Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
|
|
- Moses Powers
- 5 years ago
- Views:
Transcription
1 NET3420BU Introducing VMware s Transformative Data Center Endpoint Security Solution Vijay Ganti Director, Product Management VMware Christopher Frenz Director of Infrastructure Interfaith Medical Center VMworld 2017 Content: Not for publication #VMworld #NET3420BU
2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally available product. Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind. Technical feasibility and market demand will affect final delivery. Pricing and packaging for any new technologies or features discussed or presented have not been determined. #NET3420BU CONFIDENTIAL 2
3 Where to Focus Infiltration Propagation Extraction Exfiltration Stop infiltration Stop exfiltration #NET3420BU CONFIDENTIAL 3
4 We re Protecting the Wrong Thing #NET3420BU CONFIDENTIAL 4
5 Mass Complexity Propagation Known good Unknown Known bad Extraction #NET3420BU CONFIDENTIAL 5
6 From our current model Focused on malicious behavior Highly complex and noisy Exposed, i.e., untrusted monitoring, limited context Manual and lacking orchestration #NET3420BU CONFIDENTIAL 6
7 Applying Least Privilege at an Application Level VMworld 2017 Content: Not for publication To a new model Focused on good (intended) behavior Simpler and smaller problem set Better signal to noise ratio Actionable and behavior-based alerts and responses #NET3420BU CONFIDENTIAL 7
8 Unique Properties of the Virtualization Layer It s in a unique position to understand the application Application Intended State Runtime State #NET3420BU CONFIDENTIAL 8
9 Unique Properties of the Virtualization Layer It s in a unique position to deliver isolation: maintain a separate trust domain for security Application Isolation #NET3420BU CONFIDENTIAL 9
10 Unique Properties of the Virtualization Layer It s in a unique position to deliver a high degree of automation Application Isolation Automation #NET3420BU CONFIDENTIAL 10
11 Application Isolation Automation We can leverage the unique properties of cloud and virtualization to secure critical applications #NET3420BU CONFIDENTIAL 11
12 AppDefense: Least Privilege Control for the DataCenter Application Control Runtime Anomaly Detection & Response Intentional State Communications Untrusted Zone (Guest) Processes Runtime Anomaly Detection Trusted Zone (ESXi) OS Kernel Remediation Comprehensive view/grouping of VMs in the datacenter, their intended state, and allowed behavior VMworld 2017 Content: Not for publication Monitor the real time state of the OS and user applications - alert and control process, network, and kernel events Process Analysis Built-in process analysis engine gives overall process maliciousness as well as specific traits that are potentially suspicious Orchestrate Remediation Our infrastructure reach provides a more effective way to orchestrate remediation during a security incident #NET3420BU CONFIDENTIAL 12
13 Gathering Intended State Intentional State Intended State Runtime State #NET3420BU CONFIDENTIAL 13
14 Gathering Intended State Intentional State VMworld 2017 Infrastructure Events (vra, vcenter, NSX, Chef, Puppet, AWS, etc) Developer Workflow (Maven, Ansible, Jenkins, etc) Runtime Behavior (Agents, Netflow, Policy Changes, etc) Machine context Control and security policies Network topology Application flows down to process level Content: Not for publication Code signing/authorization Process and network behavior Ideal for brownfield apps #NET3420BU CONFIDENTIAL 14
15 Leveraging Isolation Untrusted Zone (Guest) Application Behavior OS Runtime Attestation Secure Context Store Trusted Zone (Kernel) Virtual Enclave Great Context Lacks Isolation Security In Software Goldilocks Security In Hardware Great Isolation Lacks Context #NET3420BU CONFIDENTIAL 15
16 Providing Automated Remediation Remediation #NET3420BU CONFIDENTIAL 16
17 AppDefense Architecture Cloud NSX Manager On-Prem vcenter NSX Manager vcenter vra Security manager will always be a cloud deployment. We will use a proxy to configure policy and auth to mgmt networks Security Manager Security Management Proxy Config/ Policy Sync Security Management Proxy VMC Workloads Goldilocks Secure Enclave Goldilocks Host Module On-Prem Workloads Goldilocks Secure Enclave Goldilocks Host Module Guest Host Guest Host #NET3420BU CONFIDENTIAL 17
18 Interfaith Beta Experience
19 WannaCry Ransomware Ransomware attack of pandemic proportions #NET3420BU CONFIDENTIAL 19
20 Defense in Depth Against Ransomware A defense in depth based guide consisting of 45 suggested controls in the following categories Perimeter Defenses Network Defenses Endpoint Defenses Server Side Defenses SIEM and Log Management Backup and Recovery Awareness Training Incident Response IoT VMworld 2017 Content: Not for Anti-RansomwareGuidev1-5.pdf publication #NET3420BU CONFIDENTIAL 20
21 Criteria for Evaluation 70-90% of malware seen by an organization is unique to that organization according to the 2015 Verizon Data Breach Report Signature based defenses that match known malware or malicious behaviors are no longer sufficient for detecting and stopping threats Looking for a signatureless approach to securing servers that compliments other controls in our defense in depth strategy. Tested to see how well AppDefense would block an attack that successfully bypassed other security controls VMworld 2017 Content: Not for publication #NET3420BU CONFIDENTIAL 21
22 OWASP Mutillidae VMworld 2017 A deliberately vulnerable web application for training security testing skills Content: Not for publication #NET3420BU CONFIDENTIAL 22
23 XAMPP on Virtual Machine VMworld 2017 Content: Not for XAMPP is installed on a Windows 2012 R2 virtual machine that is running App Defense publication #NET3420BU CONFIDENTIAL 23
24 Mutillidae VMworld 2017 Content: Not for Mutillidae unzips into the htdocs folder of the Apache install and can be accessed via a Web browser publication #NET3420BU CONFIDENTIAL 24
25 App Defense Baseline VMworld 2017 Content: Not for App Defense monitors the VM for a period of 2 weeks to learn the typical behavior of the VM with regards to processes that establish inbound or outbound network connections publication #NET3420BU CONFIDENTIAL 25
26 DNS Lookup with Mutillidae The DNS lookup function passes the provided input to a system call that uses nslookup Inputs are not properly sanitized so lets append something to our domain name OS Command Injection google.com& C:\Program Files\Internet Explorer\iexplorer.exe google.com #NET3420BU CONFIDENTIAL 26
27 App Defense Alarm VMworld 2017 Content: Not for The OS command injection attempt to use IE to access an external resource caused app defense to block the connection attempt and trigger an alarm publication #NET3420BU CONFIDENTIAL 27
28 The Good AppDefense prevented internet explorer from connecting to the Web site used in the OS command injection This is a similar scenario to OS command injection being used to download malware or an exploit The alerts feature was very responsive and could provide a SOC a near real-time warning of a potential intrusion attempt The learning mode of AppDefense made the set up comparatively easy since rules and behaviors for the baseline were learned almost entirely during the learning period VMworld 2017 Content: Not for publication #NET3420BU CONFIDENTIAL 28
29 Areas for Improvement AppDefense currently only blocks processes that seek to establish network connections and not any process that does not normally run AppDefense could potentially be circumvented when the server executes scripts via interpreters (such as python.exe) as a part of its normal behavior by placing a malicious script with the same name as the one normally called on the server Support for older OSes (e.g. Windows 2008 R2) would be desirable even with a more limited feature set #NET3420BU CONFIDENTIAL 29
30 Demo
31
32
CSP 2017 Network Virtualisation and Security Scott McKinnon
CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are
More informationAgenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options
Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks
More informationRedefining Hybrid Cloud Management with vcenter Hybrid Linked Mode
Redefining Hybrid Cloud Management with vcenter Hybrid Linked Mode John Brezak, VMware, Inc. Sameh Zakhary, VMware, Inc. #vmworld HYP2228BU #HYP2228BU Disclaimer This presentation may contain product features
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationAppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide
AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning
More informationNOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect
NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should
More informationProduct Guide Revision B. McAfee Cloud Workload Security 5.0.0
Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET2896BU Expanding Protection Across the Software Defined Data Center with Encryption VMworld 2017 Chris Corde Senior Director, Security Product Management Content: Not for publication #VMworld #NET2896BU
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationvsphere Platform Security Update Day 2 Security Operations VMworld 2017 Content: Not for publication
SER1848BU vsphere Platform Security Update Mike Foley #VMworld #SER1848BU vsphere Platform Security Update Day 2 Security Operations VMworld 2017 Content: Not for publication Current Issues Current Issues:
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC1882BE Service Overview for VMware Cloud on AWS Marc Umeno #VMworld #LHC1882BE Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER2779BE What s New in vcenter Server Madhup Gulati Director, Product Management VMware VMworld 2017 Content: Not for publication #VMworld #SER2779BE Disclaimer This presentation may contain product features
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER1906BU VMware and Chef - Leveraging the vsphere API Together #VMworld #SER1906BU Disclaimer This presentation may contain product features that are currently under development. This overview of new
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationAppDefense Getting Started. VMware AppDefense
AppDefense Getting Started VMware AppDefense You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit
More informationUn SOC avanzato per una efficace risposta al cybercrime
Un SOC avanzato per una efficace risposta al cybercrime Identificazione e conferma di un incidente @RSAEMEA #RSAEMEASummit @masiste75 Mauro Costantini - Presales Consultant Agenda A look into the threat
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationMcAfee Network Security Platform 8.3
8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationA Practitioner s Guide to Migrating Workloads to VMware Cloud on AWS
A Practitioner s Guide to Migrating Workloads to VMware Cloud on AWS Adam Osterholt, VMware, Inc. Paul Gifford, VMware, Inc. #vmworld HYP1496BU #HYP1496BU Disclaimer This presentation may contain product
More informationINTRODUCING SOPHOS INTERCEPT X
INTRODUCING SOPHOS INTERCEPT X Matt Cooke Senior Product Marketing Manager November 2016 A Leader in Endpoint Security Sophos delivers the most enterprise-friendly SaaS endpoint security suite. Sophos
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
STO2451BU Automating Disaster Recovery Operations in the SDDC with SRM, vrealize Automation, and NSX VMworld 2017 Shobhan Lakkapragada Director of Product Management Stefan Tsonev Director of Engineering
More informationProactive Approach to Cyber Security
Proactive roach to Cyber Security Jeffrey Neo Sales Director HP Enterprise Security Products Customers struggle to manage the security challenge Today, security is a board-level agenda item 2 Trends driving
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationSOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE
SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE 1 EXECUTIVE SUMMARY Attackers have repeatedly demonstrated they can bypass an organization s conventional defenses. To remain effective,
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
DEV2704BU Delivering Infrastructure as Code: Practical Tips and Advice Peg Eaton #VMworld #DEV2704BU Disclaimer This presentation may contain product features that are currently under development. This
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI1303BU Security with NSX. Greater Security in the Digital Business Age Alex Berger, NSX Product Marketing #VMworld #SAI1303BU Disclaimer This presentation may contain product features that are currently
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationNET1821BU THE FUTURE OF NETWORKING AND SECURITY WITH NSX-T Bruce Davie CTO, APJ 2
NET1821BU The Future of Network Virtualization with NSX-T #VMworld #NET1821BU NET1821BU THE FUTURE OF NETWORKING AND SECURITY WITH NSX-T Bruce Davie CTO, APJ 2 DISCLAIMER This presentation may contain
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER1912BE VMware Open-Source SDKs From Getting Started to Web App in One Hour Alan Renouf Sr Product Line Manager, Vmware Steve Trefethen Sr. Manager R&D, VMware VMworld 2017 Content: Not for publication
More informationSANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Critical Security Control Solution Brief Version 6 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable,
More informationTable of Contents HOL NET
Table of Contents - VMware AppDefense - Secure Datacenter Endpoints...2 Lab Guidance... 3 Module 1- Overview of VMware AppDefense (15 Minutes)... 9 AppDefense Platform Overview... 10 Conclusion... 14 Module
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
STO1297BE Stretched Clusters or VMware Site Recovery Manager? We Say Both! Jeff Hunter, VMware, @jhuntervmware GS Khalsa, VMware, @gurusimran #VMworld Disclaimer This presentation may contain product features
More informationVMworld 2017 Content: Not for publication #CNA1699BE CONFIDENTIAL 2
CNA1699BE Running Docker on your Existing Infrastructure with vsphere Integrated Containers VMworld 2017 Content: Not for publication Martijn Baecke, Robbie Jerrom #vmworld #CNA1699BE VMworld 2017 Robbie
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SER2540BU vsphere HA: Leverage Its Full Potential Roman Konarev Aalap Desai #VMworld #SER2540BU Disclaimer This presentation may contain product features that are currently under development. This overview
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
DEV2704BE Delivering Infrastructure as Code: Practical Tips and Advice Peg Eaton #vmworld #DEV2704BE Disclaimer This presentation may contain product features that are currently under development. This
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationIBM Cloud for VMware Solutions vrealize Automation 7.2 Chef Integration
IBM Cloud for VMware Solutions vrealize Automation 7.2 Chef Integration Date: 2017-03-06 Version: 1.0 ã Copyright IBM Corporation 2016 Page 1 of 8 Table of Contents 1 Introduction... 3 1.1 Chef Server
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1949BU Seamless Network Connectivity for Virtual and Bare-metal s with NSX Suresh Thiru Sridhar Subramanian VMworld 2017 Content: Not for publication VMworld 2017 - NET1949BU Disclaimer This presentation
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationAgenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra
SAI3317BES What s New in Palo Alto Networks VM-Series Integration with VMware NSX A Deep Dive VMworld 2017 Sudeep - Product Line Manager Sai - Product Marketing Content: Not for publication Agenda Basecamp
More informationHOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE
#RSAC SESSION ID: SPO3-T07 HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE Tom Corn Senior Vice President/GM Security Products VMware @therealtomcorn
More informationManagement Product Overview and Glimpse into the Future
MGT3210-S Management Product Overview and Glimpse into the Future Ramin Sayar, VMware, Inc Pete Cruz, VMware, Inc Sameer Abrol, Electronic Arts Luke Kaines, Puppet Labs Suzan Pickett, Columbia Sportswear
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMcAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks
McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic
More informationAutomated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend
SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security
More informationTrend Micro Deep Security
Trend Micro Deep Security Endpoint Security Similarities and Differences with Cisco CSA A Trend Micro White Paper May 2010 I. INTRODUCTION Your enterprise invested in Cisco Security Agent (CSA) because
More informationMcAfee Network Security Platform 9.1
9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation
More informationNext Generation Enduser Protection
Next Generation Enduser Protection Janne Timisjärvi Systems Engineer 10.5.2017 What is the the real threat? Encrypted! Give me all your Bitcoin$ Let s check if there Is something of value The Evolution
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET3282BE The NSX Practical Path Brian Lazear, Sr. Director, NSX Product Management Brian Muita, CTO, Node Africa #VMworld #NET3282BE Disclaimer This presentation may contain product features that are
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1295BU VMware Validated Design for Remote/Branch Office Technical Overview VMworld 2017 Content: Not for publication ##VMworld #PBO1295BU Disclaimer This presentation may contain product features that
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationSurprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS
Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is
More informationCNA1699BU Running Docker on your Existing Infrastructure with vsphere Integrated Containers Martijn Baecke Patrick Daigle VMworld 2017 Content: Not fo
CNA1699BU Running Docker on your Existing Infrastructure with vsphere Integrated Containers VMworld 2017 Content: Not for publication #VMworld #CNA1699BU CNA1699BU Running Docker on your Existing Infrastructure
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
STO1498BU Tech Preview: Disaster Recovery with ware Cloud on AWS world 2017 Content: Not for publication Ben Meadowcroft, ware @BenMeadowcroft GS Khalsa, ware @gurusimran #world #STO1498BU Disclaimer This
More informationAvanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.
Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7
More informationThe Software Defined Data Centre & vsphere 6.5 The foundation of the hybrid cloud Barry Coombs
The Software Defined Data Centre & vsphere 6.5 The foundation of the hybrid cloud Barry Coombs What s New in vsphere 6.5? Dramatically Simplified Experience Comprehensive Built-in Security Universal
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1221BE Beginners Guide to the Software-Defined Data Center Kyle Gleed, Group Manager, Technical Marketing Ben Sier, Staff Architect, Technical Marketing #VMworld #PBO1221BE Disclaimer This presentation
More informationMcAfee Virtual Network Security Platform
McAfee Virtual Network Security Platform Complete threat detection for cloud networks McAfee Virtual Network Security Platform is a complete network threat and intrusion prevention system (IPS) solution
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
STO1206BU Interpreting performance metrics in your vsan environment Pete Koehler (@vmpete) Bradley Mott #VMworld #STO1206BU Disclaimer This presentation may contain product features that are currently
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC3174BE ware Cloud on AWS: An Architectural and Operational Deep Dive J. Christopher Wagner Robert Bosch #world #LHC3174BE Disclaimer This presentation may contain product features that are currently
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationDigital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS
Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
CNA2080BU Deep Dive: How to Deploy and Operationalize Kubernetes Cornelia Davis, Pivotal Nathan Ness Technical Product Manager, CNABU @nvpnathan #VMworld #CNA2080BU Disclaimer This presentation may contain
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are
More informationSecurity as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS
Security as Code: The Time is Now Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Introduction Business is moving faster to the cloud, and DevOps is accelerating scale and pushing automation
More information70-247: Configuring and Deploying a Private Cloud with System Center 2012
70-247: Configuring and Deploying a Private Cloud with System Center 2012 Module 01 - Understanding the Private Cloud Lesson 1: Understanding the Private Cloud Cloud Comparisons Comparing the Private and
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationINTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.
2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationZero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection
Zero Trust on the Endpoint Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection March 2015 Executive Summary The Forrester Zero Trust Model (Zero Trust) of information
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationIBM Cloud for VMware Solutions
Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1863BU NSX-T Advanced Architecture, Switching and Routing François Tallet, NSBU #VMworld #NET1863BU Disclaimer This presentation may contain product features that are currently under development. This
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationMcAfee Network Security Platform 9.1
9.1.7.49-9.1.5.20 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation instructions Known issues
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1405BU Power of NSX - Network Virtualization for Elastic Apps and Data Centers Andrew Babakian ababakian@vmware.com Dimitri Desmidt ddesmidt@vmware.com #VMworld Disclaimer This presentation may contain
More informationVMware Cloud Provider Platform
VMware Cloud Provider Platform Enabling your journey to multicloud Winston Benjamin Systems Engineer Cloud Provider Program Disclaimer This presentation may contain product features that are currently
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationSandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees
SandBlast Agent FAQ What is Check Point SandBlast Agent? Check Point SandBlast Agent defends endpoints and web browsers with a complete set of realtime advanced browser and endpoint protection technologies,
More information