Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management

Size: px
Start display at page:

Download "Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management"

Transcription

1 Streamlining User, Data and Network Defense in a Multi-Level Environment Steve Stratton Sr. Director Product Management Copyright 2016 Forcepoint. All rights reserved.

2 CYBER TRENDS Increasing Connectivity More Dangerous Threat Landscape Evolving Requirements Dissolving Security Perimeter Persistent Adversaries More Advanced Integrations Mobility and Cloud Computing Advancements in Data Driven Attacks Evolving Security Controls Increasing Data Mobility Increasing Data Complexity Increasing Data Volume Copyright 2016 Forcepoint. All rights reserved. 2

3 CROSS DOMAIN AND NEED TO ACCESS Cross Domain Solutions provide secure mechanisms to access data in multiple security domains Access to networks and data at different classifications, compartments, or under different authorities Many missions are now dependent on using data that is located in multiple enclaves Stove-pipes are no longer effective The need to access must be balanced against the need to protect What risk does the connection introduce to the environment? How is that risk captured, mitigated and monitored? Copyright 2016 Forcepoint. All rights reserved. 3

4 CROSS DOMAIN ACCESS PROBLEM Copyright 2016 Forcepoint. All rights reserved. 4

5 TRUSTED THIN CLIENT FEATURES & BENEFITS Secure, simultaneous cross domain access to critical agency resources from a single endpoint Centralized management and monitoring Streamlines administration while increasing enterprise data security Increased productivity, lowers costs, high security posture, prevention of data spills and leakage Hardware and virtual desktop infrastructure (VDI) agnostic, supports numerous peripherals Reduces desktop hardware and allows for space reclamation Reduces infrastructure for cabling and cooling Supports accessories including webcams, smartcards, multi-media redirection & unified communications (Citrix Microsoft Lync Support) Remote access capability and extension to mobile devices Included on the Unified Cross Domain Services Management Office (UCDSMO) Baseline Top Secret and Below Interoperability (TSABI) Secret and Below Interoperability (SABI) Copyright 2016 Forcepoint. All rights reserved. 5

6 TRUSTED THIN CLIENT CONFIGURATION FLEXIBILITY Direct Hardware Support Thin client hardware Dell/Wyse, HP, etc. Standard PCs Hardware reuse Required for (8) monitor deployments List of certified hardware is available Hosted Deployments Type II hypervisors VMware Player Oracle VM VirtualBox Type I hypervisors XenClient XenClient XT KVM Trusted Thin Client Remote Access Packaged configuration that supports multiple VMs for Suite B, CSfC approved communications Trusted Access Mobile Android redisplay Currently single level Copyright 2016 Forcepoint. All rights reserved. 6

7 VDI SYSTEM ARCHITECTURE OVERVIEW Users Traditional DDC/ZDC (Connection Broker) Domain Controller Network B Database Server Desktop Delivery Application Delivery Provisioning Server (OS & Applications) XenServer Network-based Print Services Storage Appliance Multiple Monitors Distribution Console vcenter (Connection Broker) Domain Controller Network C Database Server ThinApp ESX Server Desktop Images Network-based Print Services Storage Appliance Remote Access Virtual Access Connection Broker Domain Controller Network D Database Server VERDE -- Linux Provisioning Server (OS & Applications) Desktop Images Network-based Print Services Storage Appliance 11/10/ Copyright 2016 Forcepoint. All rights reserved. 7

8 TRUSTED THIN CLIENT UCDMO Baseline Technology Classification levels clearly displayed Consolidated access with Trusted Thin Client Copyright 2016 Forcepoint. All rights reserved. 8

9 ENTERPRISE DISTRIBUTION CONSOLE SPANNING A C C E S S Copyright 2016 Forcepoint. All rights reserved. 9

10 HIGH RISK NETWORK MITIGATION OPTION Double VDI Hop Architecture Provides protocol break and data transformation through the use of a second VDI solution Different vendors/implementation for high risk networks Copyright 2016 Forcepoint. All rights reserved. 10

11 TRUSTED THIN CLIENT SMALL TO LARGE Tactical Customer Example Submarine Radio Room Navy CANES Enterprise Customer Example Intelligence Community Enterprises FBI Customer with 56 networks OCONUS deployments Australia, Canada, UK Over 100,000 Seats In Operation Copyright 2016 Forcepoint. All rights reserved. 11

12 SUMMARY You can! Improve your cyber defense through a reduction in end user computing devices Make use of trusted operating systems and applications that are much easier and less costly to manage then single silo traditional systems Streamline user access to multiple backend systems and data sources at different classification levels Create new COI and enclaves in minutes versus days mission speed Provide significant power, weight, cooling and device costs savings. Copyright 2016 Forcepoint. All rights reserved. 12

13 Thank You 11/10/ Copyright Copyright Forcepoint. Forcepoint. All rights All rights reserved. reserved. 13

14 Overview Streamline User, Data, and Network Defence in a Multi-Level Environment will discuss how you can make it harder for adversaries to find and breach your most sensitive data when faced with the distributed realities of a multi-level environment consisting of 2, 3, 4 or more networks. Trusted Thin Client, an authorised multi-level access solution, provides the capability to consolidate one of the more vulnerable aspects of your environment: many endpoint devices per user, all with local storage. Trusted Thin Client reduces the attack surface by replacing separate endpoints for each network with a single read-only device. Leveraging virtual desktop infrastructure (VDI) technologies, all desktop images and data are stored and managed in a central datacentre. This approach separates the data from the device and delivers seamless access to all allowed networks from approved devices and locations.

Presentation Title 11/13/2013

Presentation Title 11/13/2013 Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013

More information

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009 VMware Enterprise Desktop Solutions: What s NEW with VMware View 3 John Hinkle Professional Services Practice principal February 18 th, 2009 Agenda What is VMware View 3 Market Momentum What s new with

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary

More information

Dell DVS. Enabling user productivity and efficiency in the Virtual Era. Dennis Larsen & Henrik Christensen. End User Computing

Dell DVS. Enabling user productivity and efficiency in the Virtual Era. Dennis Larsen & Henrik Christensen. End User Computing Dell DVS Enabling user productivity and efficiency in the Virtual Era Dennis Larsen & Henrik Christensen Agenda Dells view on VDI Dell Desktop Virtualization Solutions DVS Enterprise DVS Simplified (incl.

More information

HP Virtual Desktop Infrastructure with VMware View Overview

HP Virtual Desktop Infrastructure with VMware View Overview Overview HP Virtual Desktop Infrastructure (VDI) is an end-to-end client virtualization solution based on the best managed and virtualizationready HP ProLiant and BladeSystem servers, HP Storage Works

More information

Windows Server VDI for Service Providers. White Paper Parallels Remote Application Server 2017

Windows Server VDI for Service Providers. White Paper Parallels Remote Application Server 2017 Windows Server VDI for Service Providers White Paper Parallels Remote Application Server 2017 Table of Contents Optimize VDI for xsps and ISVs... 3 Microsoft SPLA Pricing for Two Processor Model... 3 Parallels

More information

Dell Cloud Client Computing. Dennis Larsen DVS Specialist Dell Cloud Client Computing

Dell Cloud Client Computing. Dennis Larsen DVS Specialist Dell Cloud Client Computing Dell Cloud Client Computing Dennis Larsen DVS Specialist Dell Cloud Client Computing Dennis_larsen@dell.com What is Dell Cloud Client Computing (CCC)? Desktop Virtualization Solutions (DVS) Dell cloud

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SIE2034BE Securing your VMware Horizon Virtualized Apps and Desktop Investments with NSX Satish Yadavalli, General Manager & Global Practice Head Wipro Limited Bhanu Reddy, Practice Manager Wipro Limited

More information

DELL EMC VDI Complete Solutions. Accelerate your IT Transformation. Marek Bartyzel Product Specialist Dell Cloud client-computing

DELL EMC VDI Complete Solutions. Accelerate your IT Transformation. Marek Bartyzel Product Specialist Dell Cloud client-computing GLOBAL SPONSORS DELL EMC VDI Complete Solutions Accelerate your IT Transformation Marek Bartyzel Product Specialist Dell Cloud client-computing DellEMC Forum Baltics 2017 GLOBAL SPONSORS Compute continues

More information

Datacenter Security: Protection Beyond OS LifeCycle

Datacenter Security: Protection Beyond OS LifeCycle Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000

More information

Integrating NComputing Virtual Desktops with Citrix and VMware. April 21, 2010

Integrating NComputing Virtual Desktops with Citrix and VMware. April 21, 2010 Integrating NComputing Virtual Desktops with Citrix and VMware April 21, 2010 Topics Trends & Challenges in Desktop Virtualization NComputing Virtual Desktops Leveraging Best of Breed Technologies Cloud

More information

Mobile Computing and Virtual Desktops

Mobile Computing and Virtual Desktops Mobile Computing and Virtual Desktops buzzetti@us.ibm.com The IBM Worldwide Design Centers comprise certified IT architects and specialists using state-of-the-art methodologies and technologies in the

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning

More information

Oracle Virtual Desktop Infrastructure

Oracle Virtual Desktop Infrastructure Oracle Virtual Desktop Infrastructure Best Practice and Unit Selling Points Thomas Assum and Rolf-Per Thulin Sales Consultants Europe VDI Global Business Unit Agenda Oracle Desktop Virtualization Introduction

More information

LIGHT AGENT OR AGENTLESS

LIGHT AGENT OR AGENTLESS LIGHT AGENT OR AGENTLESS A Features Guide to Kaspersky Security for Virtualization www.kaspersky.com 2 With virtualization becoming ever more widespread, the need for adequate security solutions is self-evident.

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy [TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy Mounir Chaaban & Riaz Salim Account Technology Strategist Microsoft Corporation Microsoft s Vision

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Imperva SecureSphere Appliances

Imperva SecureSphere Appliances Imperva SecureSphere Appliances DATASHEET Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,

More information

VMware vsphere: Taking Virtualization to the Next Level

VMware vsphere: Taking Virtualization to the Next Level About this research note: Product Evaluation notes provide an analysis of the market position of a specific product and its vendor through an in-depth exploration of their relative capabilities. VMware

More information

Safeguard Application Uptime and Consistent Performance

Safeguard Application Uptime and Consistent Performance Safeguard Application Uptime and Consistent Performance A software-first approach to delivering applications across hybrid and multi-cloud architectures. 1 Safeguard Application Uptime and Consistent Performance

More information

Alcatel-Lucent OmniVista 2500 Network Management System

Alcatel-Lucent OmniVista 2500 Network Management System Alcatel-Lucent OmniVista 2500 Network Management System The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency

More information

Copyright 2012 EMC Corporation. All rights reserved. EMC VSPEX. Christian Stein

Copyright 2012 EMC Corporation. All rights reserved. EMC VSPEX. Christian Stein 1 EMC VSPEX Christian Stein Christian.stein@emc.com 2 Cloud A New Architecture Old World Physical New World Virtual Dedicated, Vertical Stacks Dynamic Pools Of Compute & Storage Three Paths To The Private

More information

VMware EUC a competitor to Citrix? 2010 VMware Inc. All rights reserved

VMware EUC a competitor to Citrix? 2010 VMware Inc. All rights reserved VMware EUC a competitor to Citrix? 2010 VMware Inc. All rights reserved Who? Name : Duco Jaspars Role : Consultant/Owner vconsult : http://blog.vconsult.nl/ : @vconsult 2 Who? Name : Kees Baggerman Role

More information

Technical Overview. Jack Smith Sr. Solutions Architect

Technical Overview. Jack Smith Sr. Solutions Architect Technical Overview Jack Smith Sr. Solutions Architect Liquidware Labs Methodology Production Environments Assess Design POCs/Pilots Stratusphere FIT Stratusphere UX Validate Migrate ProfileUnity FlexApp

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

QuickSpecs. HP Client Virtualization with Citrix XenDesktop. Overview. Retired

QuickSpecs. HP Client Virtualization with Citrix XenDesktop. Overview. Retired Overview The HP and Citrix Client Virtualization Solution is a seamless end-to-end client virtualization infrastructure solution that allows administrators to provide one of the best managed desktop and

More information

DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY

DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway. Luigi MARCOCCHIA SOFTWAY DC: Le Converged Infrastructure per Software Defined e Cloud Cisco NetApp - Softway Luigi MARCOCCHIA SOFTWAY Today s Businesses Require Greater Agility Focus on increasing speed of business Customers expect

More information

Proactive Approach to Cyber Security

Proactive Approach to Cyber Security Proactive roach to Cyber Security Jeffrey Neo Sales Director HP Enterprise Security Products Customers struggle to manage the security challenge Today, security is a board-level agenda item 2 Trends driving

More information

Foundation for Cloud Computing with VMware vsphere 4

Foundation for Cloud Computing with VMware vsphere 4 21 Short Topics in System Administration Jane-Ellen Long, Series Editor Foundation for Cloud Computing with VMware vsphere 4 John Arrasjid, Duncan Epping, and Steve Kaplan Published by the USENIX Association

More information

That Set the Foundation for the Private Cloud

That Set the Foundation for the Private Cloud for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. 1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 : INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Citrix XenDesktop 7.15 LTSR Platinum Edition and Citrix XenApp 7.15 LTSR Platinum Edition 30 January 2018 383-4-433 v1.0 Government of Canada. This document is the

More information

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service DATASHEET VMWARE 7 AT A GLANCE 7 delivers virtualized or hosted desktops and applications through a single platform to end users. These desktop and application services including Remote Desktop Services

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Cisco VXI Smart Solution with VMware View

Cisco VXI Smart Solution with VMware View Cisco VXI Smart Solution with VMware View What You Will Learn IT departments are inundated with user demands for wider mobile access, video and interactive multimedia services, new devices, and more flexible

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY From inside your existing computer, you can

More information

Desktop Virtualization for Higher Education. The Virtual Lab

Desktop Virtualization for Higher Education. The Virtual Lab Desktop Virtualization for Higher Education The Virtual Lab What is the Virtual Lab? WHAT IS THE VIRTUAL LAB? Transformational technology for Higher Ed labs collaboration between Dell & VMware Virtualize

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

DELL EMC VDI Complete Solutions. Accelerate your Workforce Transformation. Michael Haase Product Technologist Consultant Dell Cloud client-computing

DELL EMC VDI Complete Solutions. Accelerate your Workforce Transformation. Michael Haase Product Technologist Consultant Dell Cloud client-computing GLOBAL SPONSORS DELL EMC VDI Complete Solutions Accelerate your Workforce Transformation Michael Haase Product Technologist Consultant Dell Cloud client-computing Wien, 14.09.2017 GLOBAL SPONSORS Compute

More information

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Ensure Virtualization Security and Improve Business Productivity with Kaspersky Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product

More information

Convergence is accelerating the path to the New Style of Business

Convergence is accelerating the path to the New Style of Business Convergence is accelerating the path to the New Style of Business HP Hyper-Converged Systems Franz Weberberger Presales Consultant HP Servers Copyright 2012 Hewlett-Packard Development Company, L.P. The

More information

Expand Virtualization. Maintain Security.

Expand Virtualization. Maintain Security. Expand Virtualization. Maintain Security. Key security decisions for virtualized infrastructures As enterprises make virtualization mission-critical for servers for servers and desktops, and desktops,

More information

Acer Shared Resource Computing (SRC) Solution Brief

Acer Shared Resource Computing (SRC) Solution Brief Acer Shared Resource Computing (SRC) Solution Brief As business grows, the number of personal computers and servers continues to stagger, and the cost is incremental to maintain and service. More and more

More information

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection

More information

About Us. Innovating proven technology for practical security solutions

About Us. Innovating proven technology for practical security solutions Rethink Security About Us Innovating proven technology for practical security solutions Virtualization Security Application Security Platform Security Cross Domain Security Desktop Consolidation Case Study

More information

Securing Your Virtual World Harri Kaikkonen Channel Manager

Securing Your Virtual World Harri Kaikkonen Channel Manager Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000

More information

Delivering Desktop Resources to Any Device As a Service

Delivering Desktop Resources to Any Device As a Service Beyond VDI: Delivering Desktop Resources to Any Device As a Service Garry Owen EUC Product Marketing VMware EMEA 11 th June 2014 2014 VMware Inc. All rights reserved. Agenda 1 The Move to the Mobile Cloud

More information

Xen Project Overview and Update. Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc.

Xen Project Overview and Update. Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc. Xen Project Overview and Update Ian Pratt, Chairman of Xen.org, and Chief Scientist, Citrix Systems Inc. Xen Community Story 2002 Oct Xen hypervisor development starts 2004 Xen 1.0 and 2.0 released, First

More information

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX

Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Microsoft Windows Server 2008 R2 Remote Desktop Services Session Virtualization and VDI Microsoft RemoteFX Citrix XenApp 6 on Remote Desktop Services Extending the Microsoft platform New features in XenApp

More information

VMware Horizon View. Read more VMWARE solutions. Contact Us MicroAge.com

VMware Horizon View. Read more VMWARE solutions. Contact Us MicroAge.com Read more VMWARE solutions Contact Us 800-544-8877 solutions@microage.com MicroAge.com DATASHEET VMware Horizon View Deliver Desktop Services from Your Cloud AT A GLANCE VMware Horizon View delivers desktop

More information

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Oracle Solaris 11: No-Compromise Virtualization

Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in virtualization provides a

More information

Data Center 3.0: Transforming the Data Center via the Network

Data Center 3.0: Transforming the Data Center via the Network Data Center 3.0: Transforming the Data Center via the Network Douglas A. Gourlay Senior Director - Data Center Solutions Group Peter Linkin Marketing Manager - Data Center Architecture August 1, 2007 1

More information

Securing the Next-Generation Data Center

Securing the Next-Generation Data Center Build security into the design phase for maximum flexibility and advanced threat reduction Key Points Data center upgrades are pervasive, driven by needs to:»» Reduce risk»» Increase service availability/uptime»»

More information

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy 1 work-life blur more mobile digital generation multiple devices CONSUMERIZATION tech fast savvy VIRTUALIZATION CLOUD paced 2 By Avanade Global Research Study 2013 2 3 Embracing the consumerization of

More information

The Business Value of Virtualizing Oracle ebusiness Suite. Haroon Qureshi QSolve, Inc.

The Business Value of Virtualizing Oracle ebusiness Suite. Haroon Qureshi QSolve, Inc. The Business Value of Virtualizing Oracle ebusiness Suite Haroon Qureshi QSolve, Inc. hqureshi@qsolveinc.com http://www.qsolveinc.com Agenda Introductions Introduction to Virtualization Challenges with

More information

Kaspersky Security for Virtualization Frequently Asked Questions

Kaspersky Security for Virtualization Frequently Asked Questions Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for

More information

Tony Paikeday Sr. Solutions Marketing Manager. Chris Westphal Sr. Product Marketing Manager. C Cisco Systems, Inc.

Tony Paikeday Sr. Solutions Marketing Manager. Chris Westphal Sr. Product Marketing Manager. C Cisco Systems, Inc. Regain Control of the Desktop: Cisco Desktop Virtualization Solution with VMware View 4.6 Tony Paikeday Sr. Solutions Marketing Manager Chris Westphal Sr. Product Marketing Manager 1 Today s Agenda Cisco

More information

FlashStack for Citrix XenDesktop Solution Guide

FlashStack for Citrix XenDesktop Solution Guide FlashStack for Citrix XenDesktop Solution Guide Data centers are looking to be more streamlined, flexible and transformative to help deliver the applications and workloads to drive business impact. One

More information

Vblock Architecture Accelerating Deployment of the Private Cloud

Vblock Architecture Accelerating Deployment of the Private Cloud Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product

More information

Converged Platforms and Solutions. Business Update and Portfolio Overview

Converged Platforms and Solutions. Business Update and Portfolio Overview Converged Platforms and Solutions Business Update and Portfolio Overview IT Drivers In Next 5 Years SCALE SCALE 30,000+ physical servers 500,000+ virtual servers Current tools won t work at this scale

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS WHY VIRTUALIZATION? VIRTUALIZATION HAS MANY BUSINESS BENEFITS, INCLUDING THE FOLLOWING: Cost containment: Virtualization reduces the overall hardware footprint,

More information

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted

More information

Easily Managing Hybrid IT with Transformation Technology

Easily Managing Hybrid IT with Transformation Technology White Paper White Paper Managing Public Cloud Computing in the Enterprise Easily Managing Hybrid IT with Transformation Technology A Quick Start Guide 1 Table of Contents Abstract... 3 Traditional Approaches

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

Continuous Diagnostics and Mitigation demands, CyberScope and beyond Continuous Diagnostics and Mitigation demands, CyberScope and beyond IBM BigFix streamlines federal security compliance with real-time insights and remediation Highlights Meet Continuous Diagnostics and

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:

More information

RED HAT ENTERPRISE VIRTUALIZATION 3.0

RED HAT ENTERPRISE VIRTUALIZATION 3.0 RED HAT ENTERPRISE VIRTUALIZATION 3.0 YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE John Rinehart, Product Marke3ng Manager Mark St. Laurent, Senior Solu3on Architect Email: msl@redhat.com March 28, 2012 AGENDA

More information

Distribuire risorse desktop

Distribuire risorse desktop Oltre il VDI: Distribuire risorse desktop ad ogni device, as a Service Michele Apa Senior Systems Engineer Forum 2014 2014 VMware Inc. All rights reserved. Agenda 1 The Move to the Mobile Cloud 2 VMware

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS 5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications

More information

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc.

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. Trends and Technologies Inc. Gold Partner - Cisco Enterprise

More information

Transforming Security Part 2: From the Device to the Data Center

Transforming Security Part 2: From the Device to the Data Center SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation

More information

SteelEye Solutions Extend Citrix XenServer. Bob Williamson

SteelEye Solutions Extend Citrix XenServer. Bob Williamson SteelEye Solutions Extend Citrix XenServer Bob Williamson bobw@steeleye.com DataKeeper Expanding SteelEye Family of Protection Solutions Real-time continuous data protection with full rewind capability

More information

EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud

More information

A comprehensive framework for securing virtualized data centers. Business white paper

A comprehensive framework for securing virtualized data centers. Business white paper A comprehensive framework for securing virtualized data centers Business white paper Contents Experiencing the virtualization wave...3 Addressing virtualization security challenges...3 Understanding security

More information

NEC Enterprise Overview

NEC Enterprise Overview NEC Enterprise Overview Huw Wilkins - NEC Enterprise Business Development NEC Enterprise Solutions EMEA March 2018 Agenda NEC Enterprise Portfolio Overview NEC Networking NEC VDI NEC High Availability

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Trend Micro deep security 9.6

Trend Micro deep security 9.6 datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving

More information

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information