SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

Similar documents
Backup and recovery of vsphere VCSA and Platform Services Controllers

Kaspersky Security for Virtualization Frequently Asked Questions

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System

Availability and the Always-on Enterprise: Why Backup is Dead

Symantec Endpoint Protection

Maximizing Availability With Hyper-Converged Infrastructure

Three Security Options That Can Jeopardize Your Virtual ROI

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Hitchhiker s Guide to Veeam Backup Free Edition

IT & DATA SECURITY BREACH PREVENTION

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Become an Always-On Business. Doug Hazelman VP, Product Strategy Veeam Software

Veeam Availability Suite 9.5 Direct Restore to Microsoft Azure integration

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Three Steps to Protect Your Virtual Systems

Securing the Software-Defined Data Center

Symantec Client Security. Integrated protection for network and remote clients.

Service provider GTM strategy session: New revenue opportunities with Veeam

Endpoint Security and Virtualization. Darren Niller Product Management Director May 2012

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

Configuring EMC Data Domain Boost with Veeam Availability Suite v8

Mobile County Public School System Builds a More Secure Future with AMP for Endpoints

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

SYMANTEC DATA CENTER SECURITY

Cisco Start. IT solutions designed to propel your business

FIREWALL BEST PRACTICES TO BLOCK

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

security for VIRtUALIZAtIon: GettInG the BALAnCe RIGht global security intelligence

Using Veeam and VMware vsphere tags for advanced policy-driven data protection. Luca Dell Oca vexpert, VCAP-DCD, CISSP

NEW Veeam Availability Suite 9.5 FULL integration with Microsoft 2016 Data Center Technologies. System Engineer, SAARC North

The VSS role in vsphere, Hyper-V and agent-assisted backups

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Symantec and VMWare why 1+1 makes 3

Evolved Backup and Recovery for the Enterprise

Symantec Protection Suite Add-On for Hosted Security

Data Availability for the Always-On Enterprise

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Hedvig as backup target for Veeam

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Move, manage, and run SAP applications in the cloud. SAP-Certified Infrastructure from IBM Cloud

Securing the Modern Data Center with Trend Micro Deep Security

IT Security Cost Reduction

LIGHT AGENT OR AGENTLESS

Reduce costs and enhance user access with Lenovo Client Virtualization solutions

Security and Compliance for Office 365

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Best Practices in Securing a Multicloud World

FROM BACKUP TO AVAILABILITY

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

Availability for the Always-On Enterprise

Software-Defined Secure Networks. Sergei Gotchev April 2016

The threat landscape is constantly

BREAK THE CONVERGED MOLD

Symantec Advanced Threat Protection: Endpoint

The 5 Keys to Virtual Backup Excellence

Kaspersky Security. The Power to Protect Your Organization

Reaping the Benefits of Multiple Hypervisors

Acronis Backup. Acronis, All rights reserved. Dual headquarters in Switzerland and Singapore. Dual headquarters in Switzerland and Singapore

Features. HDX WAN optimization. QoS

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

State of Cloud Survey GERMANY FINDINGS

A Guide to Closing All Potential VDI Security Gaps

Understanding Virtual System Data Protection

Branch Office Desktop

Protect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1

Core Services for ediscovery Perfection

Datacenter Security: Protection Beyond OS LifeCycle

DATA CENTRE SOLUTIONS

HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE

TRANSFORM YOUR APPLICATIONS

Remodel. New server deployment time is reduced from weeks to minutes

Deep Dive - Veeam Backup & Replication with NetApp Storage Snapshots

DOCUMENT* PRESENTED BY

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

10 Cloud Myths Demystified

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Choosing the Right Cloud. ebook

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

Securing the Data Center against

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

The Expanding Role of Backup and Recovery in the Hybrid Enterprise

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Lenovo Validated Designs

Juniper Sky Advanced Threat Prevention

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

2018 Edition. Security and Compliance for Office 365

Buyer s Guide: DRaaS features and functionality

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

for businesses with more than 25 seats

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Copyright 2011 Trend Micro Inc.

Transcription:

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

WHY VIRTUALIZATION? VIRTUALIZATION HAS MANY BUSINESS BENEFITS, INCLUDING THE FOLLOWING: Cost containment: Virtualization reduces the overall hardware footprint, hardware costs, power consumption and management requirements. Agility: Virtualization delivers new capacity on demand to make the whole business more responsive and competitive. Stability: Simpler, standardized systems mean greater resiliency and better system availability, which in turn enables greater productivity. Centralized management: Virtual systems can be created instantly, and managed and configured centrally, reducing administrative and support costs. WHILE SOME SECURITY RISKS ARE REAL, THERE ARE SOME UNFOUNDED MISCONCEPTIONS ABOUT PROTECTING YOUR BUSINESS DATA AND INFRASTRUCTURE IN A VIRTUAL ENVIRONMENT. THIS EBOOK IS DESIGNED TO ADDRESS (AND THEN SMASH) SOME OF THE COMMON MYTHS ASSOCIATED WITH VIRTUALIZATION SECURITY.

MYTH #1: Virtual systems aren t as vulnerable as physical systems. Virtualized V-Motion Not true. Virtual endpoints look the same as physical systems to the outside world. Virtualization doesn t change the threat landscape or the impact of infiltration. VM THREATS ARE MOUNTING AND INCLUDE: Malware outbreaks. Data ex-filtration (intentional, unintentional). Insider threats. Targeted attacks (advanced persistent threats). Hacktivists. Cloud Non-persistent virtual desktops are somewhat more secure because they are wiped clean after each use. They still use roaming profiles and mapped network drives that can also be used to propagate malware, so they need to be protected, too.

MYTH #2: You have to manage virtualized and non-virtualized infrastructures separately, creating extra work for overburdened IT staff. Not if you have the right security solution! If you choose software that includes a single central management console, you can ensure that your physical, virtual and mobile endpoints are all protected and seamlessly managed through similar looking and functioning policies.

MYTH #3: Deploying a virtualization security solution is a long and painful process that uses up precious IT resources. With the right security software, you can download an appliance, switch it on and immediately be protected, so you can reap the benefits of virtualization while maintaining your security perimeter. Kaspersky Security for Virtualization (KSV) is a virtual appliance that utilizes VMware vshield technology to talk to virtual machines and automatically carry on security tasks. Once it s installed, KSV will immediately take over all the necessary security tasks through vshield. Most IT staff time will be spent creating virtual machine policies, freeing you up for other responsibilities.

MYTH #4: Reboots are a necessary hassle with virtualization security, lowering your server s uptime. When asked about server uptime, most IT professionals brag about 99.99% success. Even five minutes of downtime per year is too much. With the right security solution, you can secure your virtual infrastructure without a single reboot. Kaspersky s Security for Virtualization keeps your server up and running 100 percent of the time.

MYTH #5: In a virtualized system, growth increases your risk your security burden grows with you. It s true that with traditional antivirus software, the more virtualized machines you spin up, the more resources you use. To reduce risk in a virtual environment without slowing down your system or wasting precious host resources, select a security solution that eliminates the redundancy of going through already-scanned files, searching for infections and invariably missing some, putting your entire system at risk. With shared cache technology, most files are checked once, an immediate verdict is delivered, and the files don t have to be checked again.

MYTH #6: Reporting is too hard with virtualization IT administrators have to provide reports on their activities. Historically, security has not been part of those reports. Select a virtualization security solution that generates reports with IT security included. If everything is visible, VM administrators can see it all, track changes and growth, and keep everything protected. Protected VMs Description This report lists all protected and unprotected VMs including their last backup state. Report Parameters Scope: Virtual Infrastructure RPO period: Part 1 week(s) Exclusion mask: Job type: Backup and replication jobs Summary Information VMs Overview Total VMs: 47 Protected VMs: 1 Protected VMs VM Last Backup State Backed Up VMs: 1 46 1 1 Replicated VMs: 0 Restore Points: 2 Unprotected VMs: 46 Unprotected VM Protected VM Successful

MYTH #7: Cybersecurity is too complex in a virtual environment. How much complexity do you have? When you can t see it, you can t manage it. It s important to select a virtualization security solution that has a single-pane view of all protected machines, both physical and virtual. Visibility also reduces complexity and gives you the agility and flexibility you need to respond faster to malware. Physical Virtual Console Console IT Mobile Console

A PRACTICAL DEFENSE Agentless Security Deployment APP APP APP APP APP APP KSV To keep your data and your IT infrastructure safe, it s important to have an agentless security solution that fully protects your virtualized infrastructure and all the data it processes. Kaspersky had this in mind when it developed Kaspersky Security for Virtualization, a security platform built for the unique requirements of virtualized IT environments. KSV works via VMware s vshield Endpoint; anti-malware functions are offloaded to a virtual appliance; and security is applied instantly and automatically with up-to-date antivirus databases when a new VM is provisioned or powered on OS OS OS VMware vshield VMware ESX and ESXi Virtual Appliance Physical Host Kaspersky Security for Virtualization

ABOUT KASPERSKY LAB ABOUT VEEAM SOFTWARE Kaspersky Lab is one of the world s fastest-growing cybersecurity companies and the largest that is privately-owned. The company is ranked among the world s top four vendors of security solutions for endpoint users (IDC, 2014). Since 1997 Kaspersky Lab has been an innovator in cybersecurity and provides effective digital security solutions and threat intelligence for large enterprises, SMBs and consumers. Kaspersky Lab is an international company, operating in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide. To learn more about Kaspersky Endpoint Security for Business, call Kaspersky Lab today at 866-563-3099 or email us at corporatesales@kaspersky.com. www.kaspersky.com/business Veeam recognizes the new challenges companies across the globe face in enabling the Always-On Business, a business that must operate 24/7/365. To address this, Veeam has pioneered a new market of Availability for the Modern Data Center by helping organizations meet recovery time and point objectives (RTPO ) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified protection, leveraged data and complete visibility. Veeam Availability Suite, which includes Veeam Backup & Replication, leverages virtualization, storage, and cloud technologies that enable the modern data center to help organizations save time, mitigate risks, and dramatically reduce capital and operational costs. Founded in 2006, Veeam currently has 29,000 ProPartners and more than 140,000 customers worldwide. Veeam s global headquarters are located in Baar, Switzerland, and the company has offices throughout the world. To learn more, visit veeam.com. Call 678-353-2140 or visit www.veeam.com 2015 AO Kaspersky Lab. All rights reserved. Registered trademarks and service marks are the property of their respective owners.