Application Virtualization and Desktop Security

Size: px
Start display at page:

Download "Application Virtualization and Desktop Security"

Transcription

1 Application Virtualization and Desktop Security Karl MacMillan Tresys Technology 1

2 Application Virtualization Introduction Encapsulates a single application Bundles application into a deployable package Virtualizes files, DLLs, registry values, etc. vs. virtualizing low-level hardware Enables zero install application delivery Provides many functional benefits: Simplified deployment and updating Reduced application conflicts Tracking of application usage License management What about increased security? 2

3 What causes desktop insecurity? All software contains flaws Smallest flaw may be a vulnerability No real solution likely in the near future Users often granted excessive privilege Access control is only about users not apps Applications granted same access as user Allows exploited applications broad access Data with differing properties is freely mixed User data is all treated exactly the same Highly confidential data often cannot even be identified Any vulnerability compromises entire desktop 3

4 Desktop Security Solutions Reduce user privilege Use non-administrator accounts Use group policy, file access controls, etc. Separate application access from user access E.g., app only has access needed to send Impact of vulnerabilities greatly limited Security no longer dependent on application correctness Maintain data separation Common practice on servers Can only be partially addressed by encryption Three approaches to implement these solutions MAC, OS virtualization, and application virtualization 4

5 Mandatory Access Control Fine-grained control over applications and data Controls application/user access to files, network, etc. Protects system integrity and data confidentiality Implemented as an operating system feature Vista: Windows Integrity Mechanism Linux: Security Enhanced Linux (SELinux) Mac OS X: Sandbox Benefits: secure, flexible, excellent performance Challenges around deployment and management Requires carefully crafted policies OS Version specific 5

6 6

7 OS Virtualization Security Coarse-grained control over OS and applications Controls access to network, devices, shared files Maintains separation of applications and data Secure desktop virtualization solutions available VMware Ace: layered security solution Tresys VM Fortress: high-end desktop security Security benefits Can offer strong security and separation Controls applications without compatibility concerns Current challenges Separation limited to OS boundary Heavy-weight solution 7

8 Application Virtualization Security Practical control over applications Limits access to application files, system files, registry Controls users access to applications Security benefits Often removes need for administrator user access Separates applications into private sandboxes Accelerates delivery of patches Allows revocation of application access Current challenges Cannot control all application access Lacks strong data separation 8

9 Conclusions Desktop security is improving Solutions are fundamental rather than reactionary Organizations can choose right security level Virtualization is a valuable security technology Inserts control at key points in the software stack Addresses security while maintaining compatibility Application virtualization offers balanced security Offers important, practical security advantages Effectively reduces required user privilege Potential greater control in future versions 9

10 Questions / Comments? Karl MacMillan kmacmillan@tresys.com Tresys Technology 10

About Us. Innovating proven technology for practical security solutions

About Us. Innovating proven technology for practical security solutions Rethink Security About Us Innovating proven technology for practical security solutions Virtualization Security Application Security Platform Security Cross Domain Security Desktop Consolidation Case Study

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Desktop Virtualization for Higher Education. The Virtual Lab

Desktop Virtualization for Higher Education. The Virtual Lab Desktop Virtualization for Higher Education The Virtual Lab What is the Virtual Lab? WHAT IS THE VIRTUAL LAB? Transformational technology for Higher Ed labs collaboration between Dell & VMware Virtualize

More information

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER

USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER USING A FREE VIRTUAL MACHINE TO SIMILATE A SPECIFIC MODEL OF COMPUTER 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY From inside your existing computer, you can

More information

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009

VMware Enterprise Desktop Solutions: What s NEW with VMware View 3. John Hinkle Professional Services Practice principal February 18 th, 2009 VMware Enterprise Desktop Solutions: What s NEW with VMware View 3 John Hinkle Professional Services Practice principal February 18 th, 2009 Agenda What is VMware View 3 Market Momentum What s new with

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

OPERATING SYSTEMS Chapter 13 Virtual Machines. CS3502 Spring 2017

OPERATING SYSTEMS Chapter 13 Virtual Machines. CS3502 Spring 2017 OPERATING SYSTEMS Chapter 13 Virtual Machines CS3502 Spring 2017 Virtual Machines Allow you to run a Guest Operating System on top of a Host Operating System VMware (for most systems) Microsoft Virtual

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme PBO1221BE Beginners Guide to the Software-Defined Data Center Kyle Gleed, Group Manager, Technical Marketing Ben Sier, Staff Architect, Technical Marketing #VMworld #PBO1221BE Disclaimer This presentation

More information

VMware View. John Mah Systems Consultant HP: +60 (12) VMware Malaysia

VMware View. John Mah Systems Consultant HP: +60 (12) VMware Malaysia VMware View Achieving Operational Efficiency through Desktop Virtualization John Mah Systems Consultant HP: +60 (12) 3004 118 Email: jmah@vmware.com VMware Malaysia Dennis Tio Shawn Tan Product Management

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

System Configuration as a Privilege

System Configuration as a Privilege System Configuration as a Privilege Glenn Wurster, Paul C. van Oorschot School of Computer Science Carleton University, Canada HotSec 2009 11 Aug 2009 Glenn Wurster, Paul C. van Oorschot System Config

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved. VMware Overview Kontakt: jens.soeldner@netlogix.de 1-1 You Are Here Virtual Infrastructure VMware Overview ESX Server Installation ESX Server Installation Networking Networking Storage Storage ESX Server

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology

Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology Reference Policy for Security Enhanced Linux Christopher J. PeBenito, Frank Mayer, Karl MacMillan Tresys Technology Abstract The Reference Policy project is an effort to restructure the NSA example policy

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

A COMPARISON OF FREE "VIRTUAL MACHINE PROGRAMS" FOR YOUR REAL "WINDOWS.." COMPUTER

A COMPARISON OF FREE VIRTUAL MACHINE PROGRAMS FOR YOUR REAL WINDOWS.. COMPUTER A COMPARISON OF FREE "VIRTUAL MACHINE PROGRAMS" FOR YOUR REAL "WINDOWS.." COMPUTER 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY At the present time, you have

More information

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?

More information

X.org security. Recap, vulnerabilities, attacks and discussions on the graphic stack s security. Martin Peres & Timothée Ravier

X.org security. Recap, vulnerabilities, attacks and discussions on the graphic stack s security. Martin Peres & Timothée Ravier X.org security Recap, vulnerabilities, attacks and discussions on the graphic stack s security Martin Peres & Timothée Ravier Ph.D. student at LaBRI, System security engineer September 19 21, 2012 Disclaimer

More information

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date

Multi-tenancy Virtualization Challenges & Solutions. Daniel J Walsh Mr SELinux, Red Hat Date Multi-tenancy Virtualization Challenges & Solutions Daniel J Walsh Mr SELinux, Red Hat Date 06.28.12 What is Cloud? What is IaaS? IaaS = Infrastructure-as-a-Service What is PaaS? PaaS = Platform-as-a-Service

More information

Core Policy Management Infrastructure for SELinux

Core Policy Management Infrastructure for SELinux Core Policy Management Infrastructure for SELinux 2005 SELinux Symposium Karl MacMillan Tresys Technology http://www.tresys.com Core Policy Management Infrastructure Production

More information

Dell EMC Forum. Martin Niemer 5.October VMware Inc. All rights reserved.

Dell EMC Forum. Martin Niemer 5.October VMware Inc. All rights reserved. be_tomorrow Dell EMC Forum Martin Niemer 5.October 2016 2016 VMware Inc. All rights reserved. Software Defines the New Digital Business I think anything softwaredefined means it s digital. It means we

More information

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for

More information

Secure Containers with EPT Isolation

Secure Containers with EPT Isolation Secure Containers with EPT Isolation Chunyan Liu liuchunyan9@huawei.com Jixing Gu jixing.gu@intel.com Presenters Jixing Gu: Software Architect, from Intel CIG SW Team, working on secure container solution

More information

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project ViryaOS RFC: Secure Containers for Embedded and IoT A proposal for a new Xen Project sub-project Stefano Stabellini @stabellinist The problem Package applications for the target Contain all dependencies

More information

IT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

IT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao IT Service Delivery And Support Week Four - OS IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 What is an Operating System (OS)? OS is a software that designed to run on specific hardware

More information

Citrix Provisioning Server for Desktops 4.5: Customer Overview

Citrix Provisioning Server for Desktops 4.5: Customer Overview Citrix Provisioning Server for Desktops 4.5: Customer Overview Agenda Introducing Citrix Provisioning Server for Datacenters Desktops 4.5 Datacenter Desktop Challenges Desktop-Streaming Workload Technology:

More information

InstallFree Application Compatibility Solution for Windows 7 Migrations

InstallFree Application Compatibility Solution for Windows 7 Migrations InstallFree Application Compatibility Solution for Windows 7 Migrations 1 Windows 7 and Application Compatibility Window 7 is the latest version of the Microsoft Windows operating system and is widely

More information

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan ACM CODASPY 11 Joint work with Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg Feb 22, 2011

More information

Mobile & Secure End-Point Computing with Managed Virtual Machines. Monica Lam Stanford University

Mobile & Secure End-Point Computing with Managed Virtual Machines. Monica Lam Stanford University Mobile & Secure End-Point Computing with Managed Virtual Machines Monica Lam Stanford University Pressing Problems Consumerization of IT: Using home computers Viruses on home computers attacking the data

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Security Group Meeting 29 November 2002 Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ Computer Laboratory, University of Cambridge Copyright c Steven. J. Murdoch p.1 Summary

More information

Certified Secure Web Application Engineer

Certified Secure Web Application Engineer Certified Secure Web Application Engineer ACCREDITATIONS EXAM INFORMATION The Certified Secure Web Application Engineer exam is taken online through Mile2 s Assessment and Certification System ( MACS ),

More information

IT HealthCheck Feature List

IT HealthCheck Feature List IT HealthCheck Feature List Rev: 06/24/2014 Contents Solving Problems...3 Index of Main Report Checks... 3 Benchmarking... 7 Preparing for Change: Rightsizing your Environment...8 TrafficSim... 8 Equipment

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

Solution Track 4 Design a Scalable Virtual Desktop Infrastructure

Solution Track 4 Design a Scalable Virtual Desktop Infrastructure Solution Track 4 Design a Scalable Virtual Desktop Infrastructure Irene Yeoh System Consultant, VCP VMware, Inc. September 2008 Basics of Virtual Desktop Infrastructure (VDI) Ease of provisioning Migration

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if Asset Analysis Asset Analysis -I It discovers the assets that result in an impact (a loss for the organization) if successfully attacked It should discover which ICT resources an organization needs to

More information

SERVER HARDENING CHECKLIST

SERVER HARDENING CHECKLIST SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

Kubernetes The Path to Cloud Native

Kubernetes The Path to Cloud Native Kubernetes The Path to Cloud Native Eric Brewer VP, Infrastructure @eric_brewer August 28, 2015 ACM SOCC Cloud Na*ve Applica*ons Middle of a great transition unlimited ethereal resources in the Cloud an

More information

CS 290 Host-based Security and Malware. Christopher Kruegel

CS 290 Host-based Security and Malware. Christopher Kruegel CS 290 Host-based Security and Malware Christopher Kruegel chris@cs.ucsb.edu Windows Windows > 90 % of all computers run Windows when dealing with security issues, it is important to have (some) knowledge

More information

Alpha Anywhere Standard Application Server

Alpha Anywhere Standard Application Server Alpha Anywhere Standard Application Server High Capacity Server Systems The standard Alpha Anywhere Application Server has adequate capacity for many web systems. However, Alpha Software recommends using

More information

18-642: Security Mitigation & Validation

18-642: Security Mitigation & Validation 18-642: Security Mitigation & Validation 11/27/2017 Security Migitation & Validation Anti-Patterns for security mitigation & validation Poorly considered password policy Poorly considered privilege management

More information

Adobe Flash Player 12 Problems Windows 7 S

Adobe Flash Player 12 Problems Windows 7 S Adobe Flash Player 12 Problems Windows 7 S Hi all, I have been having trouble trying to install Adobe Flash Player on my new computer lately. The download I'm using Windows 7 Home Premium and I use Firefox

More information

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure

More information

OWASP Top 10. Copyright 2017 Ergon Informatik AG 2/13

OWASP Top 10. Copyright 2017 Ergon Informatik AG 2/13 Airlock and the OWASP TOP 10-2017 Version 2.1 11.24.2017 OWASP Top 10 A1 Injection... 3 A2 Broken Authentication... 5 A3 Sensitive Data Exposure... 6 A4 XML External Entities (XXE)... 7 A5 Broken Access

More information

Software Vulnerability Assessment & Secure Storage

Software Vulnerability Assessment & Secure Storage Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices

More information

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014 6.858 Quiz 2 Review Android Security Haogang Chen Nov 24, 2014 1 Security layers Layer Role Reference Monitor Mandatory Access Control (MAC) for RPC: enforce access control policy for shared resources

More information

Desktop Virtualization: The Next Big Thing? Poh Wah Lee Regional Consulting Manager, Asia South October 2008

Desktop Virtualization: The Next Big Thing? Poh Wah Lee Regional Consulting Manager, Asia South October 2008 Desktop Virtualization: The Next Big Thing? Poh Wah Lee Regional Consulting Manager, Asia South October 2008 Is Desktop Virtualization the Next Big Thing? What s driving the change? Technology Evolution:

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

OPS-9: Fun With Virtualization. John Harlow. John Harlow. About John Harlow

OPS-9: Fun With Virtualization. John Harlow. John Harlow. About John Harlow OPS-9: Fun With Virtualization President, BravePoint, Inc. About Unix user since 1982 Progress developer since 1984 Linux Desktop and Server user since 1995 VMware user since earliest beta in 1999 Contact

More information

Hillstone IPSec VPN Solution

Hillstone IPSec VPN Solution 1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private

More information

Dell DVS. Enabling user productivity and efficiency in the Virtual Era. Dennis Larsen & Henrik Christensen. End User Computing

Dell DVS. Enabling user productivity and efficiency in the Virtual Era. Dennis Larsen & Henrik Christensen. End User Computing Dell DVS Enabling user productivity and efficiency in the Virtual Era Dennis Larsen & Henrik Christensen Agenda Dells view on VDI Dell Desktop Virtualization Solutions DVS Enterprise DVS Simplified (incl.

More information

1 TABLE OF CONTENTS UNCLASSIFIED//LES

1 TABLE OF CONTENTS UNCLASSIFIED//LES 1 TABLE OF CONTENTS 2 In troduction...3 2.1 Terminology...3 2.2 Anatomy of the Pivot...3 2.3 Requirements for a Successful Pivot...3 3 Risks and Caveats...4 3.1 Fulcrum Does Not Measure Success or Failure

More information

Security Considerations for IPv6 Networks. Yannis Nikolopoulos

Security Considerations for IPv6 Networks. Yannis Nikolopoulos Security Considerations for IPv6 Networks Yannis Nikolopoulos yanodd@otenet.gr Ημερίδα Ενημέρωσης Χρηστών για την Τεχνολογία IPv6 - Αθήνα, 25 Μαίου 2011 Agenda Introduction Major Features in IPv6 IPv6

More information

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015

Android System Architecture. Android Application Fundamentals. Applications in Android. Apps in the Android OS. Program Model 8/31/2015 Android System Architecture Android Application Fundamentals Applications in Android All source code, resources, and data are compiled into a single archive file. The file uses the.apk suffix and is used

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme MGT3166BU A Simplified Approach to Lifecycle Management for vrealize Suite Ganesh Subramaniam Group Product Line Manager, VMware Gopal Srinivasan Director Engineering, VMware #VMworld #MGT3166BU Disclaimer

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system

More information

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

P a g e 1. Teknologisk Institut.   Online kursus k SysAdmin & DevOps Collection P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:

More information

Privilege Escalation

Privilege Escalation Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended

More information

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy [TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy Mounir Chaaban & Riaz Salim Account Technology Strategist Microsoft Corporation Microsoft s Vision

More information

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Security as Code: The Time is Now Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Introduction Business is moving faster to the cloud, and DevOps is accelerating scale and pushing automation

More information

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation 18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Director, Product Management, Qualys, Inc. Agenda Expanding

More information

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and

More information

Container Deployment and Security Best Practices

Container Deployment and Security Best Practices Container Deployment and Security Best Practices How organizations are leveraging OpenShift, Quay, and Twistlock to deploy, manage, and secure a cloud native environment. John Morello CTO Twistlock Dirk

More information

W11 Hyper-V security. Jesper Krogh.

W11 Hyper-V security. Jesper Krogh. W11 Hyper-V security Jesper Krogh jesper_krogh@dell.com Jesper Krogh Speaker intro Senior Solution architect at Dell Responsible for Microsoft offerings and solutions within Denmark Specialities witin:

More information

Advanced Systems Security: Virtual Machine Systems

Advanced Systems Security: Virtual Machine Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 1 Operating System Quandary Q: What is the primary goal of

More information

Windows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education

Windows Server Discussion with BCIU. Kevin Sullivan Management TSP US Education Windows Server 2008 Discussion with BCIU Kevin Sullivan Management TSP US Education Kevin.sullivan@microsoft.com 1 Web Internet Information Services 7.0 Powerful Web Application and Services Platform Manage

More information

SELinux. Daniel J Walsh SELinux Lead Engineer

SELinux. Daniel J Walsh SELinux Lead Engineer SELinux Daniel J Walsh SELinux Lead Engineer 0 Day Exploits Patch Cycle Someone discovers a vulnerability in software Package Maintainer and OS Vendor Notified Fix generated/distributed Fix installed by

More information

Runtime Application Self-Protection (RASP) Performance Metrics

Runtime Application Self-Protection (RASP) Performance Metrics Product Analysis June 2016 Runtime Application Self-Protection (RASP) Performance Metrics Virtualization Provides Improved Security Without Increased Overhead Highly accurate. Easy to install. Simple to

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Advanced Systems Security: Ordinary Operating Systems

Advanced Systems Security: Ordinary Operating Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Server Consolidation Assessments with VMware CapacityPlanner. Rich Talaber

Server Consolidation Assessments with VMware CapacityPlanner. Rich Talaber Server Consolidation ssessments with VMware Capacitylanner Rich Talaber genda Evolution of the infrastructure Uncovering the opportunity Conducting the assessment The typical client Developing the strategy

More information

Desktop Virtualization Briefing Maryland Intelligence Center s Center for Innovation 25 June Innovation Center Contacts:

Desktop Virtualization Briefing Maryland Intelligence Center s Center for Innovation 25 June Innovation Center Contacts: Desktop Virtualization Briefing Maryland Intelligence Center s Center for Innovation 25 June 2008 Innovation Center Contacts: Skip Boddy Bob Murray 443-445-8421 443-445-7122 email: fboddy@csc.com email:

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Manual Internet Explorer 8 For Windows 7 64 Bit Full

Manual Internet Explorer 8 For Windows 7 64 Bit Full Manual Internet Explorer 8 For Windows 7 64 Bit Full I have to install an internet explorer plugin manually by this mentioned protocol: This is on Windows 7 Home Premium (64 bit) answered Dec 3 '14 at

More information

Agenda 1 Types of VMware Tools 2 Status Display in vsphere 3 Lifecycle and Supported Guests 4 Standardization Approach 5 Keeping Tools Updated #SER195

Agenda 1 Types of VMware Tools 2 Status Display in vsphere 3 Lifecycle and Supported Guests 4 Standardization Approach 5 Keeping Tools Updated #SER195 SER1957BU Mastering the VMware Tools Lifecycle in Your vsphere Data Center Eric Gray #VMworld #SER1957BU Agenda 1 Types of VMware Tools 2 Status Display in vsphere 3 Lifecycle and Supported Guests 4 Standardization

More information

Using Network Virtualization in DevOps environments Yves Fauser, 22. March 2016 (Technical Product Manager VMware NSBU)

Using Network Virtualization in DevOps environments Yves Fauser, 22. March 2016 (Technical Product Manager VMware NSBU) Using Network Virtualization in DevOps environments Yves Fauser, 22. March 2016 (Technical Product Manager VMware NSBU) 2014 VMware Inc. All rights reserved. Who is standing in front of you? Yves Fauser

More information

TEN LAYERS OF CONTAINER SECURITY. Kirsten Newcomer Security Strategist

TEN LAYERS OF CONTAINER SECURITY. Kirsten Newcomer Security Strategist TEN LAYERS OF CONTAINER SECURITY Kirsten Newcomer Security Strategist WHAT ARE CONTAINERS? Containers change how we develop, deploy and manage applications INFRASTRUCTURE Sandboxed application processes

More information

G/On OS Security Model

G/On OS Security Model Whitepaper G/On OS Security Model Technical Whitepaper with Excitor comments on CESG Guidance 1 About this document This document describes the security properties of G/On OS, which is a Linux based, client

More information

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX

PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX PREVENTING EXPLOITS WITH SECURITY ENHANCED LINUX Final Report 12/10/09 Mike Detwiler UMBC Student CMSC Course 426 Baltimore, MD Det1@umbc.edu Peter Coddington UMBC Student CMSC Course 626 Baltimore, MD

More information

What is Dell EMC Cloud for Microsoft Azure Stack?

What is Dell EMC Cloud for Microsoft Azure Stack? What is Dell EMC Cloud for Microsoft Azure Stack? Karsten Bott @azurestack_guy Advisory Cloud Platform Specialist AzureStack GLOBAL SPONSORS Why Hybrid Cloud? The New Digital Customer Rising and continuously

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that Vendor: Microsoft Exam Code: MB2-702 Exam Name: Microsoft Dynamics CRM 2013 Deployment Version: Demo Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment

More information

Securing Cloud Computing

Securing Cloud Computing Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and

More information

Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus

Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus Amir Zipory Senior Solutions Architect, Redhat Israel, Greece & Cyprus amirz@redhat.com TODAY'S IT CHALLENGES IT is under tremendous pressure from the organization to enable growth Need to accelerate,

More information

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments OVERVIEW + Cisco and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments KEY BENEFITS Quickly create private clouds Tested with industry-leading BIG-IP ADC platform Easily scale

More information

Secure Architecture Principles

Secure Architecture Principles CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from

More information

Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center

Container Adoption for NFV Challenges & Opportunities. Sriram Natarajan, T-Labs Silicon Valley Innovation Center Container Adoption for NFV Challenges & Opportunities Sriram Natarajan, T-Labs Silicon Valley Innovation Center Virtual Machine vs. Container Stack KVM Container-stack Libraries Guest-OS Hypervisor Libraries

More information

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency

Laying a Secure Foundation for Mobile Devices. Stephen Smalley Trusted Systems Research National Security Agency Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency Trusted Systems Research Conduct and sponsor research to provide information assurance for

More information

Advanced Systems Security: Principles

Advanced Systems Security: Principles Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information