IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

Size: px
Start display at page:

Download "IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security"

Transcription

1 WE, 09:00-10:00 IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Paul Murgatroyd Principal Product Manager Chip Epps Principal Product Manager 1

2 Agenda 1 The Virtual Data Center 2 Monitoring ESXi and Hardening vcenter 3 Protecting the Guest 4 SEP, SCSP, and DCP Roadmaps 5 Resources 2

3 There are really two points to consider: LB HA Backup Management Server Virtual Machines Apps Apps Apps Apps Apps Apps Apps Apps Apps SMP Hypervisor Storage Enterprise Servers Enterprise Network Enterprise Storage 3

4 There are really two points to consider: LB HA Backup Protecting your Virtual Infrastructure: Management Server Hypervisor Control Software Apps Apps Apps Virtual Machines Apps Apps Apps Apps Apps Apps Supporting Applications SMP Hypervisor Storage Enterprise Servers Enterprise Network Enterprise Storage 4

5 There are really two points to consider: LB HA Backup Protecting your Virtual Infrastructure: Management Server Hypervisor Control Software Apps Apps Apps Virtual Machines Apps Apps Apps Apps Apps Apps Supporting Applications SMP Hypervisor Storage Enterprise Servers Enterprise Network Protecting your Virtual Machines: Applications Inter-VM Communications Enterprise Storage 5

6 Why Virtualize Promises of Cloud Computing Traditional IT Clouds Leaders Servers per Admin 50 5,000 Time to Provision Server Server Utilization 5 days 15 mins 20% 75% 6

7 But Vulnerabilities Still Exist 7

8 The CISO s Guide To Virtualization Security January % 75% Planning to adopt x86 virtualization Of x86 Servers will be virtual by

9 Servers Are Different from Desktops Servers Hacking Desktops/Laptops Malware vs. 81% of Breaches 99% of Records 69% of Breaches 95% of Records Server Protection is Different from Endpoint Protection 9

10 Servers are the Primary Target 97% of stolen data is from Servers. More often endpoints / user devices simply provide an initial foothold into the organization, from which the intruder stages the rest of their attack.

11 What is Virtual Infrastructure Protection? Monitoring ESXi & Hardening vsphere 11

12 Virtual Infrastructure Still Requires Attention 12

13 Securing vsphere 5 Infrastructure with SCSP vcenter Server SQL DB WMWare Management Framework VMWare vcenter Server 5.0 (64 bit Windows) vcenter Server VMkernel Infrastructure Agents (NTP, Syslog, etc.) VMware ESXi LDAP 64-bit Windows manage VM support and Resource Management CSP Agent Tomcat Web Service vcli vcli for Config and Support Agentless Systems Mgmt Agentless Hardware Monitoring Protecting the Virtualization Management Universe Automate implementation of VMware Hardening Guidelines vcenter IPS Policy : Enhanced Windows Strict policy to protect application components including: vcenter Server, vcenter Orchestrator, vcenter Update Mgr. Infrastructure components e.g., SQL Express DB, Tomcat, JRE vcenter application program files and sensitive directories Virtual Infrastructure Guest Server Protection (certificates and logs) Restricts vcenter network port access to trusted programs CSP Can Agent can protect be the deployed installed following within in tools each accessing a guest specific vcenter virtual guest from machine VM desktops, (1 (virtual per laptops, ESXi client server) access to to lock VM s monitor down or even ESXi the Jump hosts: / application, vsphere Client, vsphere CLI, vsphere Power CLI, vsphere specific to each virtual server s use-case Web Client Mechanics of Monitoring ESXi: vcenter Uses vcli IDS to Policy access Highlights: ESXi log/config files to send over to SCSP vcenter agent Windows Detection Policy Accesses Pre-tuned guest Windows VM config Baseline files through Policy the detects vcli user/group interface and send changes, to SCSP login agent failures, etc. vcenter Enables Application a new ESXi Detection IDS policy Policy to monitor config/access Create Pre-tuned customized Windows reports Policy specific performs to ESXi real-time configuration FIM of vcenter binaries / configurations and monitors vcenter logs ESXi IDS Addresses Policy gap Highlights: in existing vcenter monitoring and log Monitors forwarding the full capabilities suite of critical VMware host configuration files (22 files) accessible through vcli for: ESXi host command line interface (CLI) login failures and successes Critical configuration changes to ESXi host Administrative web access 13

14 Automatically Harden and Monitor Per VMware s vsphere Hardening Guidelines Pre-defined global and granular policies Lockdown the Windows Server with industry s leading critical system protection Harden the vcenter application against unauthorized access, executables or configuration changes Directly monitor your ESXi host configurations for unauthorized changes Harden your individual ESX/ESXi Guest VMs 14

15 What is Agent-less? Introspection & vnetwork Analysis 15

16 Is Symantec going to Support vshield and When Yes, now in SEP Jaguar! 16

17 Roadmap Progress Phase 1 Re-architect Security for Changing Threat Environment Done Insight and SONAR Phase 2 Phase 3 Phase 4 Optimize Features for Virtualized Environment Maximize Integration with Platforms, and Introspection-Zoning Infrastructure Maximize Architecture for Cloud Service Delivery Done Shared Insight Cache & vcenter Hardening Done vshield & vsphere integration Currently in development 17

18 SEP RU2: vshield Use Case vsic Network Shared Insight Cache (vsic) SEP Client SEP Client SEP Client SVA VMware vshield Endpoint / VMTools GVM GVM GVM ESXi Host 18

19 Shared Insight Cache for Virtual Environments (vsic) vshield Endpoint enabled scan cache to optimize performance for scanning Moves the SEP 12.1 Shared Insight Cache into a Security Virtual Appliance Uses vshield Endpoint as the communication channel between SEP and the cache Same performance benefit as SEP 12.1 cache Significant resource reduction for persistent VDI Limited impact for non-persistent VDI and server applications 19

20 How Apply Traditional Security as Agentless? Firewall NIPS Reputation AV Behavioral HIPS ETC 20

21 % of samples SEP 12.1 vs. Trend Micro Deep Security 8.0 May % 90% 100% 64% 80% 70% 60% 50% 40% 30% 20% 10% Baseline Maximum 20% 16% Compromised Neutralized Defended 0% Symantec Endpoint Protection 12.1 Trend Deep Security 8 (Agentless) 21

22 SEP 12.1 Built for Virtual Environments Scan Elimination Scan De-duplication Scan Randomization Virtual Image Exception Virtual Client Tagging Resource Leveling Insight and Shared Insight Cache Offline Image Scanning Together up to 90% reduction in disk IO 22

23 New Approaches: Insight Enhanced Scanning On a typical system, 80% of active applications can be skipped! Traditional Scanning - Requires scan of every file - Scans on defined schedule Insight Scanning - Requires scan of un-trusted files only - Scans based on user activity 23

24 SEP 12 vs. Trend Micro Deep Security 8 -Virtual Machine Performance April % reduction in I/0 60% reduction in scan time 24

25 Roadmap 25

26 Disclaimer This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. 26

27 Breadth of Security Risk A Perspective Tomorrow Today Service-Oriented, Hybrid Security Model VM Service Levels Maximum Maximum Security Guest Security SVA Baseline Security Gold Silver Bronze Maximum Host Hardened Security Virtual Infrastructure 27

28 Security Effectiveness Dynamic, Transparent, Beyond-Physical Security On a Hardened Infrastructure across Managed/Unmanaged VMs Today Medium Term Agented VMs (Managed) Long Term Agented (Managed) Agented VMs (Managed) Agent-less Protection (All VMs) Agented Value-Add Agent-less Protection (All VMs) Hardened Virtual Infra. Hardened Virtual Infra. Agentless Baseline Hardened Virtual Infra. Agent (SCSP + SEP) Agentless Hardened Infrastructure hardened by SYMC Baseline Security Rogue VM Protected Agentlessly by SYMC Full Security VM fully protected with SYMC Agents 28

29 Roadmap for Symantec Endpoint and Server Security Endpoint Protection McLaren FIPS Support Mac IPS Bug Fixes Endpoint Protection Ferrari Mac Firewall & Management Linux Management Network-based Definitions Performance/Content Improvements SEP Endpoint Protection Porsche New Management Server Enhanced Reporting Endpoint Security Product Integrations 2013 CYQ1 Q2 Q3 Q4 CYQ1 Q2 Q3 Q4 CYQ Apr Jul Oct 2014 Apr Jul Oct 2015 Server Protection Ferrari Agentless Protection (VMware) Provisioning via vcenter Application Whitelisting for Windows Server Protection Porsche New Management Server Enhanced Reporting Agented anti-malware Agentless Protection (non- VMware) DCP 29

30 Next Steps for SEP Shared Content- NetDefs Network Shared Insight Cache (nsic) Shared Network Definitions (ndef) SEP Client GVM SEP Client GVM SEP Client GVM Shared Content ESXi Host 30

31 What is Data Center Protection? CSP Sandboxing + Application Whitelisting Controls Agentless AV and IPS Virtual Security SVA s Data Center Protection (DCP)

32 Next Steps for Agentless Protection VM VM Tools VM VM Tools SYMC EPSEC SVA VM VM Tools VM VM Tools SYMC EPSEC SVA VM VM Tools VM VM Tools SYMC EPSEC SVA SYMC NetX SVA ESXi 5.1 ESXi 5.1 ESXi 5.1 vcenter Plug-in VMware Admin view (incl: vcops) Deployment Environment information AV SVA (EPSEC API) Agentless file scanning (AV/AM) Deployed at vsphere Host level Via EPSEC APIs and vshield Endpoint/ VMtools- now free with vsphere 5.1 Engine and content exist in one place, within the SVA Security policy can be specific to each VM N-IPS SVA (NetX API) Agentless Network IPS protection Deployed at network level (for DPI) Via NetX API and vcloud Networking and Security- must purchase vcns Security policy can be specific to isolated virtual network or per VM workload 32

33 Next Steps for Server Lockdown Protection Workflow Inspect System Rate Applications Manage Change Specify Whitelist Sandbox Applications Review Protection 1. Identify applications via system inspection 2. Determine application reputation Identifies known good applications via Trusted Publishers, application checksums, and/or reputation service 3. Specify how to manage change via Trusted Updaters Incorporates internal change processes into security policy 4. Select Whitelisted and Blacklisted Applications Provides a Default Deny security posture for generic servers Override via Trusted User/Group and Trusted Directories 5. Provide out-of-box security for common applications Admins can select sandboxing controls for the and workload (web servers, database servers, domain controllers, ) 6. View Security Summary and Overall Risk Profile Identifies gaps based on the controls selected and server profile 33

34 Data Center: Server (Virtual, Physical) End User: Desktop/Laptop Data Center The Offerings Today Management Consoles Ferrari Common Management Porsche Symantec Endpoint Protection (SEP) SEP SEP SEP Critical Systems Protection (CSP) SEP CSP 1. Agented system lockdown (with whitelisting) 2. Agented monitoring Agentless 1. VMware SEP CSP 1. Agented system lockdown (with whitelisting) 2. Agented monitoring Agentless 1. Multiple hypervisors 34

35 Agentless Protection Capabilities Why Have Both NetDefs and Agentless? SEP + NetDefs DCP (with agentless) Solves SEP def update IO issue, primarily for non persistent VDI Maintain SEP footprint in virtual environments by removing the problem of update storms (images with outdated defs) Full SEP protection including SONAR and Web protection in virtual environments (multiple layers of defense) Hypervisor agnostic - performant solution for any virtual environment Foundation for protecting the Software Defined Data Center Easy virtual administrator buy-in, due to less operational friction (install, patch, ) Performance: Single instance of the protection engines and content Protection: Immediate up to date coverage for new, rogue, or dormant VMs Protection: Less risk of security tampering at guest 35

36 Virtual Security Top-to-Bottom Hypervisor SVA SVA 1 Hardened Infrastructure Hardening infrastructure (Hypervisor kernel-level file monitoring, management hardening) Server Management capabilities for patch, change management, discovery, inventory etc. Hypervisor vserver Farm Cloud VDI Security Host/VM Management Infrastructure 2 3 Baseline Security for All VMs (agent-less for unmanaged VMs) through SVA Enhanced Agent-less via Security Virtual Appliance enabling IPS, Deep Packet Inspection, File Integrity Monitoring, AV, etc. Zoning through workflow integration to drive actions based on security posture Full Security for Managed VMs (agented) through SCSP and SEP In-guest agent thinning supporting introspection and differentiated security (Shared AV Definitions, reduced memory etc.) Agent (SCSP + SEP) Agentless Hardened Infrastructure Hardened by SYMC Baseline Security Rogue VM Protected Agentlessly by SYMC Maximum Security VM fully protected with SYMC Agents 36

37 Other Sessions to Attend Breakouts WE, 17:15-18:15; VMware: the Virtualization Journey: Managing and Proving Compliance with VMware and Symantec P1/Room 114 ST B05 TH, 09:00-10:00; Symantec Reference Architecture for Business Critical Virtualization P1/Room 112 IS B09 TH, 0:900-10:00; SONAR, Insight, Skeptic and GIN- The Symantec Secret Sauce P1/Room 114 IS B27 TH, 13:45 14:45, Symantec Protection Engine: gives almost any application or the ability to scan for threats P1/Room 115 IS B07 TH, 13:45-14:45, The Roadmap for Symantec infrastructure Protection Products P1/Room 114 LABS IS L03 WE, 10:30-11:30; Security Virtualized Environments P1/Room 119 IS L06 WE, 15:45-16:45; Protect Servers and Defend against APTs with Symantec SCSP P1/Room 119 IS L07 WE, 17:15-18:15; Lock down your Virtual environment with SCSP P1/Room 119 IS L02 TH, 11:45-12:45; Migrating to SEP 12.1 from an earlier version or another vendor s product P1/Room

38 Additional Resources Symantec Virtualization Security site on symantec.com Securing the Virtual Data Center white paper VMware and Symantec Joint Press Release - Solution overviews Coming Soon: VDI Best Practices White Paper Joint VMware Reference Architecture (via QSA Coalfire) 38

39 Thank you! Paul Murgatroyd Chip Epps Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 39

Securing Your Virtual Data Centers:

Securing Your Virtual Data Centers: Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Chip Epps, Symantec, PM Virtualization Security Papi Menon, VMware, PM vshield Endpoint 1 Agenda 1 The Virtual Data Center

More information

Symantec and VMWare why 1+1 makes 3

Symantec and VMWare why 1+1 makes 3 Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

Kaspersky Security for Virtualization Frequently Asked Questions

Kaspersky Security for Virtualization Frequently Asked Questions Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

Symantec Endpoint Protection 12

Symantec Endpoint Protection 12 Symantec Endpoint Protection 12 Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently Graham Ahearne, Marcus Brownell Product Management 1 Agenda 1 2 3 Challenges How Symantec

More information

Datacenter Security: Protection Beyond OS LifeCycle

Datacenter Security: Protection Beyond OS LifeCycle Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000

More information

EM L01 Introduction to Mobile

EM L01 Introduction to Mobile EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions

More information

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1 Panelists Jeff Marsh Christian Sosa David Nguyen Presentation

More information

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Ensure Virtualization Security and Improve Business Productivity with Kaspersky Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 JIM P. NIXON Application Support Manager Seyfarth Shaw LLP jnixon@seyfarth.com IN THE PAST, TRADITIONAL SOLUTIONS DIDN T THINK ABOUT VIRTUAL WORKLOADS

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

AS Stallion. Security for Virtual Server Environments. Urmas Püss

AS Stallion. Security for Virtual Server Environments. Urmas Püss AS Stallion 110311 Security for Virtual Server Environments Urmas Püss 1 Trend 1: Threat Evolution & Perimeter Porosity Trend 2: Challenges of Dynamic Datacenter Deep Security: Make Servers Self-Defending

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring

More information

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product

More information

Trend Micro deep security 9.6

Trend Micro deep security 9.6 datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving

More information

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream

More information

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

White Paper. Securing the virtual infrastructure without impacting performance

White Paper. Securing the virtual infrastructure without impacting performance White Paper Securing the virtual infrastructure without impacting performance Introduction Virtualization offers many benefits, but also raises additional performance issues in areas of security. This

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

Securing the Data Center against

Securing the Data Center against Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and

More information

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint

More information

Deep Security 9. A Server Security Platform for Physical, Virtual, Cloud. Territory Sales Manager SEE, Trend Micro. Copyright 2011 Trend Micro Inc.

Deep Security 9. A Server Security Platform for Physical, Virtual, Cloud. Territory Sales Manager SEE, Trend Micro. Copyright 2011 Trend Micro Inc. Deep Security 9 A Server Security Platform for Physical, Virtual, Cloud Marko Djordjevic, Available Aug 30, 2011 Territory Sales Manager SEE, Trend Micro Deep Security 9 Exec Summary Market Trends Deep

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

Securing Your Virtual World Harri Kaikkonen Channel Manager

Securing Your Virtual World Harri Kaikkonen Channel Manager Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

Disclaimer CONFIDENTIAL 2

Disclaimer CONFIDENTIAL 2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Technical Overview. Jack Smith Sr. Solutions Architect

Technical Overview. Jack Smith Sr. Solutions Architect Technical Overview Jack Smith Sr. Solutions Architect Liquidware Labs Methodology Production Environments Assess Design POCs/Pilots Stratusphere FIT Stratusphere UX Validate Migrate ProfileUnity FlexApp

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012 SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating

More information

Table of Contents HOL-PRT-1464

Table of Contents HOL-PRT-1464 Table of Contents Lab Overview - - Applying Data Center Security with Symantec & VMware NSX... 2 Lab Guidance... 3 About Symantec Data Center Security: Server... 4 Module 1 - Configure policies, Test Virtual

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted

More information

AppDefense Getting Started. VMware AppDefense

AppDefense Getting Started. VMware AppDefense AppDefense Getting Started VMware AppDefense You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit

More information

Deep Security 9.5 Supported Features by Platform

Deep Security 9.5 Supported Features by Platform Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

IM B32: What s New in NetBackup: The Vision and Roadmap

IM B32: What s New in NetBackup: The Vision and Roadmap IM B32: What s New in NetBackup: The Vision and Roadmap Stephen Stange NetBackup Product Management Danny Milrad Director Product Marketing Agenda Market Trends & NetBackup Vision NetBackup Key Feature

More information

ForeScout CounterACT. Configuration Guide. Version 1.1

ForeScout CounterACT. Configuration Guide. Version 1.1 ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency

More information

Branch Office Desktop

Branch Office Desktop Branch Office Desktop VMware Solution Lab Validation HOW-TO GUIDE Solution Overview Regional and branch offices need access to corporate assets but often lack local administrative resources to maintain

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

VMware vsphere 5.5 Professional Bootcamp

VMware vsphere 5.5 Professional Bootcamp VMware vsphere 5.5 Professional Bootcamp Course Overview Course Objectives Cont. VMware vsphere 5.5 Professional Bootcamp is our most popular proprietary 5 Day course with more hands-on labs (100+) and

More information

Expand Virtualization. Maintain Security.

Expand Virtualization. Maintain Security. Expand Virtualization. Maintain Security. Key security decisions for virtualized infrastructures As enterprises make virtualization mission-critical for servers for servers and desktops, and desktops,

More information

NetBackup for vcloud Director

NetBackup for vcloud Director NETBACKUP 7.6 FEATURE BRIEFING NETBACKUP FOR VCLOUD DIRECTOR NetBackup 7.6 Feature Briefing NetBackup for vcloud Director Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

KASPERSKY ENDPOINT SECURITY FOR BUSINESS KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd

More information

Deep Security 9.5 Supported Features by Platform

Deep Security 9.5 Supported Features by Platform Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Application Virtualization Deep Dive: Taking Virtualization to the Next Level. Presentation Identifier Goes Here

Application Virtualization Deep Dive: Taking Virtualization to the Next Level. Presentation Identifier Goes Here Application Virtualization Deep Dive: Taking Virtualization to the Next Level Erik Hughes - Symantec Principal Product Manager Marco Schiffner - McKinsey IT Project Manager Presentation Identifier Goes

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Securing the Software-Defined Data Center

Securing the Software-Defined Data Center Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

The vsphere 6.0 Advantages Over Hyper- V

The vsphere 6.0 Advantages Over Hyper- V The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted

More information

LIGHT AGENT OR AGENTLESS

LIGHT AGENT OR AGENTLESS LIGHT AGENT OR AGENTLESS A Features Guide to Kaspersky Security for Virtualization www.kaspersky.com 2 With virtualization becoming ever more widespread, the need for adequate security solutions is self-evident.

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Symantec Endpoint Protection 14

Symantec Endpoint Protection 14 Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 4.1.0 Update 1 vshield Zones 4.1.0 Update 1 vshield Edge 1.0.0 Update 1 vshield App 1.0.0 Update 1 vshield Endpoint 1.0.0 Update 1 This document supports the version of each product listed

More information

Tips and Tricks on Building Agentless Antivirus Scanners for Virtual Desktops

Tips and Tricks on Building Agentless Antivirus Scanners for Virtual Desktops July 2013 Tips and Tricks on Building Agentless Antivirus Scanners for Virtual Desktops Yury Magalif, MASE, VCP Principal Architect Cloud Computing Agenda I. Design Decisions Current AV or Agentless II.

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

CSP 2017 Network Virtualisation and Security Scott McKinnon

CSP 2017 Network Virtualisation and Security Scott McKinnon CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are

More information

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer

More information

vsphere Security Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vsphere Security Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group

Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group Dynamic Multi-Pathing for VMware 1 Agenda 1 Heterogenous multi-pathing

More information

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to

More information

Securing VMware NSX MAY 2014

Securing VMware NSX MAY 2014 Securing VMware NSX MAY 2014 Securing VMware NSX Table of Contents Executive Summary... 2 NSX Traffic [Control, Management, and Data]... 3 NSX Manager:... 5 NSX Controllers:... 8 NSX Edge Gateway:... 9

More information

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

Dell EMC Ready System for VDI on VxRail

Dell EMC Ready System for VDI on VxRail Dell EMC Ready System for VDI on VxRail Citrix XenDesktop for Dell EMC VxRail Hyperconverged Appliance April 2018 H16968.1 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

What Is New in VMware vcenter Server 4 W H I T E P A P E R

What Is New in VMware vcenter Server 4 W H I T E P A P E R What Is New in VMware vcenter Server 4 W H I T E P A P E R Table of Contents What Is New in VMware vcenter Server 4....................................... 3 Centralized Control and Visibility...............................................

More information

EM L05 Symantec Mobile Management Managing ios and Android Devices

EM L05 Symantec Mobile Management Managing ios and Android Devices EM L05 Symantec Mobile Managing ios and Android Devices Scott Jareo Principal Field Enablement Mgr. EM L05 SMM Managing ios and Android Devices 1 Kindle Introduction Touch the power button on the bottom

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve

More information

Symantec Enterprise Solution Product Guide

Symantec Enterprise Solution Product Guide SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Intel and Symantec: Improving performance, security, manageability and data protection

Intel and Symantec: Improving performance, security, manageability and data protection Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the

More information

Agile Security Solutions

Agile Security Solutions Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization

More information

VMware vsphere Customized Corporate Agenda

VMware vsphere Customized Corporate Agenda VMware vsphere Customized Corporate Agenda It's not just VMware Install, Manage, Configure (Usual VCP Course). For working professionals, just VCP is not enough, below is the custom agenda. At the outset,

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

vsphere Security Update 2 Modified 04 OCT 2017 VMware vsphere 6.0 VMware ESXi 6.0 vcenter Server 6.0

vsphere Security Update 2 Modified 04 OCT 2017 VMware vsphere 6.0 VMware ESXi 6.0 vcenter Server 6.0 Update 2 Modified 04 OCT 2017 VMware vsphere 6.0 VMware ESXi 6.0 vcenter Server 6.0 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Networking and Security Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com.

Networking and Security Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com. ing and Services Compatibility Guide ing and Services Compatibility Guide Last Updated: February 14, 2018 For more information go to vmware.com. What's New Changes made in the last 7 days include: None

More information

VM-SERIES FOR VMWARE VM VM

VM-SERIES FOR VMWARE VM VM SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Outline: Securing The Cloud with VMWARE vsphere Code: ACBE GEN-VMSECURE_ONLINE. Days: 5. Course Description:

Outline: Securing The Cloud with VMWARE vsphere Code: ACBE GEN-VMSECURE_ONLINE. Days: 5. Course Description: VMTRAINING Securing The Cloud with VMWARE vsphere Code: ACBE GEN-VMSECURE_ONLINE Days: 5 Course Description: This course is going to provide a solid understanding of the various components that make up

More information