Securing Your Virtual Data Centers:

Size: px
Start display at page:

Download "Securing Your Virtual Data Centers:"

Transcription

1 Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Chip Epps, Symantec, PM Virtualization Security Papi Menon, VMware, PM vshield Endpoint 1

2 Agenda 1 The Virtual Data Center 2 VMware Update 3 Our Vision and Strategy 4 SEP and SCSP 5 Resources SYMANTEC VISION

3 Do Any Of These Statements Sound Familiar?! I m a security professional and I think I know I need to do something, but I don t know WHY.?! I m a security professional and I need to do something differently? Really? I m a security professional and I think I know I need to do something, but I don t know WHAT.? I m a virtualization technology implementer and I m making the security decisions since my security team isn t. SYMANTEC VISION

4 Why Virtualize Promises of Cloud Computing Traditional IT Clouds Leaders Servers per Admin 50 5,000 Time to Provision Server Server Utilization 5 days 15 mins 20% 75% SYMANTEC VISION

5 The CISO s Guide To Virtualization Security January % 75% Planning to adopt x86 virtualization Of x86 Serverswill be virtual by 2014 SYMANTEC VISION

6 Servers Are Different from Desktops Servers Hacking Desktops/Laptops Malware vs. 81% of Breaches 69% of Breaches 99% of Records 95% of Records Server Protection is Different from Endpoint Protection SYMANTEC VISION

7 Servers are the Primary Target % of stolen data is from Servers. More often endpoints / user devices simply provide an initial foothold into the organization, from which the intruder stages the rest of their attack. SYMANTEC VISION 2012

8 Defining the Virtual Data Center New Protection Required Management Framework Resource Pool App OS App OS VMDK Data Store ESXi Hosts/Hypervisor SYMANTEC VISION

9 And its Logical Characteristics Highly Dynamic and Zoned vapp VDC vapp vapp vapp Web App DB Template SYMANTEC VISION

10 Defining the Virtual < > Security Landscape x86 Server Virtualization Infrastructure Endpoint Protection Platforms Symantec Data Center Endpoint Security SYMANTEC VISION

11 The VMware Cloud Infrastructure Suite Cloud Infrastructure Suite New New New New New vcloud Director 1.5 vshield Security 5.0 vcenter Operations 1.0 vcenter SRM 5.0 vsphere 5.0 Policy, Reporting, Self-Service Virtualized Security & Edge Functions Monitoring & Management Business Continuity High Performance Resource Control, Pooling & Scheduling 11

12 Overview of vshield and vcenter Configuration Manager vshield Edge vshield App with Data Security vshield Endpoint vcenter Configuration Manager Segment and isolate at org level Firewall (IP), VPN, Web load balancer, NAT, DHCP, static routing Segment and isolate based on security, compliance Firewall (vnic), security groups, sensitive data discovery Partner enablement platform for endpoint security AV, File Integrity Monitoring, and more IT compliance management across the stack Controls validation, compliance reporting, change management, patching, and more 12

13 Framework for Orchestrating and Managing VMware and Third Party Networking and Security Services VMware Services Partner Services VMware Data Security VMware.. Security partners Networking partners VMware vshield Manager(VSM) Open Partners Interfaces 13

14 We ve come a long way, but even more exciting times ahead! 2013 and beyond 2011 New 3 rd party endpoint service insertion for solution choice New Data Security discovery of sensitive data New Security Automation using APIs and scripts Scalable and agile networking and security products 2012!! New 3 rd Party network service insertion for more solution choice Shipping products from endpoint security vendors Improved Usability and High Availability Improved automation with data security triggers, vcenter Orchestrator plugin 14

15 Virtual Vulnerabilities Still Exist SYMANTEC VISION

16 Symantec Protection for the Virtual Data Center Management SCSP: Critical System Protection GuestVM SEP: Symantec Endpoint Protection SCSP: Critical System Protection Data Store Protection Engine Hypervisor SCSP: Critical System Protection SYMANTEC VISION

17 A Perspective Today Service-Oriented, Hybrid Security Model VM Breadth of Se ecurity Expanded Maximum Security Guest Security Maximum Host Security SYMANTEC VISION

18 A Perspective Tomorrow Service-Oriented, Hybrid Security Model VM Service Levels Breadth of Se ecurity Ris sk Expanded Security SVA Baseline Security Gold Silver Bronze Hardened Virtual Infrastructure SYMANTEC VISION

19 Security Effectiveness Dynamic, Transparent, Beyond-Physical Security On a Hardened Infrastructure across Managed/Unmanaged VMs Today Agented VMs (Managed) Hardened Virtual Infra. Medium Term Agented VMs (Managed) Agent-less Protection (All VMs) Hardened Virtual Infra. Agented Value-Ad dd Agentless Baseline Long Term Agented (Managed) Agent-less Protection (All VMs) Hardened Virtual Infra. Agent (SCSP + SEP) Agentless Hardened Infrastructure hardened by SYMC Baseline Security Rogue VM Protected Agentlessly by SYMC Full Security VM fully protected with SYMC Agents SYMANTEC VISION

20 What is Agent-less? Introspection & vnetwork Analysis SYMANTEC VISION

21 Is Symantec going to Support vshield and When Yes, SEP Jaguar and Beyond! SYMANTEC VISION

22 Question: How Best to Apply Traditional Security? Firewall Content Filtering NIPS Reputation AV HIPS ETC SYMANTEC VISION

23 SEP 12.1 vs. Trend Micro Deep Security 8.0 May % 90% 100% 64% % of samp ples 80% 70% 60% 50% 40% 30% Maximum 20% Compromised Neutralized Defended 20% 10% Baseline 16% 0% Symantec Endpoint Protection 12.1 Trend Deep Security 8 (Agentless) SYMANTEC VISION

24 Roadmap Progress Phase 1 Re-architect Security for Changing Threat Environment Done Insight and SONAR Phase 2 Phase 3 Phase 4 OptimizeFeatures for Virtualized Environment MaximizeIntegration with Platforms, and Introspection-Zoning Infrastructure Maximize Architecture for Cloud Service Delivery Done Shared Insight Cache & vcenter Hardening 2012 In progress vshield& vsphere integration Currently in development SYMANTEC VISION

25 New Approaches: Insight Enhanced Scanning On a typical system, 80% of active applications can be skipped! Traditional Scanning - Requires scan of everyfile - Scans on defined schedule Insight Scanning - Requires scan of un-trusted files only - Scans based on useractivity SYMANTEC VISION

26 SEP 12.1 Built for Virtual Environments Scan Elimination Scan De-duplication Scan Randomization Virtual Image Virtual Resource Insight and Offline Image Exception Client Leveling Shared Insight Scanning Tagging Cache Together up to 90% reduction in disk IO SYMANTEC VISION

27 SEP 12 vs. Trend Micro Deep Security 8 -Virtual Machine Performance April % reduction in I/0 60% reduction in scan time SYMANTEC VISION

28 RU2: Shared Insight Cache for Virtual Environments vshieldendpoint enabled scan cache to optimize performance for scanning Moves the SEP 12.1 Shared Insight Cache into a Security Virtual Appliance Uses vshieldendpoint as the communication channel between SEP and the cache Same performance benefit as SEP 12.1 cache Significant resource reduction for persistent VDI Limited impact for non-persistent VDI and server applications SYMANTEC VISION

29 Ferrari: Shared Content for Virtual Environments Goal: reduce IO and CPU from definition update process by 90+% at the host level vshield Endpoint enabled Shared Antivirus Definitions Removes the need to update definitions in each Guest VM One update process per ESXiHost on the vshieldenabled SVA Updated definitions available to guests immediately on start up with no update overhead Significantly improves performance in all environments, servers, non-persistent VDI and persistent VDI Solves key management issues with non-persistent VDI deployments SYMANTEC VISION

30 Shared Content (Definitions and Insight Cache) LiveUpdate Network Network Based Defs Cache SEP Client SEP Client SEP Client Share Insight Cache SVA VMware vshield Endpoint / VMTools GVM GVM GVM ESXi Host SYMANTEC VISION

31 Virtual Infrastructure Still Requires Attention SYMANTEC VISION

32 SCSP MP3: Securing vsphere 5.0 Infrastructure vcenter Server SQL DB WMWare Management Framework VMWare vcenter Server 5.0 (64 bit Windows) vcenter Server VMkernel Infrastructure Agents (NTP, Syslog, etc.) LDAP 64-bit Windows OS manage VMware ESXi VM support and Resource Management CSP Agent OS Tomcat Web Service vcli vcli for Config and Support Agentless Systems Mgmt Agentless Hardware Monitoring Protecting the Virtualization Management Universe Automate implementation of VMware Hardening Guidelines vcenter IPS Policy : Enhanced Windows Strict policy to protect application components including: vcenter Server, vcenter Orchestrator, vcenter Update Mgr. Infrastructure components e.g., SQL Express DB, Tomcat, JRE vcenter application program files and sensitive directories (certificates and logs) Restricts vcenter network port access to trusted programs Can protect the following tools accessing vcenter from desktops, laptops, client access VM s or even Jump hosts: vsphere Client, vsphere CLI, vsphere Power CLI, vsphere Web Client vcenter IDS Policy Highlights: vcenter Windows Detection Policy Pre-tuned Windows Baseline Policy detects user/group changes, login failures, etc. vcenter Application Detection Policy Pre-tuned Windows Policy performs real-time FIM of vcenter binaries / configurations and monitors vcenter logs Addresses gap in existing vcenter monitoring and log forwarding capabilities SYMANTEC VISION

33 Virtual Security Top-to-Bottom Hypervisor SVA SVA 1 Hardened Infrastructure Hardening infrastructure(hypervisor kernel-level file monitoring, management hardening) Server Management capabilities for patch, change management, discovery, inventory etc. Hypervisor vserver Farm Cloud VDI Security Host/VM Management Infrastructure Agent (SCSP + SEP) Hardened Agentless 2 3 Infrastructure hardened by SYMC Baseline Security for All VMs (agent-less for unmanaged VMs) through SVA Enhanced Agent-less via Security Virtual Appliance enabling IPS, Deep Packet Inspection, File Integrity Monitoring, AV, etc. Zoningthrough workflow integration to drive actions based on security posture Full Security for Managed VMs (agented) through SCSP and SEP In-guest agent thinningsupporting introspection and differentiated security (Shared AV Definitions, reduced memory etc.) Baseline Security Rogue VM Protected Agentlessly by SYMC Full Security VM fully protected with SYMC Agents SYMANTEC VISION

34 Other Sessions to Attend SEP WE, 1:00-2:00, SR B20, Michael Marfise, Scott Sawoya, Symantec Endpoint Protection 12: Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently WE; 4:45-5:45, SR B27, Kevin Haley, Archana Rajan, SONAR, Insight, Skeptic and GIN - The Symantec Secret Sauce LABS TH, 9:00-10:00, SR L06, Elisha Riedlinger, Migrating to Symantec Endpoint Protection 12.1 TH, 10:15-11:15 & 1:00-2:00, SR L08, Paul Murgatroyd, Troubleshooting Symantec Endpoint Protection 12.1 TH, 11:30-12:30, SR L07, Scott Sawoya, Configuring Protection Technologies with Symantec Endpoint Protection 12.1 SCSP: TH, 1:00-2:00, SR B22, Percy Wadia, Prashant Khandelwal, Stop Server Incursions and Unauthorized Access: How to Defend Against Common APT Attacks LABS WE, 3:30-04:30, SR L21, Colin Gibbens, Protect Servers and Defend Against APTs with Symantec Critical System Protection TH, 9:00-10:00, SR L22, Colin Gibbens, Lock Down a Virtual Environment with Symantec Critical System Protection Protection Engine TH, 1:00-2:00, SR B11, Ian McShane, Symantec Protection Engine: for Cloud Services and Storage SYMANTEC VISION

35 Additional Resources Symantec Virtualization Security site on symantec.com Securing the Virtual Data Center white paper VMware and Symantec Joint Press Release - Solution overviews Coming Soon: VDI Best Practices White Paper Joint VMware Reference Architecture SYMANTEC VISION

36 Thank you! Chip Epps Papi Menon Copyright 2012 Symantec Corporation. All rights reserved.symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 36

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security

IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security WE, 09:00-10:00 IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Paul Murgatroyd Principal Product Manager Chip Epps Principal Product Manager 1 Agenda 1 The Virtual

More information

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1 Panelists Jeff Marsh Christian Sosa David Nguyen Presentation

More information

Symantec and VMWare why 1+1 makes 3

Symantec and VMWare why 1+1 makes 3 Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Symantec Endpoint Protection 12

Symantec Endpoint Protection 12 Symantec Endpoint Protection 12 Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently Graham Ahearne, Marcus Brownell Product Management 1 Agenda 1 2 3 Challenges How Symantec

More information

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Kaspersky Security for Virtualization Frequently Asked Questions

Kaspersky Security for Virtualization Frequently Asked Questions Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter

More information

Datacenter Security: Protection Beyond OS LifeCycle

Datacenter Security: Protection Beyond OS LifeCycle Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000

More information

Disclaimer CONFIDENTIAL 2

Disclaimer CONFIDENTIAL 2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

EM L01 Introduction to Mobile

EM L01 Introduction to Mobile EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions

More information

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012 SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating

More information

VMware vsphere 5.5 Professional Bootcamp

VMware vsphere 5.5 Professional Bootcamp VMware vsphere 5.5 Professional Bootcamp Course Overview Course Objectives Cont. VMware vsphere 5.5 Professional Bootcamp is our most popular proprietary 5 Day course with more hands-on labs (100+) and

More information

VMware vsphere 6.5/6.0 Ultimate Bootcamp

VMware vsphere 6.5/6.0 Ultimate Bootcamp VMware vsphere 6.5/6.0 Ultimate Bootcamp Class Duration 5 Days Introduction This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder VMWARE SOLUTIONS AND THE DATACENTER Fredric Linder MORE THAN VSPHERE vsphere vcenter Core vcenter Operations Suite vcenter Operations Management Vmware Cloud vcloud Director Chargeback VMware IT Business

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET3282BE The NSX Practical Path Brian Lazear, Sr. Director, NSX Product Management Brian Muita, CTO, Node Africa #VMworld #NET3282BE Disclaimer This presentation may contain product features that are

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring

More information

vshield Quick Start Guide

vshield Quick Start Guide vshield Manager 4.1.0 Update 1 vshield Zones 4.1.0 Update 1 vshield Edge 1.0.0 Update 1 vshield App 1.0.0 Update 1 vshield Endpoint 1.0.0 Update 1 This document supports the version of each product listed

More information

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted

More information

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 JIM P. NIXON Application Support Manager Seyfarth Shaw LLP jnixon@seyfarth.com IN THE PAST, TRADITIONAL SOLUTIONS DIDN T THINK ABOUT VIRTUAL WORKLOADS

More information

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA. This Reference Architecture Guide describes, in summary, a solution that enables IT organizations to quickly and effectively provision and manage Oracle Database as a Service (DBaaS) on Federation Enterprise

More information

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Ensure Virtualization Security and Improve Business Productivity with Kaspersky Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator)

McAfee MOVE AntiVirus Installation Guide. (McAfee epolicy Orchestrator) McAfee MOVE AntiVirus 4.7.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Dell EMC Ready System for VDI on VxRail

Dell EMC Ready System for VDI on VxRail Dell EMC Ready System for VDI on VxRail Citrix XenDesktop for Dell EMC VxRail Hyperconverged Appliance April 2018 H16968.1 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection

More information

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint

More information

VMware vsphere Customized Corporate Agenda

VMware vsphere Customized Corporate Agenda VMware vsphere Customized Corporate Agenda It's not just VMware Install, Manage, Configure (Usual VCP Course). For working professionals, just VCP is not enough, below is the custom agenda. At the outset,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

ForeScout CounterACT. Configuration Guide. Version 1.1

ForeScout CounterACT. Configuration Guide. Version 1.1 ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency

More information

Transform to Your Cloud

Transform to Your Cloud Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to

More information

NetBackup for vcloud Director

NetBackup for vcloud Director NETBACKUP 7.6 FEATURE BRIEFING NETBACKUP FOR VCLOUD DIRECTOR NetBackup 7.6 Feature Briefing NetBackup for vcloud Director Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

Branch Office Desktop

Branch Office Desktop Branch Office Desktop VMware Solution Lab Validation HOW-TO GUIDE Solution Overview Regional and branch offices need access to corporate assets but often lack local administrative resources to maintain

More information

Dell EMC Ready Architectures for VDI

Dell EMC Ready Architectures for VDI Dell EMC Ready Architectures for VDI Designs for Citrix XenDesktop and XenApp for Dell EMC XC Family September 2018 H17388 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 BACKUP BUILT FOR VMWARE Mark Twomey Technical Director, The Office Of The CTO 2 Agenda Market Forces Optimized VMware Backup Backup And Recovery For VCE Vblock Protecting vcloud Director Customer Success

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

AppDefense Getting Started. VMware AppDefense

AppDefense Getting Started. VMware AppDefense AppDefense Getting Started VMware AppDefense You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit

More information

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Alain Pelegrin EMEA NetBackup Solutions Lead TSS IM Technology Practice Olivier Ribouchon Presales

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer

More information

White Paper. Securing the virtual infrastructure without impacting performance

White Paper. Securing the virtual infrastructure without impacting performance White Paper Securing the virtual infrastructure without impacting performance Introduction Virtualization offers many benefits, but also raises additional performance issues in areas of security. This

More information

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend SAI3314BES Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend Micro #VMworld #SAI3314BES Automated Security

More information

Maximize your Private Cloud with Server Management Suite

Maximize your Private Cloud with Server Management Suite Maximize your Private Cloud with Server Management Suite Joseph Carson Sr. Manager Product Management, Server Management Suite EM B02 1 Welcome to Barcelona or Welcome Back! EM B02 SYMANTEC VISION 2012

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

IT Infrastructure: Poised for Change

IT Infrastructure: Poised for Change IT Infrastructure: Poised for Change David Freund Corporate Virtual Architect EMC Corporation October, 2009 Copyright 2009 EMC Corporation. All rights reserved. 1 Things Change The Big Question What s

More information

VMware vsphere 4.0 The best platform for building cloud infrastructures

VMware vsphere 4.0 The best platform for building cloud infrastructures VMware vsphere 4.0 The best platform for building cloud infrastructures VMware Intelligence Community Team Rob Amos - Intelligence Programs Manager ramos@vmware.com (703) 209-6480 Harold Hinson - Intelligence

More information

VM-SERIES FOR VMWARE VM VM

VM-SERIES FOR VMWARE VM VM SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud

More information

VMware vsphere with ESX 4.1 and vcenter 4.1

VMware vsphere with ESX 4.1 and vcenter 4.1 QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.

More information

CSP 2017 Network Virtualisation and Security Scott McKinnon

CSP 2017 Network Virtualisation and Security Scott McKinnon CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are

More information

Cloud + Big Data Putting it all Together

Cloud + Big Data Putting it all Together Cloud + Big Data Putting it all Together Even Solberg 2009 VMware Inc. All rights reserved 2 Big, Fast and Flexible Data Big Big Data Processing Fast OLTP workloads Flexible Document Object Big Data Analytics

More information

The vsphere 6.0 Advantages Over Hyper- V

The vsphere 6.0 Advantages Over Hyper- V The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted

More information

VMware vsphere 6.5 Boot Camp

VMware vsphere 6.5 Boot Camp Course Name Format Course Books 5-day, 10 hour/day instructor led training 724 pg Study Guide fully annotated with slide notes 243 pg Lab Guide with detailed steps for completing all labs 145 pg Boot Camp

More information

Overview. Prerequisites. VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot

Overview. Prerequisites. VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot Course Name Format Course Books vsphere Version Delivery Options Remote Labs Max Attendees Requirements Lab Time Availability May, 2017 Suggested Price

More information

NetBackup as a Service

NetBackup as a Service NetBackup as a Service Glen Simon Product Marketing AJ Park Product Management Angus Gregory Biomni 1 Software-as-a-Service: Doubling every Three Years 1 Backup-as-a-Service: Strong Interest 3 BaaS not

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Efficient, Agile and Extensible Software-Defined Networks and Security WHITE PAPER Overview Organizations worldwide have gained significant efficiency and

More information

What s New in VMware vsphere 5.1 Platform

What s New in VMware vsphere 5.1 Platform vsphere 5.1 Platform VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 2.0 / UPDATED JUNE 2012 Table of Contents Introduction... 3 vsphere Platform Enhancements... 3 User Access... 3 Auditing....

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

VMware - VMware vsphere: Install, Configure, Manage [V6.7]

VMware - VMware vsphere: Install, Configure, Manage [V6.7] VMware - VMware vsphere: Install, Configure, Manage [V6.7] Code: Length: URL: EDU-VSICM67 5 days View Online This five-day course features intensive hands-on training that focuses on installing, configuring,

More information

vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7

vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7 vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware vsphere with ESX 6 and vcenter 6

VMware vsphere with ESX 6 and vcenter 6 VMware vsphere with ESX 6 and vcenter 6 Course VM-06 5 Days Instructor-led, Hands-on Course Description This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere

More information

1V0-642.exam.30q.

1V0-642.exam.30q. 1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized

More information

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2 Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.

More information

Dell EMC Ready System for VDI on XC Series

Dell EMC Ready System for VDI on XC Series Dell EMC Ready System for VDI on XC Series Citrix XenDesktop for Dell EMC XC Series Hyperconverged Appliance March 2018 H16969 Deployment Guide Abstract This deployment guide provides instructions for

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Solution Brief: VMware vcloud Director and Cisco Nexus 1000V

Solution Brief: VMware vcloud Director and Cisco Nexus 1000V Solution Brief: VMware vcloud Director and Cisco Nexus 1000V Executive Summary Agility, flexibility, elasticity and reliability are requirements for the virtualized data center and for private and public

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

AS Stallion. Security for Virtual Server Environments. Urmas Püss

AS Stallion. Security for Virtual Server Environments. Urmas Püss AS Stallion 110311 Security for Virtual Server Environments Urmas Püss 1 Trend 1: Threat Evolution & Perimeter Porosity Trend 2: Challenges of Dynamic Datacenter Deep Security: Make Servers Self-Defending

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

Securing Your Virtual World Harri Kaikkonen Channel Manager

Securing Your Virtual World Harri Kaikkonen Channel Manager Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000

More information

Intel and Symantec: Improving performance, security, manageability and data protection

Intel and Symantec: Improving performance, security, manageability and data protection Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the

More information

5 Performance-Boosting vsphere Features You re Missing out on

5 Performance-Boosting vsphere Features You re Missing out on 5 Performance-Boosting vsphere Features You re Missing out on info@altaro.com www.altaro.com 1 vshield Endpoint 2 Fine tuning High Availability Our Agenda Today. 3 4 VMware Converter Update Manager 5 Using

More information

Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group

Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group Dynamic Multi-Pathing for VMware 1 Agenda 1 Heterogenous multi-pathing

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

What s New with VMware vcloud Director 8.0

What s New with VMware vcloud Director 8.0 Feature Overview TECHNICAL WHITE PAPER Table of Contents What s New with VMware....3 Support for vsphere 6.0 and NSX 6.1.4....4 VMware vsphere 6.0 Support...4 VMware NSX 6.1.4 Support....4 Organization

More information

[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5]

[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5] [VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5] Length Delivery Method : 5 Days : Instructor-led (Classroom) Course Overview This five-day course features intensive hands-on training that

More information

What Is New in VMware vcenter Server 4 W H I T E P A P E R

What Is New in VMware vcenter Server 4 W H I T E P A P E R What Is New in VMware vcenter Server 4 W H I T E P A P E R Table of Contents What Is New in VMware vcenter Server 4....................................... 3 Centralized Control and Visibility...............................................

More information

Architectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data

Architectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data Solution Overview Cisco Tetration Analytics and Turbonomic Solution Deploy intent-based networking for distributed applications. Highlights Provide performance assurance for distributed applications. Real-time

More information

VMware vcloud Director for Service Providers

VMware vcloud Director for Service Providers Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical

More information

vcloud Director Administrator's Guide

vcloud Director Administrator's Guide vcloud Director 5.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES

DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES DEPLOYING A VMWARE VCLOUD DIRECTOR INFRASTRUCTURE-AS-A-SERVICE (IAAS) SOLUTION WITH VMWARE CLOUD FOUNDATION : ARCHITECTURAL GUIDELINES WHITE PAPER JULY 2017 Table of Contents 1. Executive Summary 4 2.

More information

VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2

VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2 VSPP Product Usage Guide VMware Service Providers Program (VSPP) VSPP Product Usage Guide VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2 2011 VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports

More information

Network Virtualization Business Case

Network Virtualization Business Case SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,

More information

VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7)

VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7) VMware vsphere: Install, Configure, Manage (vsphere ICM 6.7) COURSE OVERVIEW: This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vsphere

More information

Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect

Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit Alan Maddison, Architect Amit Bhatia, Architect Why did we create the Assessment kit? Assessment objectives Assess

More information