CSP 2017 Network Virtualisation and Security Scott McKinnon
|
|
- Iris Morrison
- 6 years ago
- Views:
Transcription
1 CSP 2017 Network Virtualisation and Security Scott McKinnon Security Lead, Northern EMEA Network & Security, VMware
2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally available product. Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind. Technical feasibility and market demand will affect final delivery. Pricing and packaging for any new technologies or features discussed or presented have not been determined. CONFIDENTIAL SHARED UNDER NDA 2
3 Session Overview 1 Digital Transformation 2 Transforming Security with VMWare 3 Future Capabilities: Project Goldilocks 4 Future Capabilities: Distributed Network Encryption 5 Product Accreditation 6 Summary 3
4 Digital Transformation 2017 VMware Inc. All rights reserved.
5 Nimble innovation. Better ways of working. Inventive business models. New customer experiences. 5
6 Why Business Leaders Are Embracing Digital A Dramatic Shift in a Year 28% 32% 31% 26% 31% 9% 12% 14% 11% 12% Innovate in agile ways Predict new opportunities Demonstrate transparency and trust Deliver unique and personalized experiences Enable always-on, real-time operations Source: Vanson Bourne and Dell Technologies, Embracing a Digital Future, October
7 2017 Digital Transformation Agenda BUSINESS OUTCOMES Business Agility and Innovation Exceptional Mobile Experiences Protection of Brand and Customer Trust Modernize Data Centers Integrate Public Clouds Empower Digital Workspaces Transform Security STRATEGIC IT PRIORITIES 7
8 Transform Security 8
9 Cybersecurity Remains a Top Priority The more digital the business, the more critical cybersecurity % Of organizations report a data breach due to employees using mobile devices Data breaches are on the rise Verizon Data Breach Investigations Report (2011, 2012, 2013, 2014, 2015, 2016) 2. Ponemon Institute, The Economic Risk of Confidential Data on Mobile Devices in the Workplace, February
10 Yet Enterprise IT Security Spend Is Relatively Low Overall Median IT Budget and Percentage Allocated to Security by Year $500K 1M $500K 1M $500K 1M 4 6% 4 6% 7 9% (Projected) Source: SANS Institute, IT Security Spending Trends, Barbara Filkins, February
11 Security Is an Architectural Issue
12 The World We Must Secure Devices Apps Traditional Apps Cloud-Native Apps SaaS Apps Typical App Connects to 7 Cloud Services Infrastructure Private Clouds Hybrid Clouds Public Clouds Virtualized Compute, Storage, Networking, Security 12
13 From Yesterday s Simple Stack To Today s Reality: The Application Is a Network Then: Now: COMPUTE NETWORK STORAGE COMPUTE NETWORK STORAGE Monolithic Stack Complexity Is the Enemy of Security 13
14 An Amazing Array of Security Innovation 14
15 We need an architecture for security. 15
16 Without an Architecture for Security, Organizations Cannot Take Advantage of Security Innovations Security Policies 16
17 Architecture for Security A Shift in Mindset from How Do I Secure Virtualization? to Use Virtualization to Secure Security Policies Virtualisation Layer Alignment, Ubiquity 17
18 Micro-Segmentation: Ubiquitous Enforcement and Universal Control Ecosystem of Innovators Cross-Industry Customer Adoption 18
19 An Architecture to Transform Cybersecurity As We Know It Least Privilege Automation Ubiquitous Virtualisation Layer Context 19
20 How VMware Helps What makes cybersecurity so challenging? Transform Security New apps and delivery models can t be easily protected with perimeter-centric Secure Application network Infrastructure security. Proliferating and diverse endpoints access a range of apps and IT services. Secure Identity and Endpoints Increasingly complex regulatory compliance requires more of organizations. Streamline Compliance Intrinsic Security from Data Center to Device 20
21 Enabled with VMware s Integrated Architecture Empower Digital Workspaces Any Device F VMware Workspace ONE Desktop Mobile Identity Integrate Public Clouds Modernize Data Centers Any Application Traditional Apps Cloud-Native Apps SaaS Apps VMware Cross-Cloud Architecture Private Cloud Hybrid Cloud Public Cloud VMware Cross-Cloud Services Transform Security Any Cloud VMware vrealize Cloud Management Software-Defined Data Center VMware Cloud Foundation VMware vcloud Air Network VMware vcloud Air The information in this presentation is intended to outline our general product direction. It is for informational purposes only. 21
22 How Virtualisation Can Aid Better Security Hygiene
23 The Modern Kill Chain Intrusion Propagation Extraction Exfiltration Attack vector/malware Delivery mechanism Entry point compromise Escalate privileges Install C2* infrastructure Lateral movement Break into data stores Network eavesdropping App-level extraction Parcel and obfuscate Exfiltration Cleanup Stop infiltration 80% of the investment is focused on preventing intrusion The attack surface is simply too wide Customers often left to deal with a lot of ambiguity during this phase Stop exfiltration 20% of the investment is focused on What happens after intrusion Organizations lack visibility and control inside
24 Unique Properties of Virtualization Alignment Context Automation Isolation 24
25 Unique Properties of Virtualization Alignment Context Automation Isolation Intended State Runtime State 25
26 Unique Properties of Virtualization Alignment Context Automation Isolation 26
27 Unique Properties of Virtualization Alignment Context Automation Isolation 27
28 Software Defined Security PREVENT DETECT Micro-segmentation Application Application Application Detection & Response Network Compute Data Network Security Controls Compute Security Controls Data Security Controls Governance, Risk & Compliance Security Stack Correlation/Analytics 28
29 Endpoint Monitoring
30 Extending Detection and Response PREVENT DETECT Micro-segmentation Application Detection & Response Needle From our current model That focuses on finding malicious activity Complex: Too much noise and complexity Manual: Lack actionable alerts or orchestrated response Exposed: Limited authoritative context. Untrusted monitoring To a new model That first implements app-centric least privilege More secure: Smaller attack surface Better Signal to Noise: Improves detection. Actionability: Leveraging behavior and architecture to assess relevance, urgency and response alternatives 30
31 Shrinking the Unknown What they do Where we can help Auth, User Provisioning, Config/Patch Management, etc. Known Good Least Privilege Across Network, Compute and Data SIEM, Endpoint/Network Detection and Response, Behavioral Analytics, Incident Response, etc. Unknown Incident Response Automation Better context for security analytics and behavioral detection. Firewalls, UTM, Anti-Virus, IPS, Vulnerability Management, etc Known Bad 31
32 How Can Virtualisation Solve this Challenge? Authoritative Intended State Virtualisation has a unique horizontal vantage point across the datacenter It has intimate knowledge of runtime state across endpoints and networks It has explicit understanding of grouping and applications Virtual infrastructure is also highly automated allowing integration into that process to determine intended state Trusted Monitoring Mechanism Virtualisation has an extremely unique capability to evaluate runtime state from a trusted position in the hypervisor This allows delivery of agentless collection of security signals and protect collection mechanisms Other security technologies do not have this advantage Orchestrated Incident Response The virtual infrastructure and security policy can be programmed Detection can be paired with a rich set of security remediation another very difficult thing to do for most security vendors 32
33 Architecture Leveraging the Hypervisor as a Virtual Enclave Application Untrusted Zone (Guest) App Agents OS App Agents OS App Agents OS Context Service Attestation Service Secure Context Store Remediation Broker Trusted Zone (Kernel) Virtual Enclave PARTNER ECOSYSTEM
34 Preventing Data Exposure
35 Extending Prevention to Data PREVENT DETECT Micro-segmentation Application Detection & Response Encryption Protect the confidentiality and integrity of the data flowing across the network between application components WEB APP APP DB DB 35
36 Traditional Encryption Challenge WEB APP APP APP DB DB DB 36
37 Virtual and Distributed Encryption No Application Changes Most customers will use application level encryption when dealing with sensitive data This places a burden on developers to have expertise in encryption controls It also leaves the management of keys and other sensitive material during execution in the hands of the developer Virtualisation solves these challenges by building encryption directly into the infrastructure and requires no application changes Leverages Microsegment Definition Encryption leverages the isolation model context as an abstraction to determine who has access to which pieces of sensitive information As a result, rule provisioning can be a simple drag and drop exercise, with the platform handling the hard work to distribute keys between nodes Integrates with Security Infrastructure Application level encryption also has a nasty downside inline monitoring tools that rely on deep packet inspection no longer can function with the encrypted data With virtualisation, any security tool inserted will always have access to the unencrypted packet for inspection before the data protection layer is put in place 37
38 Summary
39 Key Takeaways Virtualisation Raises All Security Boats Architect-In vs. Urban Sprawl of the Past Major Shifts Are Underway in Security Explore Network Virtualisation 39
40 Accelerate Digital Transformation to Realize What s Possible Business Agility and Innovation Exceptional Mobile Experiences Protection of Brand and Customer Trust Modernize Data Centers Integrate Public Clouds Empower Digital Workspaces Transform Security Take the next step. Visit 40
41 Thank you.
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET2896BU Expanding Protection Across the Software Defined Data Center with Encryption VMworld 2017 Chris Corde Senior Director, Security Product Management Content: Not for publication #VMworld #NET2896BU
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET3420BU Introducing VMware s Transformative Data Center Endpoint Security Solution Vijay Ganti Director, Product Management VMware Christopher Frenz Director of Infrastructure Interfaith Medical Center
More informationHOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE
#RSAC SESSION ID: SPO3-T07 HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE Tom Corn Senior Vice President/GM Security Products VMware @therealtomcorn
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MGT3166BU A Simplified Approach to Lifecycle Management for vrealize Suite Ganesh Subramaniam Group Product Line Manager, VMware Gopal Srinivasan Director Engineering, VMware #VMworld #MGT3166BU Disclaimer
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationvrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud
vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud Overview: Realizing the Full Power of the Cloud Cloud computing provides tremendous competitive advantages to companies, but
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI1303BU Security with NSX. Greater Security in the Digital Business Age Alex Berger, NSX Product Marketing #VMworld #SAI1303BU Disclaimer This presentation may contain product features that are currently
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust
More informationProactive Approach to Cyber Security
Proactive roach to Cyber Security Jeffrey Neo Sales Director HP Enterprise Security Products Customers struggle to manage the security challenge Today, security is a board-level agenda item 2 Trends driving
More informationApplication Security at Scale
Jake Marcinko Standards Manager, PCI Security Standards Council Jeff Williams CTO, Contrast Security Application Security at Scale AppSec at Scale Delivering Timely Security Solutions / Services to Meet
More informationOperationalizing the Three Principles of Advanced Threat Detection
SESSION ID: SDS2-R08 Operationalizing the Three Principles of Advanced Threat Detection ZULFIKAR RAMZAN, PH.D Chief Technology Officer RSA @zulfikar_ramzan Dealing with Traffic Congestion Singapore: Major
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationOptimisation drives digital transformation
January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationCustomer Case Studies on Accelerating Their Path to Hybrid Cloud
Customer Case Studies on Accelerating Their Path to Hybrid Cloud Hitachi and VMware: Global Strategic Partners Committed to Success Sunny Sahajpal EMEA Strategic Alliances and OEM Mananger VMware Partner
More informationSecuring Your Virtual World Harri Kaikkonen Channel Manager
Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationFast IT - Policy Driven Infrastructure for the Intercloud World
Fast IT - Policy Driven Infrastructure for the Intercloud World Paul Horrocks Technical Solution Architect Agenda What is Fast IT? What is Policy? How Cisco delivers Fast IT The foundation for Fast IT
More informationDesigning an Adaptive Defense Security Architecture. George Chiorescu FireEye
Designing an Adaptive Defense Security Architecture George Chiorescu FireEye Designing an Adaptive Security Architecture Key Challanges Existing blocking and prevention capabilities are insufficient to
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1221BE Beginners Guide to the Software-Defined Data Center Kyle Gleed, Group Manager, Technical Marketing Ben Sier, Staff Architect, Technical Marketing #VMworld #PBO1221BE Disclaimer This presentation
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationIncident Response Agility: Leverage the Past and Present into the Future
SESSION ID: SPO1-W03 Incident Response Agility: Leverage the Past and Present into the Future Torry Campbell CTO, Endpoint and Management Technologies Intel Security The Reality we Face Reconnaissance
More informationFive Essential Capabilities for Airtight Cloud Security
Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationThat Set the Foundation for the Private Cloud
for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationMITIGATE CYBER ATTACK RISK
SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations
More informationVMworld 2015 Track Names and Descriptions
Software- Defined Data Center Software- Defined Data Center General VMworld 2015 Track Names and Descriptions Pioneered by VMware and recognized as groundbreaking by the industry and analysts, the VMware
More informationEnabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014
Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationVMworld 2015 Track Names and Descriptions
VMworld 2015 Track Names and Descriptions Software- Defined Data Center Software- Defined Data Center General Pioneered by VMware and recognized as groundbreaking by the industry and analysts, the VMware
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationOracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker
Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker October 14, 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is currently
More informationDigital Renewable Ecosystem on Predix Platform from GE Renewable Energy
Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationData Center Micro-Segmentation
Data Center Micro-Segmentation A Software Defined Data Center Approach for a Zero Trust Security Strategy WHITE PAPER Table of Contents Executive Summary... 3 The Software Defined Data Center is the Future...
More informationCloud Computing Private Cloud
Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus
More informationin Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM
Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationOUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER
OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE
More informationCylance Axiom Alliances Program
Alliances Program Cylance Axiom Alliances Program Program Overview The Cylance Axiom Alliances Program is a community of cybersecurity solution providers working together to deliver a prevention-first
More informationSecuring Data in the Cloud: Point of View
Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationConverged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide
Converged Security - Protect your Digital Enterprise May 24, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Richard Bishop Vivit Board United Kingdom Chapter
More informationConverged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products
Converged security Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Increased risk and wasted resources Gartner estimates more than $1B in
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationOsynlig infrastruktur i datacentret med inbyggd säkerhet och resursoptimering.
Osynlig infrastruktur i datacentret med inbyggd säkerhet och resursoptimering. Joel Lindberg Nutanix Build and Manage Daniel Dale varmour Secure and visibility Karl Barton VMTurbo Demand driven control
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MGT1758BE Effectively Operating an Automated Cloud Jad El-Zein @virtualjad Vincent Meoc @vmeoc #VMworld #MGT1758BE Disclaimer This presentation may contain product features that are currently under development.
More informationvsan Security Zone Deployment First Published On: Last Updated On:
First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationCloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.
George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationJourney to Secure and Automated Multi-cloud
Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE
ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More information