Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Similar documents
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Comprehensive datacenter protection

VM-SERIES FOR VMWARE VM VM

The threat landscape is constantly

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Business Strategy Theatre

Data Center Micro-Segmentation

CASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY. How Organizations Around the World Are Protecting Critical Data

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Operationalizing NSX Micro segmentation in the Software Defined Data Center

Securing the Modern Data Center with Trend Micro Deep Security

SDN Security BRKSEC Alok Mittal Security Business Group, Cisco

SYMANTEC DATA CENTER SECURITY

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Datacenter Security: Protection Beyond OS LifeCycle

CSP 2017 Network Virtualisation and Security Scott McKinnon

Software-Defined Secure Networks. Sergei Gotchev April 2016

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Copyright 2011 Trend Micro Inc.

Validating the Security of the Borderless Infrastructure

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER

Stopping Advanced Persistent Threats In Cloud and DataCenters

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Rethinking Security: The Need For A Security Delivery Platform

Juniper Sky Advanced Threat Prevention

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

Disclaimer CONFIDENTIAL 2

Securing the Software-Defined Data Center

Security in Cloud Environments

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012

Software-Define Secure Networks The Future of Network Security for Digital Learning

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

WHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

McAfee Virtual Network Security Platform

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Network Virtualization Business Case

Enterprise & Cloud Security

The Next Opportunity in the Data Centre

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

CONTRAIL SECURITY. Contrail Cloud Networking & Security

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Stop Cyber Threats With Adaptive Micro-Segmentation. Jeff Francis Regional Systems Engineer

SECURITY SERVICES SECURITY

Pulse Secure Application Delivery

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Micro-Segmentation: What It Is and What It Isn t. Explore Essential Security Controls for Fighting New Threats to Your Data Center

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Ewolucja sieci w Data Center

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017

Qualys Cloud Platform

Zero Trust Security with Software-Defined Secure Networks

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

SRX als NGFW. Michel Tepper Consultant

Rethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team

Building a More Secure Cloud Architecture

NEXT-GENERATION SECURITY WITH VMWARE NSX AND PALO ALTO NETWORKS VM-SERIES

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

A10 HARMONY CONTROLLER

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Building a Smart Segmentation Strategy

Intuit Application Centric ACI Deployment Case Study

F5 Synthesis Information Session. April, 2014

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Journey to Secure and Automated Multi-cloud

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Next-Gen CASB. Patrick Koh Bitglass

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Evaluation Criteria for Web Application Firewalls

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Securing Your Virtual World Harri Kaikkonen Channel Manager

Maximum Security with Minimum Impact : Going Beyond Next Gen

VMware vshield App Design Guide TECHNICAL WHITE PAPER

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Container Deployment and Security Best Practices

Imperva Incapsula Website Security

Why the cloud matters?

Stop Cyber Threats With Adaptive Micro-Segmentation. Chris Westphal Head Of Product Marketing

Next-Generation Security Platform on VMware NSX Reference Architecture

Corrigendum 3. Tender Number: 10/ dated

Development. Architecture QA. Operations

haltdos - Web Application Firewall

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

FIREWALL BEST PRACTICES TO BLOCK

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Cisco s Appliance-based Content Security: IronPort and Web Security

Juniper Sky Advanced Threat Prevention

Transcription:

Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto - Finally, Data Center Security without Compromise 12.00-12.45 Juniper - QFX & MetaFabric - the Integration of ware NSX 12:45-13:30 Lunch 13:30-14:15 Trend Micro - Optimised Security for Modern Data Centre 14:15-15:00 F5 - Discover how F5 and ware deliver a software-defined data center by providing simplified end-to-end networking through an application-centric approach 15:00-15:15 Break 15:15-16:00 Check Point - Automating Multi-tiered Security in the NSX Eco system 16:00-16:15 Q&A 16:15-18:00 Network Drink with WINE TASTING

Securing the Software Defined Data Center Typical Security Challenges in (Traditional) Data Centers SDDC: Definition and Components From Traditional to Software Defined Data Center Security Solutions Layered Architecture Key Takeaways

Typical Security Challenges in (Traditional) Data Centers Different layers and trust levels: Web - App DB Process intensive to apply security between s. (100-1000 s of s) Lateral movement once compromised Speed of server provisioning: avoid instant on security gaps Security impact on availability and performance

Typical Security Challenges in (Traditional) Data Centers Handling encrypted traffic (SSL) Measure and monitor compliance Application traffic vs. file system traffic Cloud readiness

The Software Defined Data Center: Definition Definition: Refers to a data center where all infrastructure is virtualized and delivered as a service. The core architectural components: Computer virtualization Software-defined networking (SDN) Software-defined storage (SDS) Management and automation software

From Traditional to Software Defined Data Centers Security with NSX Perimeter Security still required Micro segmentation becomes feasible. The automated provisioning of firewall policies when a workload is programmatically created. Distributed enforcement at every virtual interface and in-kernel, distributed to every hypervisor and baked into the platform. Native Isolation: No physical subnets, no VLANs, no ACLs are required. Segmentation is enforced at the virtual interface and advanced security services can be added.

Software Defined Data Center: Security Solutions Data center firewall to secure datacenter access Network segmentation firewall to secure inter traffic DDOS protection: cloud & on premise Web application firewall Web Access Management

Software Defined Data Center: Security Solutions IPS for virtual patching Data leakage prevention Anti malware detection and cleaning Compliance monitoring

Layered Architecture Cloud Scrubbing Center Volumetric DDOS attacks Known signature attacks DataCenter Firewall IPS Sandboxing DLP Application Delivery Controler Web Application Firewall Anti DDOS Network Segmentation Firewall IPS Anti Malware Compl. Web App DB Finance HR Engineering

Layered Architecture Cloud Scrubbing Center Volumetric DDOS attacks Known signature attacks Multiple TB attack mitigation bandwidth Multiple scrubbing datacenters Fast mitigation Limited false positives Up to L7 Customer portal with centralized attack and threat monitoring reports

Layered Architecture DataCenter Firewall IPS Sandboxing DLP High new connections per second (Application Traffic) High number of concurrent connections Scalable architecture: processing power and connectivity User identity and application awareness Platform for additional security modules Policy integration with Network Segmentation Firewall

Layered Architecture Application Delivery Controller Web Application Firewall Web Application Firewall: OWASP top 10 threats Cover Zero Day Attacks by Positive Security Model HTTP anti-ddos Integration with Vulnerability Management Solution Detection and Prevention of Web Scraping PCI compliance

Software Defined Data Center: Web Application Firewall

Layered Architecture Anti DDOS On Premise DDOS protections Application Visibility Threat Intelligence Built in SSL decryption Real Time Reporting and Forensics

Layered Architecture Integration via API with Virtualized Network and Compute Network Segmentation Firewall Web App DB Security is completely decoupled from logical network topology. The firewall function is brought directly to the Finance. Any traffic sent or received by this processed by the NSF. Application Visibility HR Engineering

Layered Architecture Virtual Patching via IPS Agentless Anti Malware IPS- Anti Malware Compl. Web App DB Hypervisor integrity Monitoring Data Encryption DLP Finance Server Compliance Monitoring System Log inspection Automatically quarantining of compromised s HR Engineering

Key Takeaways Perimeter Security only is not sufficient in today s world of advanced threats NSX simplifies significantly inter security and makes it feasable but you still need additional security solutions from leading security vendors to increase security effectiveness. Don t forget Anti DDOS, WAF & Anti Malware Talk to our vendors today about your requirements and needs Enjoy the rest of the day!