Better Security with Virtual Machines

Similar documents
Securing the Data Center against

VMware Infrastructure The New Computing Platform. Presented by: Nick Smith Corporate Account Manager, VMware

VMware ESX Server 3i. December 2007

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

Paul Hodge Virtualization Solutions: Improving Efficiency, Availability and Performance

Directions in Data Centre Virtualization and Management

VMware HA: Overview & Technical Best Practices

Potpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.

Agenda. 8:30am. 8:35am 9:00am. 9:00am 9:25am. Andre Kemp, Senior Product Manager, VMware A/NZ. Roger Parrish, Systems Engineer Manager, VMware A/NZ

Improving Blade Economics with Virtualization

Managing IT Complexity Managing the Physical and Virtual world from a Single Console

Parallels Virtuozzo Containers

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo

Securing Your Virtual World Harri Kaikkonen Channel Manager

Virtual Datacenter Automation

The vsphere 6.0 Advantages Over Hyper- V

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R

1 Quantum Corporation 1

Availability & Resource

Real Security for Server Virtualization

Welcome. Jeremy Poon Territory Manager, VMware

Foundation for Cloud Computing with VMware vsphere 4

Stellar performance for a virtualized world

T12: Virtualization: IT Audit and Security Perspectives Jason Chan, VMware

Big and Bright - Security

Virtualization Overview

Virtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

How it can help your organisation

Virtualization. Dr. Yingwu Zhu

File backup and recovery programs store duplicate copies of data to protect you from data loss.

System Center Virtual Machine Manager. Overblik Demo. Roadmap

The Realities of Virtualization

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Virtual SAN and vsphere w/ Operations Management

SERVE. -Priyal Lokhandwala

Using Virtualization to Improve Security. Jay Judkowitz Product Manager, ESX Server VMware, Inc.

Exam : VMWare VCP-310

GET MORE VIRTUAL WITH DELL AND VMWARE vsphere 4

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization. Greening the Enterprise

Required VMware vcenter Server Privileges

The Software Driven Datacenter

Dr. Song Fu 3/22/2010

Distributed Systems COMP 212. Lecture 18 Othon Michail

VMware vsphere: Taking Virtualization to the Next Level

Disaster Recovery-to-the- Cloud Best Practices

VMware: Server Virtualization and Storage

Janus: A-Cross-Layer Soft Real- Time Architecture for Virtualization

VMware vcloud Air User's Guide

2014 VMware Inc. All rights reserved.

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization Overview

VMware vsphere with ESX 4.1 and vcenter 4.1

Driving Greater Business Outcomes with Next Gen IT. Prasad Radhakrishnan ASEAN Datacenter Computing Solutions 18 th Jan 2018

VMware vsphere with ESX 6 and vcenter 6

That Set the Foundation for the Private Cloud

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Reference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Symantec Reference Architecture for Business Critical Virtualization

Certeon s acelera Virtual Appliance for Acceleration

Virtualization and Security

Securing the Modern Data Center with Trend Micro Deep Security

[TITLE] Virtualization 360: Microsoft Virtualization Strategy, Products, and Solutions for the New Economy

Atos TM Virtualization Solutions

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Virtualization Management APIs: VMware, DMTF & Xen

Kaspersky Security for Virtualization Frequently Asked Questions

Virtualization. Application Application Application. MCSN - N. Tonellotto - Distributed Enabling Platforms OPERATING SYSTEM OPERATING SYSTEM

End to End Virtualization with HP

Software Engineering at VMware Dan Scales May 2008

What Is New in VMware vcenter Server 4 W H I T E P A P E R

Intel s s Security Vision for Xen

Virtual Security Gateway Overview

VMware ESX Server Using EMC CLARiiON Storage Systems Solutions Guide

VMware Virtualization Software For HP ProLiant Servers Overview

W11 Hyper-V security. Jesper Krogh.

NEC SigmaSystemCenter Integrated Virtualization Platform Management Software

VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR

VMware vsphere Customized Corporate Agenda

vsphere 4 The Best Platform for Business-Critical Applications Gaetan Castelein Sr Product Marketing Manager VMware, Inc.

SteelEye Solutions Extend Citrix XenServer. Bob Williamson

Vmware VCP-101E. VMware ESX Server System Management II. Download Full Version :

Implementing & Managing Windows Server 2008 Hyper-V

Introduction. Application Versions. Virtual Machine Defined. Other Definitions. Tech Note 656 Building Wonderware Solution Architectures on VMware

A comprehensive framework for securing virtualized data centers. Business white paper

VMware Infrastructure 3 Pricing & Packaging

COPYRIGHTED MATERIAL. Introducing VMware Infrastructure 3. Chapter 1

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

The threat landscape is constantly

VMware Mirage Getting Started Guide

Nano Server in Windows Server An AMA with Andrew Mason from Microsoft

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

1V0-621.testking. 1V VMware Certified Associate 6 - Data Center Virtualization Fundamentals Exam

VMware Mirage Getting Started Guide

CSE543 - Computer and Network Security Module: Virtualization

T14 - Network, Storage and Virtualization Technologies for Industrial Automation. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

Comstor Edge Conference Cisco Hyper FlexFlex

Transcription:

Better Security with Virtual Machines VMware Security Seminar Cambridge, 2006

Agenda VMware Evolution Virtual machine Server architecture Virtual infrastructure Looking forward VMware s security vision Emerging opportunities Better security with virtual machine 2

VMware s Evolution 3

Virtual Machine Benefits Partitioning Multiple application and OS instances in a single machine Isolation Each virtual machine is isolated from the host and other virtual machines Encapsulation Each entire virtual machine state is contained in software; standard virtual hardware guarantees compatibility. 4

VMware Evolution From desktop to server 5

ESX server architecture Customized hypervisor kernel Fast I/O virtualization Advanced resource scheduler tailored for running VMs 6

VMware Evolution Virtual infrastructure 7

VMware s Virtual Infrastructure VMOTION ESX Server ESX Server MUI Virtual Center Server Network Network Remote Console PROVISIONING SUSPEND / SNAPSHOT ESX Server Local VM Template Storage 8

Distributed Resource Scheduling Global scheduler Automates initial virtual machine placement Uses VMotion to continuously optimize based on current workload Reacts to adding or removing hosts from the cluster VirtualCenter Global Scheduler ESX Server VM VM VM ESX Server VM VM VM ESX Server VM VM VM Local Scheduler Local Scheduler Local Scheduler Cluster 9

VMware Consolidated Backup Transparent to virtual machines Backup offloaded to dedicated servers Preserve file level consistency Integrated with popular backup utilities 10

VMware Evolution What s Next? 11

Agenda VMware Evolution Virtual machine Server architecture Virtual infrastructure Looking forward VMware s security vision Emerging opportunities Better security with virtual machine 12

Very Autonomic Security Technology Automation Self -troubleshooting, -repairing, -defending Repeatable, reliable, and predictable Intelligence Correlate large amounts of data and learn from data Take immediate, accurate action on data Ubiquity More coverage increases accuracy Work with heterogeneous environments VAST provides accurate, ubiquitous protection of virtual machines by automating the process of deployment and operational aspects of information security tasks. 13

IDC Feb 2005 Worldwide Spending on Security 14

Agenda VMware Evolution Virtual machine Server architecture Virtual infrastructure Looking forward VMware s security vision Emerging opportunities Better security with virtual machine 15

Emerging Opportunities Secure Virtual Machines trust, automation, intelligence 16

Embedded IDS Use virtualization layer to inspect VM Unlike traditional system inside VM Leverages tech trends: Multicore 17

Network Interposition VMM can interpose to enhance security GOAL: Only safe and correct communication Attacks are dropped or contained 18

Attack-Resistant Virtual Hardware Modify virtual hardware to detect attacks prevent attacks 19

VM Recovery Use a rollback and replay of VM execution Forensics Detect techniques of attack Attack Recovery Remove intrusion damage/backdoors from VM 20

Trust in Virtual Is software trustworthy? Existing OS environment Lock trust in hardware TPM Still need software layers Trust in Virtual Machine VMM layer as security base Virtual TPM and more Application Model 21

Conclusion Looking forward Security layer out of the OS VMM layer as trusted base for security Virtual even better than real Trustworthy Autonomic Intelligent 22