Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
1. How Security can maximise your Virtualisation
ROI
Name
Title, Date
Copyright 2009 Trend Micro Inc. 1
2. The journey to the cloud
Security issues & risks
Securing your journey to the cloud
Questions
4/5/2011 Copyright 2009 Trend Micro Inc. 2
3. The Evolving Datacenter
Lowering Costs, Increasing Flexibility Public Cloud
Private Cloud
Virtual
Physical Select enterprise
applications in
public cloud
Servers virtualized with Servers virtualized in
minimal changes to scalable, shared,
datacenter processes automated & elastic
Traditional
environment
datacenter
Copyright 2009 Trend Micro Inc. 3
4. Securing Cloud Computing Securing…
Pillars of the Cloud is About
Virtualisation Highly Mobile Devices
Cloud Infrastructure Endpoint
Revolution
Dynamic Data Center with Ubiquitous, Borderless
Shared System, Share Storage Data Access, Data Everywhere
Hybrid Cloud
Management
Security
That Fits
Shared Data Storage Application Platform
Cloud Data Cloud Application
Ownership of Data vs. Computing New Platform for New Apps. Example,
Confidentiality & Access Control Web Defacing, SQL Injection
Copyright 2009 Trend Micro Inc.
5. The journey to the cloud
Security issues & risks
Securing your journey to the cloud
Questions
4/5/2011 Copyright 2009 Trend Micro Inc. 5
6. The Dynamic Datacenter
88% of North American enterprises 2012, 60% of virtualized servers.. less
[no] virtualization security strategy secure than… physical servers….
Forrester Research / Info Week “Addressing the Most Common Security Risks in Data Center
Virtualization Projects” Gartner, 25 January 2010
Physical Virtual Cloud
Technologies and practices for
Number one concern (87.5%)
securing physical servers won’t
about cloud services is security.
provide sufficient protections for VMs. Frank Gens, IDC, Senior VP & Chief Analyst
Neil MacDonald, Gartner, June 2009
Copyright 2009 Trend Micro Inc.
7. Security: the #1 Cloud Challenge
Security and privacy were the foremost concerns by far, with a weighted
score higher than the next three (performance, immaturity and regulatory
compliance) combined.
Gartner (April 2010)
Copyright 2009 Trend Micro Inc. 7
8. Assessing Risk in the Cloud Journey
IT Production Business Production ITaaS
Data destruction 12
Multi-tenancy 11
Diminished perimeter 10
Data access & governance 9
Data confidentiality & integrity 8
Compliance / Lack of audit trail 7
Complexity of Management 6
Resource contention 5
Mixed trust level VMs 4
Instant-on gaps 3
Inter-VM attacks 2
Host controls under-deployed 1
Copyright 2009 Trend Micro Inc.
08-31
9. The journey to the cloud
Security issues & risks
Securing your journey to the cloud
Questions
4/5/2011 Copyright 2009 Trend Micro Inc. 9
10. VMware Solutions for IT as a Service
End User Computing
• Secure
• Manageable Management,
Cloud Application Platform Security,
Compliance.
• Open
Cloud Infrastructure
and Management
Copyright 2009 Trend Micro Inc.
11. vShield Security
Securing the Private Cloud End to End: from the Edge to the Endpoint
vShield App 1.0 and
vShield Edge 1.0 vShield Endpoint 1.0
Zones
Edge Endpoint = VM Security Zone
Secure the edge of Enables offloaded anti-virus Application protection from
the virtual datacenter network based threats
Virtual Datacenter 1 Virtual Datacenter 2
VMware VMware
DMZ PCI HIPAA vShield Web View vShield
compliant compliant
VMware vShield Manager
Copyright 2009 Trend Micro Inc.
12. VMware and Trend Micro have partnered to deliver
the first and only agentless anti-virus solution
architected for VMware virtualized datacenters and desktops.
• Enable our customers to maximize the benefits of virtualization,
• Securely accelerating the journey to the cloud
• Trend FIRST to partner with VMware to fully leverage the new vShield
EndPoint platform
“While their competitors talk about virtualization, Trend Micro is leading the way
with product” Sept 3, 2010
12 Copyright 2009 Trend Micro Inc.
13. Agentless Anti-Virus Overview
These are the key “building blocks” for VMware customers
Agent-less Anti-Virus for VMware
The idea
Protection for virtualized
desktops and datacenters
Trend Micro
The components VMware
Deep Security
vShield Endpoint
Anti-malware
Enables offloading of antivirus A virtual appliance that detects
processing to Trend Micro Deep and blocks malware (web threats,
Security Anti-malware – a viruses & worms, Trojans).
dedicated, security-hardened VM.
Customer
Benefits Higher Faster Better Stronger
Consolidation Performance Manageability Security
Differ-
entiator The first and only agentless anti-virus solution architected for VMware
13 Copyright 2009 Trend Micro Inc.
14. Protection beyond Anti-Malware
Beyond providing Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers
DEEP SECURITY
Agentless
1
vShield Detects and blocks malware (web threats,
Anti-Malware viruses & worms, Trojans). (PCI*)
Endpoint
Agentless
2 Detects and blocks known and zero-day
IDS / IPS attacks that target vulnerabilities (PCI*)
VMsafe
APIs Web Application Protection Shields web application vulnerabilities (PCI*)
Provides increased visibility into, or control
Application Control
over, applications accessing the network
Firewall Reduces attack surface. Prevents DoS &
detects reconnaissance scans (PCI*)
Agent-based
3
Detects malicious and unauthorized changes
Integrity Monitoring
to directories, files, registry keys. (PCI*)
Agent-based
4
Log Inspection Optimizes the identification of important
security events buried in log entries. (PCI*)
(PCI*): Helps address one or more PCI Data Security Standards and other compliance
14 Copyright 2009 Trend Micro Inc.
requirements
15. Benefits that Matter to Customers
• Higher consolidation Now, with Deep Security 7.5
− Inefficient operations removed AV
Virtual VM VM VM VM
• Faster performance Appliance
− Freedom from AV Storms
• Better manageability
− No agents to configure,
update & patch
• Stronger security Previously
− Instant ON protection
− Tamper-proofing VM VM VM
Copyright 2009 Trend Micro Inc. 15
16. Deep Security enables higher VM densities
• SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle
more than 25 desktop VMs/host
• DS supports 2-3 times no. of desktop VMs/host than traditional AV
• DS supports 40-60% more server VMs/host than traditional AV
CPU IOPS
Symantec Trend McAfee Symantec Trend McAfee
2143
307% 2053
%
%
273%
692%
81%
Symantec Trend McAfee Symantec Trend McAfee
Scheduled scan resource usage over baseline – 50 VMs per host
Copyright 2009 Trend Micro Inc.
17. Data Security Challenges in the Cloud
Encryption rarely used:
Name: John Doe
- Who can see your information? SSN: 425-79-0053
Visa #: 4456-8732…
Storage volumes and servers are mobile:
- Where is your data? Has it moved?
Rogue servers might access data: Name: John Doe
- Who is attaching to your storage?
SSN: 425-79-0053
Visa #: 4456-8732…
Audit and alerting modules lacking:
- What happened when you weren’t looking?
Encryption keys tied to vendor:
- Are you locked into a single security solution?
Who has access to your keys?
Storage volumes contain residual data:
- Are your storage devices recycled securely?
Classification 4/5/2011 Copyright 2009 Trend Micro Inc. 19
18. Protection at the Data Level
Encryption designed to secure the cloud
Copyright 2009 Trend Micro Inc.
19. Identity and Integrity are paramount
Identity - “Is it mine?” Integrity - “Is it OK?”
• Mounted data store • Firewall
• Location • AV
• Start-up time • Self integrity check
• Embedded keys • Deep Security
Auto or Manual rules based key approval
Copyright 2009 Trend Micro Inc. 21
20. Trend Micro Mapped Along the Journey
IT Production Business Production ITaaS
Data destruction 12
Multi-tenancy 11
Diminished perimeter 10
Data access & governance 9
Data confidentiality & integrity 8
Mixed Trust Level VMs 7
Complexity of Management 6
Resource contention 5
Compliance / Lack of audit trail 4
Instant-on gaps 3
Inter-VM attacks 2
Host controls under-deployed
Copyright 2009 Trend Micro Inc.
1
08-31
21. Trend Micro: Server Security Leadership
IDC Market Analysis: Worldwide Corporate Server Security Market Share
Trend Micro
22.9%
All Others
77.1%
These products are generally more robust than desktop endpoint security
and are available for a much wider set of operating systems (Windows, Unix, and Linux).
This category also includes products that are designed to protect hypervisors and virtual
servers.” Source: Worldwide Endpoint Security 2010-2014
Forecast and 2009 Vendor Shares, IDC
Copyright 2009 Trend Micro Inc. 23
22. Improves Security Improves Virtualization
by providing security solutions
by providing the most
architected to fully leverage
secure virtualization infrastructure,
the VMware platform
with APIs, and certification programs
The most comprehensive suite of next-generation,
virtualization security solutions:
Virtual appliance- and guest-based
Tightly integrated with, and leverages,
VMware APIs and technologies.
Architected to fully leverage the VMware platform
for delivering better-than-physical security.
Copyright 2009 Trend Micro Inc.
24
23. Thank you from Trend Micro
Copyright 2009 Trend Micro Inc.