOLUTION - VGW MODULES Policy Model and Automation VM Visibility Scalability and Performance 18 Copyright 2010 Juniper Networks, Inc.
19 DATA CENTER SECURITY DYNAMICS Switching Routers Physical Security And Virtual Security Changing Requirements Data center scale, visibility and enforcement in both physical and virtual environments Physical security is not enough security services at any location on any flow enforcement flexibility optimizes performance Best in class approach hardware and software scale for physical security software efficiency for virtual security 19 Copyright Copyright Juniper Networks, Inc. Inc.
20 DATA CENTER SRX DELIVERS CONSOLIDATED SECURITY AND NETWORKING Consolidation at Scale Scalable data center security More efficient infrastructure with modular SPCs and IOCs Carrier grade networking powering Top 130 Service Providers & nearly all of Fortune 500 Protecting online assets with AppSecure, IPS, FW, NAT, and more 20 Copyright 2010 Juniper Networks, Inc.
21 ANNOUNCING A DATA CENTER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS Management and Security Services Security Design STRM Security Threat Response Manager Physical Services Virtual Firewall IPS VM VM VM VM vgw Series Hypervisor DoS DoS Protection SRX Series AppSecure vgw Virtual Gateway 21 Copyright Copyright Juniper Networks, Inc. Inc.
22 INTEGRATED SECURITY SOLUTION FOR THE VIRTUALIZED DATA CENTER Scalable Cloud Security Maximize security resource use by eliminating stranded capacity Maximize server infrastructure utilization without compromising security Allows 5x more secure VMs per ESX host than alternatives Adaptive security for dynamic changes Visibility and enforcement for new, changing and moving Virtual Machines Automated VM detection and intelligent enforcement First to continuously enforce a compliant virtual machine security posture Securing across Physical and Virtual New visibility into virtualization security blind spots Visibility and enforcement for any flow in the network Only solution to integrate physical and virtual network security at scale 22 Copyright Copyright Juniper Networks, Inc. Inc.
23
SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationTHE EXPONENTIAL DATA CENTER
THE EXPONENTIAL DATA CENTER THE TYRANNY OF TREES Typical tree configuration Location matters in a tree architecture Bubbles Optimal performance VM One Hop 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net
More informationVMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder
VMWARE SOLUTIONS AND THE DATACENTER Fredric Linder MORE THAN VSPHERE vsphere vcenter Core vcenter Operations Suite vcenter Operations Management Vmware Cloud vcloud Director Chargeback VMware IT Business
More informationWhite Paper. Juniper Networks Cloud Security
Juniper Networks Cloud Security 1 Table of Contents Executive Summary... 3 Introduction Cloud Computing Overview... 3 Private Cloud...4 Public Cloud...4 Hybrid Cloud...4 Evolution in Data Center Technologies
More informationProtecting Physical and Virtual Workloads
WHITE PAPER An Integrated Security Solution for the Virtual Data Center and Cloud Protecting Physical and Virtual Workloads Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationVMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager
VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel
More information1V0-642.exam.30q.
1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationSecuring Your Virtual World Harri Kaikkonen Channel Manager
Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationKaspersky Security for Virtualization Frequently Asked Questions
Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for
More informationSecuring the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationProduct Description. Product Overview DATASHEET
DATASHEET VGW Gateway Product Overview Juniper Networks vgw Gateway is a comprehensive virtualization security solution that includes integrated stateful inspection firewalling, intrusion detection, compliance
More informationENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012
ENTERPRISE SECURITY MANAGEMENT Frederick Verduyckt 20 September 2012 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2012
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationProtecting key applications in the Datacenter
Protecting key applications in the Datacenter SECURITY OUTLOOK Threats get more Sophisticated Flame, Shamoon, Gauss... Dirt Jumper (DDoS) toolkits blend attacks Mobile Malware is exploding APT s Corporate
More informationFIREFLY HOST. Product Description. Product Overview DATASHEET
DATASHEET FIREFLY HOST Product Overview Juniper Networks Firefly Host is a comprehensive virtualization security solution that includes integrated stateful inspection firewalling, intrusion detection,
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationPotpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.
Potpuna virtualizacija od servera do desktopa Saša Hederić Senior Systems Engineer VMware Inc. VMware ESX: Even More Reliable than a Mainframe! 2 The Problem Where the IT Budget Goes 5% Infrastructure
More informationVIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD
VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD Truls Myklebust Director, Product Management Brocade Communications 2011 Brocade Communciations - All Rights Reserved 13 October 2011 THE ENTERPRISE IS GOING
More informationVMware vsphere 4.0 The best platform for building cloud infrastructures
VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence
More informationTHE NETWORK AND THE CLOUD
THE NETWORK AND THE CLOUD BUILDING THE FOUNDATION FOR THE MODERN DATA CENTER Andy Ingram SVP Worldwide Data Centers 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net Occam s Razor: When faced with
More informationNetwork Virtualization Business Case
SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationCisco Virtual Networking Solution for OpenStack
Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides
More informationMICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY Abstract Organizations are in search of ways to more efficiently and securely use IT resources to increase innovation and minimize cost.
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationSecuring the Virtualized Environment: Meeting a New Class of Challenges with Check Point Security Gateway Virtual Edition
Securing the Virtualized Environment: Meeting a New Class of Challenges with Check Point Security Gateway Virtual Edition An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Check Point
More informationSecurity Gateway Virtual Edition
Security Gateway Virtual Edition R75.20 Administration Guide 4 March 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
More informationSRX als NGFW. Michel Tepper Consultant
SRX als NGFW Michel Tepper Consultant Firewall Security Challenges Organizations are looking for ways to protect their assets amidst today s ever-increasing threat landscape. The latest generation of web-based
More informationVMware vsphere Beginner s Guide
The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros
More informationThe rise of SDN: A practitioners deep dive into VMware NSX by Andy Hine
The rise of SDN: A practitioners deep dive into VMware NSX by Andy Hine Introduction The hype about Software Defined Networking (SDN) has been around for years, during which time the technology has rapidly
More informationFirefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran
Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS
More information5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS
5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationVirtual Security Gateway Overview
This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,
More informationVirtual Machine Manager Domains
This chapter contains the following sections: Cisco ACI VM Networking Support for Virtual Machine Managers, page 1 VMM Domain Policy Model, page 3 Virtual Machine Manager Domain Main Components, page 3,
More informationSecurity Gateway Virtual Edition
Security Gateway Virtual Edition R71 Release Notes 9 February 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationWHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security
WHITE PAPER OCTOBER 2017 VMWARE NSX WITH CHECK POINT vsec Enhancing Micro-Segmentation Security Table of Contents Executive Summary 3 VMware NSX Network Virtualization Overview 5 East-West Versus North-South
More informationDISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017
DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017 Table of Contents Executive Summary 3 Introduction 3 vsphere Replication... 3 VMware NSX for vsphere... 4 What
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationMICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY Abstract Organizations are in search of ways to more efficiently and securely use IT resources to increase innovation and minimize cost.
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationA comprehensive framework for securing virtualized data centers. Business white paper
A comprehensive framework for securing virtualized data centers Business white paper Contents Experiencing the virtualization wave...3 Addressing virtualization security challenges...3 Understanding security
More informationvnetwork Future Direction Howie Xu, VMware R&D November 4, 2008
vnetwork Future Direction Howie Xu, VMware R&D November 4, 2008 Virtual Datacenter OS from VMware Infrastructure vservices and Cloud vservices Existing New - roadmap Virtual Datacenter OS from VMware Agenda
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationvshield Quick Start Guide
vshield Manager 4.1.0 Update 1 vshield Zones 4.1.0 Update 1 vshield Edge 1.0.0 Update 1 vshield App 1.0.0 Update 1 vshield Endpoint 1.0.0 Update 1 This document supports the version of each product listed
More informationVMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
More informationVMware Infrastructure The New Computing Platform. Presented by: Nick Smith Corporate Account Manager, VMware
VMware Infrastructure The New Computing Platform Presented by: Nick Smith Corporate Account Manager, VMware VMware: Who We Are World s leading provider of virtualization solutions Founded 1998, IPO August
More informationAgenda Registration & Coffee
Agenda 09.15 Registration & Coffee 09:45 Welcome & Overview - Paul D'Cruz Data Centre Systems Engineering Manager 10:00 Unified Fabric - Virtualising the Network and Storage Domain - Gordon Hirst DC CSE
More informationVMware vsphere with ESX 4.1 and vcenter 4.1
QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.
More informationVMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no
LHC3296BUS OVH: Shields Up! Building a True Security Barrier in the Cloud Chris Romano, Principal Systems Engineer #VMworld #LHC3296BUS VMworld disclaimer This presentation may contain product features
More informationProduct Brief GigaVUE-VM
Product Brief GigaVUE-VM Active Visibility for Virtual Workloads With exponential growth in virtualized traffic within the data center, a primary challenge for the centralized monitoring infrastructure
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationCisco ACI Virtual Machine Networking
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine
More informationVMware vsphere: Fast Track [V6.7] (VWVSFT)
VMware vsphere: Fast Track [V6.7] (VWVSFT) Formato do curso: Presencial Preço: 3950 Nível: Avançado Duração: 50 horas This five-day, intensive course takes you from introductory to advanced VMware vsphere
More informationDELL EMC VSCALE FABRIC
NETWORK DATA SHEET DELL EMC VSCALE FABRIC FIELD-PROVEN BENEFITS Increased utilization and ROI Create shared resource pools (compute, storage, and data protection) that connect to a common, automated network
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More information2018 Cisco and/or its affiliates. All rights reserved.
Beyond Data Center A Journey to self-driving Data Center with Analytics, Intelligent and Assurance Mohamad Imaduddin Systems Engineer Cisco Oct 2018 App is the new Business Developer is the new Customer
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationTHE NEW NETWORK FOR THE DATA CENTER
THE NEW NETWORK FOR THE DATA CENTER Investor Relations Educational Chalk Talk Series June 1, 2010 THE NEW NETWORK FOR THE DATA CENTER Agenda Introduction - Kathleen Bela, VP of Investor Relations Technology
More informationNETWORK VIRTUALIZATION. Fabio Bellini Systems Engineer
NETWORK VIRTUALIZATION Fabio Bellini Systems Engineer fbellini@juniper.net VIRTUALIZATION TECHNOLOGIES Server Virtualization Segmentation of physical servers into multiple OS instances. Vmware, XenSource,
More informationThe Future of Virtualization. Jeff Jennings Global Vice President Products & Solutions VMware
The Future of Virtualization Jeff Jennings Global Vice President Products & Solutions VMware From Virtual Infrastructure to VDC- Windows Linux Future Future Future lication Availability Security Scalability
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationPrivate Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations
Hybrid Cloud Native Public Cloud Private Cloud Public Cloud Edge Consistent Infrastructure & Consistent Operations VMs and Containers Management and Automation Cloud Ops DevOps Existing Apps Cost Management
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationSegmentation. Threat Defense. Visibility
Segmentation Threat Defense Visibility Establish boundaries: network, compute, virtual Enforce policy by functions, devices, organizations, compliance Control and prevent unauthorized access to networks,
More informationWeiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung. Alexei Agueev, Systems Engineer
Weiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung Alexei Agueev, Systems Engineer ETHERNET MIGRATION 10G/40G à 25G/50G/100G Interface Parallelism Parallelism increases
More informationThe Convergence of Storage and Server Virtualization Solarflare Communications, Inc.
The Convergence of Storage and Server Virtualization 2007 Solarflare Communications, Inc. About Solarflare Communications Privately-held, fabless semiconductor company. Founded 2001 Top tier investors:
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationNew Features in VMware vsphere (ESX 4)
New Features in VMware vsphere (ESX 4) VMware vsphere Fault Tolerance FT VMware Fault Tolerance or FT is a new HA solution from VMware for VMs. It is only available in vsphere 4 and above and provides
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationThe Future of Virtualization Desktop to the Datacentre. Raghu Raghuram Vice President Product and Solutions VMware
The Future of Virtualization Desktop to the Datacentre Raghu Raghuram Vice President Product and Solutions VMware Virtualization- Desktop to the Datacentre VDC- vcloud vclient With our partners, we are
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI1303BU Security with NSX. Greater Security in the Digital Business Age Alex Berger, NSX Product Marketing #VMworld #SAI1303BU Disclaimer This presentation may contain product features that are currently
More informationVMware HA: Overview & Technical Best Practices
VMware HA: Overview & Technical Best Practices Updated 8/10/2007 What is Business Continuity? Business Continuity = Always-on uninterrupted availability of business systems and applications Business Continuity
More informationLecture 09: VMs and VCS head in the clouds
Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationIXIA PHANTOM VTAP WITH TAPFLOW FILTERING
IXIA PHANTOM VTAP WITH TAPFLOW FILTERING DATA SHEET OVERVIEW The Ixia Phantom vtap with TapFlow filtering is a software solution providing crystal-clear visibility into virtual data center network traffic.
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports
More informationNetwork Configuration Example
Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release NCE 33 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
More informationOrchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud
Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack
More informationVblock Architecture Accelerating Deployment of the Private Cloud
Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product
More information