The Evolution of Data Center Security, Risk and Compliance
|
|
- Lucinda Rice
- 6 years ago
- Views:
Transcription
1 #SymVisionEmea
2 #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen
3 The Adoption Curve Virtualization is being stalled due to concerns around Security and Compliance security is here this is a problem adoption is here The Evolution of Data Center Security, Risk and Compliance 5
4 Software-Defined Data Center Data Center Security Automation and Management The Vision The data center of the future is software-defined. It is dynamic and application-centric. Our mission is to support our customers as they evolve to the SDDC. Applications and Policies Software Defined Services Network Virtualization Compute and Storage Virtualization On-Prem/Private/Public Cloud Resources Drivers Cost Speed Flexibility Inhibitors Security Cost Compliance Complexity The Evolution of Data Center Security, Risk and Compliance 6
5 Software-Defined Data Center Data Center Security Automation and Management Compute and Storage Virtualization A dynamic, application-centric data center needs dynamic, application-centric security. Applications and Policies Software Defined Services Network Virtualization Compute/Storage Virtualization Dynamic, contextbased, policy-centric security Integrated security orchestration Security for hybrid networks Security for leading hypervisors 1. Drive down hardware and power costs 2. Abstract workload from hardware Hypervisor 3. Provision and monitor services By 2015, 40% of security controls used in Enterprise data centers will be virtualized, up from less than 5% in 2010 Neil MacDonald On-Prem/Private/Public Cloud Resources Support for key standards for private clouds e.g. Openstack and partner with vendors delivering those standards e.g. Amazon, VMWare, Openstack The Evolution of Data Center Security, Risk and Compliance 7
6 Little v - Virtualization Consolidation of Identical Apps Driver: Reduce Hardware and Power Costs Hypervisor Security Concerns: New Threat Surfaces Cloud Admin Hypervisor Management Plane Network Security Zones remain unchanged The Evolution of Data Center Security, Risk and Compliance 8
7 Big V - Virtualization Full Abstraction of Application from Hardware App A App B App A App A App B Driver: Agility, Speed, and Utilization Security Concerns: Motioning Security stays with workload Demonstrate Compliance Server A Server B Server C Server D Network Security Zones Static Network Zones can impede value The Evolution of Data Center Security, Risk and Compliance 9
8 Software-Defined Data Center Data Center Security Automation and Management Network Virtualization A dynamic, application-centric data center needs dynamic, application-centric security. 1. Agility and Speed Applications and Policies Dynamic, contextbased, policy-centric security 2. Abstract workload from hardware SDN Software Defined Services Network Virtualization Compute/Storage Virtualization Integrated security orchestration Security for hybrid networks Security for leading hypervisors 3. Drive down hardware costs By 2015, 40% of security controls used in Enterprise data centers will be virtualized, up from less than 5% in 2010 Neil MacDonald On-Prem/Private/Public Cloud Resources Support for key standards for private clouds e.g. Openstack and partner with vendors delivering those standards e.g. Amazon, VMWare, Openstack The Evolution of Data Center Security, Risk and Compliance 10
9 Small sdn - Software Defined Networking Mimic hardware security zones with software DMZ PCI HIPAA Driver: Agility, Speed Security Concerns: Motioning Security stays with workload Demonstrate Compliance Network Security Zones Static Network Zones can impede value The Evolution of Data Center Security, Risk and Compliance 11
10 Big SDN - Software Defined Networking Micro Segmentation by Application Sharepoint Order Processing HR Onboarding Driver: Agility, Speed Security Impacts: Motioning Firewall rules follows application Software Defined Networks Network Security Zones Large number of security zones No need to group apps by zones The Evolution of Data Center Security, Risk and Compliance 12
11 #SymVisionEmea The Growing Security Challenge The Evolution of Data Center Security, Risk and Compliance 13
12 Software-Defined Data Center Data Center Security Automation and Management Benefits of Virtualization A dynamic, application-centric data center needs dynamic, application-centric security. Applications and Policies Software Defined Services Network Virtualization Compute/Storage Virtualization Dynamic, contextbased, policy-centric security Integrated security orchestration Security for hybrid networks Security for leading hypervisors VM 1. Centrally apply and attach policies to workloads 2. Automate workflows across services 3. Provision and monitor services By 2015, 40% of security controls used in Enterprise data centers will be virtualized, up from less than 5% in 2010 Neil MacDonald On-Prem/Private/Public Cloud Resources Support for key standards for private clouds e.g. Openstack and partner with vendors delivering those standards e.g. Amazon, VMWare, Openstack The Evolution of Data Center Security, Risk and Compliance 14
13 What customers are still concerned about Threats how do I continuously combine updated VM 1. Centrally apply and attach policies to workloads 2. Automate workflows across services 3. Provision and monitor services? threat and vulnerability intelligence with workload context to optimize security response? Security Consistency how do I ensure consistent security across my virtual and physical infrastructure so I can move workloads from to physical to virtual. Compliance how do I make sure adequate controls are in place at all times to ensure and demonstrate regulatory compliance? Policy how do I make sure I have the right menu of policies available for orchestration and how do I continuously adapt these across multiple products in response to the changing threat environment? Segregation of Duties how do I ensure the integrity of my data center security in the face of converging admin roles? Security Tax how do I optimize security to minimize the performance and operational cost to my data center? The Evolution of Data Center Security, Risk and Compliance 15
14 #SymVisionEmea Symantec Data Center Security The Evolution of Data Center Security, Risk and Compliance 16
15 Server Security Date Store Security VDI Security Unified Assessment Symantec SDDC vision 1 Embed Security into the platform 2 Integrate across point technologies 3 Automate and orchestrate security Security Orchestration Platform The Evolution of Data Center Security, Risk and Compliance 17
16 1 2 Embed security into the platform Integrate across point technologies Data Store Security UA PAN Threat Protection Data Protection DSS CSP/ SEP Server Hardening DLP CSP Encryption PGP VSM Hypervisor Hardening/SOD Integration with SDN/SDDC Platform Security via the Hypervisor Frictionless agents to deploy higher controls Bring together multiple controls into a single offering Integrate across policy and deployment Easily allow security to scale up based on the policy of the workload The Evolution of Data Center Security, Risk and Compliance 18
17 3 Automate and Orchestrate Security Automate key processes to ensure workloads stay secure - Deployment and Provisioning - Updating security baselines to respond to external threats - Implementing new security profiles as workloads change - Remediating workloads through their lifecycle Server Security Software Defined Security Service SDN/SDDC Platform Data Store Security Firewall Ongoing validation and continuous monitoring The Evolution of Data Center Security, Risk and Compliance 19
18 SDDC Security Workflow Orchestration Sample The Evolution of Data Center Security, Risk and Compliance 20
19 How Does Symantec and Vmware NSX Work The Evolution of Data Center Security, Risk and Compliance 21
20 Symantec Data Center Security (DCS): Server/Server Advanced DCS: Server Advanced offers security and compliance capabilities in a single agent, as well as agentless AV for VMware infrastructures Security Definition-less host-based security solution, i.e. policy-based Network protection capabilities Administrator/root de-escalation Registry lock-down Application sandboxing NEW Agentless anti-malware capability for VMWare NSX enabled systems Compliance File integrity monitoring Registry monitoring Event log monitoring Failed/successful login monitoring Privilege escalation monitoring The Evolution of Data Center Security, Risk and Compliance 22
21 #SymVisionEmea Demo and Case Studies The Evolution of Data Center Security, Risk and Compliance 23
22 Symantec Data Center Security The Evolution of Data Center Security, Risk and Compliance 24
23 Case Study #1 Domain Controller Lockdown Vertical Financial Industry Compelling Event/Challenge A breach of the company s domain controllers caused them to rebuild their entire AD environment (750+ DCs). To prevent their new environment from being recompromised, DCS:SA was to be utilized in a full lockdown scenario. Actions Deployed agent to all domain controllers in less than 2 weeks. Created VERY restrictive white-list policy over the course of 2 months. Integrated DCS:SA events with third party SIEM solution for alerting/analysis. Results Cut-over to rebuilt environment occurred on schedule with no complications. All known indicators of compromise were successfully blocked by the policy. The Evolution of Data Center Security, Risk and Compliance 25
24 Case Study #2 Active Breach Response Vertical Government/Manufacturing Compelling Event/Challenge Organization notified that traffic originating from them was terminating in China. Company was already in the process of deploying DCS:SA for monitoring capabilities. Company needed a way to immediately terminate the malicious activity without jeopardizing functional aspect of the compromised systems. Actions Completed deployment of agent to inscope systems. Developed targeted prevention policy to block only malicious activity. Results Company was able to affirmatively block all malicious activity. Company now looking to proactively lock down DCs and other critical applications to prevent further breaches. The Evolution of Data Center Security, Risk and Compliance 26
25 Case Study #3 Legacy OS Lockdown Vertical Retail - SCADA Compelling Event/Challenge A company received a audit notification due to failure to patch operating systems. Operating system had been end-of-life d by manufacturer, but application was not supported on newer versions of OS. Actions Deployed agent to legacy OS systems. Created strict white-list policy to fully lock down OS on in-scope systems. Configured detection policy for FIM, failed login, and successful login monitoring. Integrated with 3 rd party SIEM for correlation and alerting. Results Auditors accepted DCSS as configured as a valid compensating control for audit item. Organization was able to continue running application on protected OS. The Evolution of Data Center Security, Risk and Compliance 27
26 #SymVisionEmea Product Strategy and Roadmap The Evolution of Data Center Security, Risk and Compliance 28
27 Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. The Evolution of Data Center Security, Risk and Compliance 29
28 Protecting the DC at each layer 3 Application/Data Plane 2 Workload Information Protection Focus Designed for key applications in the data center Threat Protection Focus Workload Server Centric Security Orchestration Platform Operations Director Security Service Assessment / Discovery Data Store Security Server Security VDI Security 1 Infrastructure SVA SVA VM Backplane vcenter (Management) AWS Infrastructure Software Defined Networks Infrastructure Protection Backplane Hardening SDN Integration The Evolution of Data Center Security, Risk and Compliance 30
29 Data Center Security : Server The first of the new offerings to ship from Symantec! Symantec Data Center Security: Server Frictionless AV Protection Hypervisor-based security virtual appliance Low OPEX Fully integrated with VMware NSX Always On Anywhere Protection Utilizing Symantec Best in Class AV and Insight Reputation What s Next: Guest Network Threat Protection Security Response Insight Reputation Virtual Data Center Integrated with CSP Scale up to Full Lock Down Wizard Driven Simplified Hardening Protected Application Whitelisting and Control What s Next: Application Centric Protection Data Center Security Service for VMWare NSX The Evolution of Data Center Security, Risk and Compliance 31
30 Data Center Security : Data Store Symantec Data Center Security: DataStore Unified Protection Security Response Insight Reputation Threat Protection -Content Filtering DLP Integration Data Insight Encryption Unified Policy and Administration Across Critical Applications & Data Messaging (Exchange) NAS Filers NetApp SharePoint Cloud Apps DSS Deployed across Virtual & Cloud The Evolution of Data Center Security, Risk and Compliance 32
31 #SymVisionEmea Thank you! Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. The Evolution of Data Center Security, Risk and Compliance 33
SYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationIS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security
WE, 09:00-10:00 IS B10 - Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Paul Murgatroyd Principal Product Manager Chip Epps Principal Product Manager 1 Agenda 1 The Virtual
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationVMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018
VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation
More informationOracle Solaris 11: No-Compromise Virtualization
Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in virtualization provides a
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationBest Practices for PCI DSS Version 3.2 Network Security Compliance
Best Practices for PCI DSS Version 3.2 Network Security Compliance www.tufin.com Executive Summary Payment data fraud by cyber criminals is a growing threat not only to financial institutions and retail
More informationDeep Security 9. A Server Security Platform for Physical, Virtual, Cloud. Territory Sales Manager SEE, Trend Micro. Copyright 2011 Trend Micro Inc.
Deep Security 9 A Server Security Platform for Physical, Virtual, Cloud Marko Djordjevic, Available Aug 30, 2011 Territory Sales Manager SEE, Trend Micro Deep Security 9 Exec Summary Market Trends Deep
More informationSymantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide
Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide
More informationVision of the Software Defined Data Center (SDDC)
Vision of the Software Defined Data Center (SDDC) Raj Yavatkar, VMware Fellow Vijay Ramachandran, Sr. Director, Storage Product Management Business transformation and disruption A software business that
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationSolution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and
Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationSecuring Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &
Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service
More informationHow Security Policy Orchestration Extends to Hybrid Cloud Platforms
How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com
More informationSecuring Your Virtual Data Centers:
Securing Your Virtual Data Centers: The Future of Endpoint and Server Security Chip Epps, Symantec, PM Virtualization Security Papi Menon, VMware, PM vshield Endpoint 1 Agenda 1 The Virtual Data Center
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationPrivate Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations
Hybrid Cloud Native Public Cloud Private Cloud Public Cloud Edge Consistent Infrastructure & Consistent Operations VMs and Containers Management and Automation Cloud Ops DevOps Existing Apps Cost Management
More informationOpen Security Controller - Security Orchestration for OpenStack
SESSION ID: CSV-W02 Open Security Controller - Security Orchestration for OpenStack Tarun Viswanathan Platform Solution Architect Intel Manish Dave Platform Architect Intel Notices and Disclaimers Intel
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More information1560: Storage Management & Business Continuity Strategy and Futures
1560: Storage Management & Business Continuity Strategy and Futures Gautham Ravi Sr. Director, Product Management Ranga Rajagopalan Director, Product Management Important Disclaimer Any information regarding
More informationThe Business Case for Network Segmentation
Modern network segmentation to reduce risk and cost Abstract Modern network segmentation, also known as microsegmentation, offers a new way of managing and securing your network, offering tremendous benefits
More informationHALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.
HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD Automated PCI compliance anytime, anywhere. THE PROBLEM Online commercial transactions will hit an estimated
More informationState of Cloud Adoption. Cloud usage is over 90%, are you ready?
State of Cloud Adoption Cloud usage is over 90%, are you ready? State of Cloud Adoption Cloud hardware, software and services are capturing 60% of IT market growth, mostly in the public cloud space Trust
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationExpand Virtualization. Maintain Security.
Expand Virtualization. Maintain Security. Key security decisions for virtualized infrastructures As enterprises make virtualization mission-critical for servers for servers and desktops, and desktops,
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationMcAfee Public Cloud Server Security Suite
McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,
More informationSimplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce
Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET3282BE The NSX Practical Path Brian Lazear, Sr. Director, NSX Product Management Brian Muita, CTO, Node Africa #VMworld #NET3282BE Disclaimer This presentation may contain product features that are
More informationBorderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity
Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationMicrosoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD
Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD Management as a Service Data analytics Shifting landscape at play Modern management Micro-services and containers Cloud Migrations
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationIBM Cloud for VMware Solutions
Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3
More informationHOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE
#RSAC SESSION ID: SPO3-T07 HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE Tom Corn Senior Vice President/GM Security Products VMware @therealtomcorn
More informationReference Guide Revision B. McAfee Cloud Workload Security 5.0.0
Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationComplying with PCI DSS 3.0
New PCI DSS standards are designed to help organizations keep credit card information secure, but can cause expensive implementation challenges. The F5 PCI DSS 3.0 solution allows organizations to protect
More informationTo the Designer Where We Need Your Help
To the Designer Where We Need Your Help Slide 7 Can you provide a similar high-res image? Slide 15 Can you polish up the content so it s not an eye chart? Slide 21, 22, 23 Can you polish up the content
More informationTrend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationKaspersky Security for Virtualization Frequently Asked Questions
Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for
More informationMatrix IT work Copyright Do not remove source or Attribution from any graphic or portion of graphic
Cloud: your daily concerns Cost? Security? Compliance? People Process Product Virtualization to Cloud : Your challenging journey Hardware Software People 2,3M 1,6M Capex & opex costs for compute/nw/storage
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationBusiness Context: Key for Successful Risk Management
Business Context: Key for Successful Risk Management Philip Aldrich, CISSP, CISM, CISA, CRISC, CIPP Program Director, Risk Management EMC Event Alert Finding Incident Law Vulnerability Regulation Audit
More informationForeScout CounterACT. Configuration Guide. Version 1.1
ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency
More informationTransform Your Business with Hybrid Cloud
Transform Your Business with Hybrid Cloud Cisco gives you greater choice and cost savings, so you can transform IT operations in a way that works best for your organization. We offer an open framework
More informationProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System Your guide to mitigating risks in your Windows Server 2003 Systems after the end of support End of Support is Not the End of Business When
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC1753BU Case Study: How VMware NSX Is Empowering a Service Provider to Help Customers Achieve and Maintain Industry Compliance VMworld 2017 Content: Not for publication #VMworld #LHC1753BU Disclaimer
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationVxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS
VxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS VMware customers trust their infrastructure to vsan #1 Leading SDS Vendor >10,000 >100 83% vsan Customers Countries Deployed Critical Apps
More informationNetwork Virtualization Business Case
SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,
More informationCASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY. How Organizations Around the World Are Protecting Critical Data
CASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY How Organizations Around the World Are Protecting Critical Data The Growing Risk of Security Breaches Data center breaches are nothing new but
More informationNOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect
NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should
More informationDatacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education
Datacenter Management and The Private Cloud Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education System Center Helps Deliver IT as a Service Configure App Controller Orchestrator Deploy
More informationTotal Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
More informationCloud Workload Discovery 4.5.1
Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationProduct Guide Revision B. McAfee Cloud Workload Security 5.0.0
Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationIM B32: What s New in NetBackup: The Vision and Roadmap
IM B32: What s New in NetBackup: The Vision and Roadmap Stephen Stange NetBackup Product Management Danny Milrad Director Product Marketing Agenda Market Trends & NetBackup Vision NetBackup Key Feature
More informationProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System Your guide to mitigating risks in your Windows Server 2003 Systems after the end of support End of Support is Not the End of Business When
More informationRSA pro VMware. David Matějů. RSA, The Security Division of EMC
RSA pro VMware David Matějů RSA, The Security Division of EMC david.mateju@rsa.com How secure are you? Does your IT security address the risks associated with virtualization and private cloud before they
More informationIBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009
Services Announcement ZS09-0202, dated October 6, 2009 Security software for IBM Proventia Endpoint Secure Control, IBM ISS Data Security Services endpoint system protection - Digital Guardian software
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationCisco CloudCenter Solution with VMware
Cisco CloudCenter Solution with Extend, any application, and any cloud The Cisco CloudCenter hybrid cloud management platform securely provisions infrastructure resources and deploys application components
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1046BES Simplifying the Journey To The Software Defined Datacenter Tikiri Wanduragala Senior Consultant Data Center Group, Lenovo EMEA VMworld 2017 Geoff Hunt Senior Product Manager Data Center Group,
More informationData Center and Cloud Automation
Data Center and Cloud Automation Tanja Hess Systems Engineer September, 2014 AGENDA Challenges and Opportunities Manual vs. Automated IT Operations What problem are we trying to solve and how do we solve
More information