IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security
|
|
- Raymond Greer
- 5 years ago
- Views:
Transcription
1 WE, 09:00-10:00 IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Paul Murgatroyd Principal Product Manager Chip Epps Principal Product Manager 1
2 Agenda 1 The Virtual Data Center 2 Monitoring ESXi and Hardening vcenter 3 Protecting the Guest 4 SEP, SCSP, and DCP Roadmaps 5 Resources 2
3 There are really two points to consider: LB HA Backup Management Server Virtual Machines Apps Apps Apps Apps Apps Apps Apps Apps Apps SMP Hypervisor Storage Enterprise Servers Enterprise Network Enterprise Storage 3
4 There are really two points to consider: LB HA Backup Protecting your Virtual Infrastructure: Management Server Hypervisor Control Software Apps Apps Apps Virtual Machines Apps Apps Apps Apps Apps Apps Supporting Applications SMP Hypervisor Storage Enterprise Servers Enterprise Network Enterprise Storage 4
5 There are really two points to consider: LB HA Backup Protecting your Virtual Infrastructure: Management Server Hypervisor Control Software Apps Apps Apps Virtual Machines Apps Apps Apps Apps Apps Apps Supporting Applications SMP Hypervisor Storage Enterprise Servers Enterprise Network Protecting your Virtual Machines: Applications Inter-VM Communications Enterprise Storage 5
6 Why Virtualize Promises of Cloud Computing Traditional IT Clouds Leaders Servers per Admin 50 5,000 Time to Provision Server Server Utilization 5 days 15 mins 20% 75% 6
7 But Vulnerabilities Still Exist 7
8 The CISO s Guide To Virtualization Security January % 75% Planning to adopt x86 virtualization Of x86 Servers will be virtual by
9 Servers Are Different from Desktops Servers Hacking Desktops/Laptops Malware vs. 81% of Breaches 99% of Records 69% of Breaches 95% of Records Server Protection is Different from Endpoint Protection 9
10 Servers are the Primary Target 97% of stolen data is from Servers. More often endpoints / user devices simply provide an initial foothold into the organization, from which the intruder stages the rest of their attack.
11 What is Virtual Infrastructure Protection? Monitoring ESXi & Hardening vsphere 11
12 Virtual Infrastructure Still Requires Attention 12
13 Securing vsphere 5 Infrastructure with SCSP vcenter Server SQL DB WMWare Management Framework VMWare vcenter Server 5.0 (64 bit Windows) vcenter Server VMkernel Infrastructure Agents (NTP, Syslog, etc.) VMware ESXi LDAP 64-bit Windows manage VM support and Resource Management CSP Agent Tomcat Web Service vcli vcli for Config and Support Agentless Systems Mgmt Agentless Hardware Monitoring Protecting the Virtualization Management Universe Automate implementation of VMware Hardening Guidelines vcenter IPS Policy : Enhanced Windows Strict policy to protect application components including: vcenter Server, vcenter Orchestrator, vcenter Update Mgr. Infrastructure components e.g., SQL Express DB, Tomcat, JRE vcenter application program files and sensitive directories Virtual Infrastructure Guest Server Protection (certificates and logs) Restricts vcenter network port access to trusted programs CSP Can Agent can protect be the deployed installed following within in tools each accessing a guest specific vcenter virtual guest from machine VM desktops, (1 (virtual per laptops, ESXi client server) access to to lock VM s monitor down or even ESXi the Jump hosts: / application, vsphere Client, vsphere CLI, vsphere Power CLI, vsphere specific to each virtual server s use-case Web Client Mechanics of Monitoring ESXi: vcenter Uses vcli IDS to Policy access Highlights: ESXi log/config files to send over to SCSP vcenter agent Windows Detection Policy Accesses Pre-tuned guest Windows VM config Baseline files through Policy the detects vcli user/group interface and send changes, to SCSP login agent failures, etc. vcenter Enables Application a new ESXi Detection IDS policy Policy to monitor config/access Create Pre-tuned customized Windows reports Policy specific performs to ESXi real-time configuration FIM of vcenter binaries / configurations and monitors vcenter logs ESXi IDS Addresses Policy gap Highlights: in existing vcenter monitoring and log Monitors forwarding the full capabilities suite of critical VMware host configuration files (22 files) accessible through vcli for: ESXi host command line interface (CLI) login failures and successes Critical configuration changes to ESXi host Administrative web access 13
14 Automatically Harden and Monitor Per VMware s vsphere Hardening Guidelines Pre-defined global and granular policies Lockdown the Windows Server with industry s leading critical system protection Harden the vcenter application against unauthorized access, executables or configuration changes Directly monitor your ESXi host configurations for unauthorized changes Harden your individual ESX/ESXi Guest VMs 14
15 What is Agent-less? Introspection & vnetwork Analysis 15
16 Is Symantec going to Support vshield and When Yes, now in SEP Jaguar! 16
17 Roadmap Progress Phase 1 Re-architect Security for Changing Threat Environment Done Insight and SONAR Phase 2 Phase 3 Phase 4 Optimize Features for Virtualized Environment Maximize Integration with Platforms, and Introspection-Zoning Infrastructure Maximize Architecture for Cloud Service Delivery Done Shared Insight Cache & vcenter Hardening Done vshield & vsphere integration Currently in development 17
18 SEP RU2: vshield Use Case vsic Network Shared Insight Cache (vsic) SEP Client SEP Client SEP Client SVA VMware vshield Endpoint / VMTools GVM GVM GVM ESXi Host 18
19 Shared Insight Cache for Virtual Environments (vsic) vshield Endpoint enabled scan cache to optimize performance for scanning Moves the SEP 12.1 Shared Insight Cache into a Security Virtual Appliance Uses vshield Endpoint as the communication channel between SEP and the cache Same performance benefit as SEP 12.1 cache Significant resource reduction for persistent VDI Limited impact for non-persistent VDI and server applications 19
20 How Apply Traditional Security as Agentless? Firewall NIPS Reputation AV Behavioral HIPS ETC 20
21 % of samples SEP 12.1 vs. Trend Micro Deep Security 8.0 May % 90% 100% 64% 80% 70% 60% 50% 40% 30% 20% 10% Baseline Maximum 20% 16% Compromised Neutralized Defended 0% Symantec Endpoint Protection 12.1 Trend Deep Security 8 (Agentless) 21
22 SEP 12.1 Built for Virtual Environments Scan Elimination Scan De-duplication Scan Randomization Virtual Image Exception Virtual Client Tagging Resource Leveling Insight and Shared Insight Cache Offline Image Scanning Together up to 90% reduction in disk IO 22
23 New Approaches: Insight Enhanced Scanning On a typical system, 80% of active applications can be skipped! Traditional Scanning - Requires scan of every file - Scans on defined schedule Insight Scanning - Requires scan of un-trusted files only - Scans based on user activity 23
24 SEP 12 vs. Trend Micro Deep Security 8 -Virtual Machine Performance April % reduction in I/0 60% reduction in scan time 24
25 Roadmap 25
26 Disclaimer This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. 26
27 Breadth of Security Risk A Perspective Tomorrow Today Service-Oriented, Hybrid Security Model VM Service Levels Maximum Maximum Security Guest Security SVA Baseline Security Gold Silver Bronze Maximum Host Hardened Security Virtual Infrastructure 27
28 Security Effectiveness Dynamic, Transparent, Beyond-Physical Security On a Hardened Infrastructure across Managed/Unmanaged VMs Today Medium Term Agented VMs (Managed) Long Term Agented (Managed) Agented VMs (Managed) Agent-less Protection (All VMs) Agented Value-Add Agent-less Protection (All VMs) Hardened Virtual Infra. Hardened Virtual Infra. Agentless Baseline Hardened Virtual Infra. Agent (SCSP + SEP) Agentless Hardened Infrastructure hardened by SYMC Baseline Security Rogue VM Protected Agentlessly by SYMC Full Security VM fully protected with SYMC Agents 28
29 Roadmap for Symantec Endpoint and Server Security Endpoint Protection McLaren FIPS Support Mac IPS Bug Fixes Endpoint Protection Ferrari Mac Firewall & Management Linux Management Network-based Definitions Performance/Content Improvements SEP Endpoint Protection Porsche New Management Server Enhanced Reporting Endpoint Security Product Integrations 2013 CYQ1 Q2 Q3 Q4 CYQ1 Q2 Q3 Q4 CYQ Apr Jul Oct 2014 Apr Jul Oct 2015 Server Protection Ferrari Agentless Protection (VMware) Provisioning via vcenter Application Whitelisting for Windows Server Protection Porsche New Management Server Enhanced Reporting Agented anti-malware Agentless Protection (non- VMware) DCP 29
30 Next Steps for SEP Shared Content- NetDefs Network Shared Insight Cache (nsic) Shared Network Definitions (ndef) SEP Client GVM SEP Client GVM SEP Client GVM Shared Content ESXi Host 30
31 What is Data Center Protection? CSP Sandboxing + Application Whitelisting Controls Agentless AV and IPS Virtual Security SVA s Data Center Protection (DCP)
32 Next Steps for Agentless Protection VM VM Tools VM VM Tools SYMC EPSEC SVA VM VM Tools VM VM Tools SYMC EPSEC SVA VM VM Tools VM VM Tools SYMC EPSEC SVA SYMC NetX SVA ESXi 5.1 ESXi 5.1 ESXi 5.1 vcenter Plug-in VMware Admin view (incl: vcops) Deployment Environment information AV SVA (EPSEC API) Agentless file scanning (AV/AM) Deployed at vsphere Host level Via EPSEC APIs and vshield Endpoint/ VMtools- now free with vsphere 5.1 Engine and content exist in one place, within the SVA Security policy can be specific to each VM N-IPS SVA (NetX API) Agentless Network IPS protection Deployed at network level (for DPI) Via NetX API and vcloud Networking and Security- must purchase vcns Security policy can be specific to isolated virtual network or per VM workload 32
33 Next Steps for Server Lockdown Protection Workflow Inspect System Rate Applications Manage Change Specify Whitelist Sandbox Applications Review Protection 1. Identify applications via system inspection 2. Determine application reputation Identifies known good applications via Trusted Publishers, application checksums, and/or reputation service 3. Specify how to manage change via Trusted Updaters Incorporates internal change processes into security policy 4. Select Whitelisted and Blacklisted Applications Provides a Default Deny security posture for generic servers Override via Trusted User/Group and Trusted Directories 5. Provide out-of-box security for common applications Admins can select sandboxing controls for the and workload (web servers, database servers, domain controllers, ) 6. View Security Summary and Overall Risk Profile Identifies gaps based on the controls selected and server profile 33
34 Data Center: Server (Virtual, Physical) End User: Desktop/Laptop Data Center The Offerings Today Management Consoles Ferrari Common Management Porsche Symantec Endpoint Protection (SEP) SEP SEP SEP Critical Systems Protection (CSP) SEP CSP 1. Agented system lockdown (with whitelisting) 2. Agented monitoring Agentless 1. VMware SEP CSP 1. Agented system lockdown (with whitelisting) 2. Agented monitoring Agentless 1. Multiple hypervisors 34
35 Agentless Protection Capabilities Why Have Both NetDefs and Agentless? SEP + NetDefs DCP (with agentless) Solves SEP def update IO issue, primarily for non persistent VDI Maintain SEP footprint in virtual environments by removing the problem of update storms (images with outdated defs) Full SEP protection including SONAR and Web protection in virtual environments (multiple layers of defense) Hypervisor agnostic - performant solution for any virtual environment Foundation for protecting the Software Defined Data Center Easy virtual administrator buy-in, due to less operational friction (install, patch, ) Performance: Single instance of the protection engines and content Protection: Immediate up to date coverage for new, rogue, or dormant VMs Protection: Less risk of security tampering at guest 35
36 Virtual Security Top-to-Bottom Hypervisor SVA SVA 1 Hardened Infrastructure Hardening infrastructure (Hypervisor kernel-level file monitoring, management hardening) Server Management capabilities for patch, change management, discovery, inventory etc. Hypervisor vserver Farm Cloud VDI Security Host/VM Management Infrastructure 2 3 Baseline Security for All VMs (agent-less for unmanaged VMs) through SVA Enhanced Agent-less via Security Virtual Appliance enabling IPS, Deep Packet Inspection, File Integrity Monitoring, AV, etc. Zoning through workflow integration to drive actions based on security posture Full Security for Managed VMs (agented) through SCSP and SEP In-guest agent thinning supporting introspection and differentiated security (Shared AV Definitions, reduced memory etc.) Agent (SCSP + SEP) Agentless Hardened Infrastructure Hardened by SYMC Baseline Security Rogue VM Protected Agentlessly by SYMC Maximum Security VM fully protected with SYMC Agents 36
37 Other Sessions to Attend Breakouts WE, 17:15-18:15; VMware: the Virtualization Journey: Managing and Proving Compliance with VMware and Symantec P1/Room 114 ST B05 TH, 09:00-10:00; Symantec Reference Architecture for Business Critical Virtualization P1/Room 112 IS B09 TH, 0:900-10:00; SONAR, Insight, Skeptic and GIN- The Symantec Secret Sauce P1/Room 114 IS B27 TH, 13:45 14:45, Symantec Protection Engine: gives almost any application or the ability to scan for threats P1/Room 115 IS B07 TH, 13:45-14:45, The Roadmap for Symantec infrastructure Protection Products P1/Room 114 LABS IS L03 WE, 10:30-11:30; Security Virtualized Environments P1/Room 119 IS L06 WE, 15:45-16:45; Protect Servers and Defend against APTs with Symantec SCSP P1/Room 119 IS L07 WE, 17:15-18:15; Lock down your Virtual environment with SCSP P1/Room 119 IS L02 TH, 11:45-12:45; Migrating to SEP 12.1 from an earlier version or another vendor s product P1/Room
38 Additional Resources Symantec Virtualization Security site on symantec.com Securing the Virtual Data Center white paper VMware and Symantec Joint Press Release - Solution overviews Coming Soon: VDI Best Practices White Paper Joint VMware Reference Architecture (via QSA Coalfire) 38
39 Thank you! Paul Murgatroyd Chip Epps Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 39
Securing Your Virtual Data Centers:
Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Chip Epps, Symantec, PM Virtualization Security Papi Menon, VMware, PM vshield Endpoint 1 Agenda 1 The Virtual Data Center
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationKaspersky Security for Virtualization Frequently Asked Questions
Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationSymantec Endpoint Protection 12
Symantec Endpoint Protection 12 Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently Graham Ahearne, Marcus Brownell Product Management 1 Agenda 1 2 3 Challenges How Symantec
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationEM L01 Introduction to Mobile
EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions
More informationPiero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel
SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1 Panelists Jeff Marsh Christian Sosa David Nguyen Presentation
More informationEnsure Virtualization Security and Improve Business Productivity with Kaspersky
Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationProduct Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationTHREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156
THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 JIM P. NIXON Application Support Manager Seyfarth Shaw LLP jnixon@seyfarth.com IN THE PAST, TRADITIONAL SOLUTIONS DIDN T THINK ABOUT VIRTUAL WORKLOADS
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationAS Stallion. Security for Virtual Server Environments. Urmas Püss
AS Stallion 110311 Security for Virtual Server Environments Urmas Püss 1 Trend 1: Threat Evolution & Perimeter Porosity Trend 2: Challenges of Dynamic Datacenter Deep Security: Make Servers Self-Defending
More informationIntroduction to Virtualization
Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationTrend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
More informationRet h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s
I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream
More informationSymantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide
Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide
More informationMcAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)
McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationWhite Paper. Securing the virtual infrastructure without impacting performance
White Paper Securing the virtual infrastructure without impacting performance Introduction Virtualization offers many benefits, but also raises additional performance issues in areas of security. This
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationSecuring the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationIntroducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationDeep Security 9. A Server Security Platform for Physical, Virtual, Cloud. Territory Sales Manager SEE, Trend Micro. Copyright 2011 Trend Micro Inc.
Deep Security 9 A Server Security Platform for Physical, Virtual, Cloud Marko Djordjevic, Available Aug 30, 2011 Territory Sales Manager SEE, Trend Micro Deep Security 9 Exec Summary Market Trends Deep
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationAutomated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend
SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationSecuring Your Virtual World Harri Kaikkonen Channel Manager
Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000
More informationMOVE AntiVirus page-level reference
McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationTechnical Overview. Jack Smith Sr. Solutions Architect
Technical Overview Jack Smith Sr. Solutions Architect Liquidware Labs Methodology Production Environments Assess Design POCs/Pilots Stratusphere FIT Stratusphere UX Validate Migrate ProfileUnity FlexApp
More informationThe McAfee MOVE Platform and Virtual Desktop Infrastructure
The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationSAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012
SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating
More informationTable of Contents HOL-PRT-1464
Table of Contents Lab Overview - - Applying Data Center Security with Symantec & VMware NSX... 2 Lab Guidance... 3 About Symantec Data Center Security: Server... 4 Module 1 - Configure policies, Test Virtual
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationAppDefense Getting Started. VMware AppDefense
AppDefense Getting Started VMware AppDefense You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit
More informationDeep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationIM B32: What s New in NetBackup: The Vision and Roadmap
IM B32: What s New in NetBackup: The Vision and Roadmap Stephen Stange NetBackup Product Management Danny Milrad Director Product Marketing Agenda Market Trends & NetBackup Vision NetBackup Key Feature
More informationForeScout CounterACT. Configuration Guide. Version 1.1
ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency
More informationBranch Office Desktop
Branch Office Desktop VMware Solution Lab Validation HOW-TO GUIDE Solution Overview Regional and branch offices need access to corporate assets but often lack local administrative resources to maintain
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationVMware vsphere 5.5 Professional Bootcamp
VMware vsphere 5.5 Professional Bootcamp Course Overview Course Objectives Cont. VMware vsphere 5.5 Professional Bootcamp is our most popular proprietary 5 Day course with more hands-on labs (100+) and
More informationExpand Virtualization. Maintain Security.
Expand Virtualization. Maintain Security. Key security decisions for virtualized infrastructures As enterprises make virtualization mission-critical for servers for servers and desktops, and desktops,
More informationNetBackup for vcloud Director
NETBACKUP 7.6 FEATURE BRIEFING NETBACKUP FOR VCLOUD DIRECTOR NetBackup 7.6 Feature Briefing NetBackup for vcloud Director Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationDeep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationApplication Virtualization Deep Dive: Taking Virtualization to the Next Level. Presentation Identifier Goes Here
Application Virtualization Deep Dive: Taking Virtualization to the Next Level Erik Hughes - Symantec Principal Product Manager Marco Schiffner - McKinsey IT Project Manager Presentation Identifier Goes
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationLIGHT AGENT OR AGENTLESS
LIGHT AGENT OR AGENTLESS A Features Guide to Kaspersky Security for Virtualization www.kaspersky.com 2 With virtualization becoming ever more widespread, the need for adequate security solutions is self-evident.
More informationCloud Workload Discovery 4.5.1
Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationSymantec Endpoint Protection 14
Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationvshield Quick Start Guide
vshield Manager 4.1.0 Update 1 vshield Zones 4.1.0 Update 1 vshield Edge 1.0.0 Update 1 vshield App 1.0.0 Update 1 vshield Endpoint 1.0.0 Update 1 This document supports the version of each product listed
More informationTips and Tricks on Building Agentless Antivirus Scanners for Virtual Desktops
July 2013 Tips and Tricks on Building Agentless Antivirus Scanners for Virtual Desktops Yury Magalif, MASE, VCP Principal Architect Cloud Computing Agenda I. Design Decisions Current AV or Agentless II.
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationCSP 2017 Network Virtualisation and Security Scott McKinnon
CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationvsphere Security Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7
Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationVeritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group
Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group Dynamic Multi-Pathing for VMware 1 Agenda 1 Heterogenous multi-pathing
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationSecuring VMware NSX MAY 2014
Securing VMware NSX MAY 2014 Securing VMware NSX Table of Contents Executive Summary... 2 NSX Traffic [Control, Management, and Data]... 3 NSX Manager:... 5 NSX Controllers:... 8 NSX Edge Gateway:... 9
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationBorderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity
Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data
More informationDell EMC Ready System for VDI on VxRail
Dell EMC Ready System for VDI on VxRail Citrix XenDesktop for Dell EMC VxRail Hyperconverged Appliance April 2018 H16968.1 Deployment Guide Abstract This deployment guide provides instructions for deploying
More informationWhat Is New in VMware vcenter Server 4 W H I T E P A P E R
What Is New in VMware vcenter Server 4 W H I T E P A P E R Table of Contents What Is New in VMware vcenter Server 4....................................... 3 Centralized Control and Visibility...............................................
More informationEM L05 Symantec Mobile Management Managing ios and Android Devices
EM L05 Symantec Mobile Managing ios and Android Devices Scott Jareo Principal Field Enablement Mgr. EM L05 SMM Managing ios and Android Devices 1 Kindle Introduction Touch the power button on the bottom
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationSymantec Enterprise Solution Product Guide
SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the
More informationForescout. Configuration Guide. Version 2.4
Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationIntel and Symantec: Improving performance, security, manageability and data protection
Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationVMware vsphere Customized Corporate Agenda
VMware vsphere Customized Corporate Agenda It's not just VMware Install, Manage, Configure (Usual VCP Course). For working professionals, just VCP is not enough, below is the custom agenda. At the outset,
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationvsphere Security Update 2 Modified 04 OCT 2017 VMware vsphere 6.0 VMware ESXi 6.0 vcenter Server 6.0
Update 2 Modified 04 OCT 2017 VMware vsphere 6.0 VMware ESXi 6.0 vcenter Server 6.0 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware
More informationNetworking and Security Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com.
ing and Services Compatibility Guide ing and Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com. What's New Changes made in the last 7 days include: None
More informationVM-SERIES FOR VMWARE VM VM
SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationOutline: Securing The Cloud with VMWARE vsphere Code: ACBE GEN-VMSECURE_ONLINE. Days: 5. Course Description:
VMTRAINING Securing The Cloud with VMWARE vsphere Code: ACBE GEN-VMSECURE_ONLINE Days: 5 Course Description: This course is going to provide a solid understanding of the various components that make up
More information