SlideShare a Scribd company logo
1 of 23
Download to read offline
How Security can maximise your Virtualisation
ROI

  Name
  Title, Date
                     Copyright 2009 Trend Micro Inc.   1
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   2
The Evolving Datacenter
  Lowering Costs, Increasing Flexibility                                             Public Cloud




                                     Private Cloud



                  Virtual


  Physical                                                                         Select enterprise
                                                                                   applications in
                                                                                   public cloud

              Servers virtualized with   Servers virtualized in
               minimal changes to         scalable, shared,
               datacenter processes       automated & elastic
Traditional
                                          environment
 datacenter

                                             Copyright 2009 Trend Micro Inc.   3
Securing Cloud Computing Securing…
Pillars of the Cloud is About
        Virtualisation                                                       Highly Mobile Devices


 Cloud Infrastructure                                                             Endpoint
                                                                                  Revolution
    Dynamic Data Center with                                                   Ubiquitous, Borderless
    Shared System, Share Storage                                               Data Access, Data Everywhere
                                    Hybrid Cloud
                                    Management
                                      Security
                                      That Fits
   Shared Data Storage                                                        Application Platform


      Cloud Data                                                            Cloud Application

 Ownership of Data vs. Computing                                           New Platform for New Apps. Example,
 Confidentiality & Access Control                                          Web Defacing, SQL Injection

                                         Copyright 2009 Trend Micro Inc.
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   5
The Dynamic Datacenter

88% of North American enterprises                   2012, 60% of virtualized servers.. less
[no] virtualization security strategy               secure than… physical servers….
Forrester Research / Info Week                      “Addressing the Most Common Security Risks in Data Center
                                                    Virtualization Projects” Gartner, 25 January 2010




                                  Physical   Virtual                              Cloud




  Technologies and practices for
                                                                   Number one concern (87.5%)
  securing physical servers won’t
                                                                   about cloud services is security.
  provide sufficient protections for VMs.                          Frank Gens, IDC, Senior VP & Chief Analyst
  Neil MacDonald, Gartner, June 2009


                                                Copyright 2009 Trend Micro Inc.
Security: the #1 Cloud Challenge
Security and privacy were the foremost concerns by far, with a weighted
score higher than the next three (performance, immaturity and regulatory
compliance) combined.




       Gartner (April 2010)
                                   Copyright 2009 Trend Micro Inc.   7
Assessing Risk in the Cloud Journey
        IT Production   Business Production                                   ITaaS



                                                                              Data destruction    12


                                                                                 Multi-tenancy    11

                                                                          Diminished perimeter    10


                                                                 Data access & governance         9


                                                          Data confidentiality & integrity        8


                                                        Compliance / Lack of audit trail          7


                                                                Complexity of Management          6


                                                                          Resource contention     5


                                                                          Mixed trust level VMs   4

                                                                               Instant-on gaps    3


                                                                               Inter-VM attacks   2


                                                            Host controls under-deployed          1
                                        Copyright 2009 Trend Micro Inc.

08-31
The journey to the cloud

                           Security issues & risks

Securing your journey to the cloud

                                                   Questions




  4/5/2011   Copyright 2009 Trend Micro Inc.   9
VMware Solutions for IT as a Service

               End User Computing




• Secure

• Manageable                                                      Management,
               Cloud Application Platform                           Security,
                                                                  Compliance.
• Open



               Cloud Infrastructure
               and Management




                                Copyright 2009 Trend Micro Inc.
vShield Security
Securing the Private Cloud End to End: from the Edge to the Endpoint
                                                                                         vShield App 1.0 and
   vShield Edge 1.0               vShield Endpoint 1.0
                                                                                                Zones
 Edge                          Endpoint = VM                                           Security Zone
  Secure the edge of             Enables offloaded anti-virus                          Application protection from
  the virtual datacenter                                                               network based threats

               Virtual Datacenter 1                                                          Virtual Datacenter 2
                                                            VMware                                                     VMware
   DMZ           PCI                       HIPAA            vShield                    Web                      View   vShield

               compliant                 compliant




                                      VMware vShield Manager




                                                     Copyright 2009 Trend Micro Inc.
VMware and Trend Micro have partnered to deliver
                the first and only agentless anti-virus solution
        architected for VMware virtualized datacenters and desktops.


•   Enable our customers to maximize the benefits of virtualization,
•   Securely accelerating the journey to the cloud
•   Trend FIRST to partner with VMware to fully leverage the new vShield
    EndPoint platform


“While their competitors talk about virtualization, Trend Micro is leading the way
with product”                                                                 Sept 3, 2010




                                       12   Copyright 2009 Trend Micro Inc.
Agentless Anti-Virus Overview
   These are the key “building blocks” for VMware customers


                                   Agent-less Anti-Virus for VMware
The idea
                                         Protection for virtualized
                                         desktops and datacenters




                                                                              Trend Micro
The components                   VMware
                                                                             Deep Security
                             vShield Endpoint
                                                                             Anti-malware

                       Enables offloading of antivirus  A virtual appliance that detects
                       processing to Trend Micro Deep and blocks malware (web threats,
                       Security Anti-malware – a        viruses & worms, Trojans).
                       dedicated, security-hardened VM.



Customer
Benefits         Higher                Faster                                 Better         Stronger
              Consolidation         Performance                       Manageability          Security

Differ-
entiator   The first and only agentless anti-virus solution architected for VMware

                                                 13   Copyright 2009 Trend Micro Inc.
Protection beyond Anti-Malware
Beyond providing Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers

                                       DEEP SECURITY
                                                   Agentless
                                                                1
vShield                                                             Detects and blocks malware (web threats,
                                       Anti-Malware                 viruses & worms, Trojans). (PCI*)
Endpoint

                                                   Agentless
                                                                2 Detects and blocks known and zero-day
                                IDS / IPS                           attacks that target vulnerabilities (PCI*)
VMsafe
APIs                            Web Application Protection          Shields web application vulnerabilities (PCI*)
                                                                    Provides increased visibility into, or control
                                Application Control
                                                                    over, applications accessing the network
                                Firewall                            Reduces attack surface. Prevents DoS &
                                                                    detects reconnaissance scans (PCI*)

                                                Agent-based
                                                                3
                                                                    Detects malicious and unauthorized changes
                               Integrity Monitoring
                                                                    to directories, files, registry keys. (PCI*)

                                                Agent-based
                                                                4
                                      Log Inspection                Optimizes the identification of important
                                                                    security events buried in log entries. (PCI*)

    (PCI*): Helps address one or more PCI Data Security Standards and other compliance
                                                   14 Copyright 2009 Trend Micro Inc.

    requirements
Benefits that Matter to Customers

• Higher consolidation                                   Now, with Deep Security 7.5
  − Inefficient operations removed                       AV
                                                         Virtual          VM   VM   VM   VM
• Faster performance                                     Appliance

  − Freedom from AV Storms
• Better manageability
  − No agents to configure,
    update & patch
• Stronger security                                      Previously
  − Instant ON protection
  − Tamper-proofing                                         VM                 VM        VM




                                     Copyright 2009 Trend Micro Inc. 15
Deep Security enables higher VM densities
 • SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle
   more than 25 desktop VMs/host
 • DS supports 2-3 times no. of desktop VMs/host than traditional AV
 • DS supports 40-60% more server VMs/host than traditional AV


             CPU                                                                          IOPS
  Symantec     Trend   McAfee                                                   Symantec     Trend    McAfee

                                                                                 2143
                       307%                                                                           2053
                                                                                  %
                                                                                                       %
  273%




                                                                                           692%
             81%




 Symantec    Trend     McAfee                                                  Symantec    Trend     McAfee


             Scheduled scan resource usage over baseline – 50 VMs per host
                                             Copyright 2009 Trend Micro Inc.
Data Security Challenges in the Cloud
Encryption rarely used:
                                                                                              Name: John Doe
- Who can see your information?                                                               SSN: 425-79-0053
                                                                                              Visa #: 4456-8732…




Storage volumes and servers are mobile:
- Where is your data? Has it moved?


Rogue servers might access data:                                                                                   Name: John Doe
- Who is attaching to your storage?
                                                                                                                   SSN: 425-79-0053
                                                                                                                   Visa #: 4456-8732…
Audit and alerting modules lacking:
- What happened when you weren’t looking?


Encryption keys tied to vendor:
- Are you locked into a single security solution?
  Who has access to your keys?


Storage volumes contain residual data:
- Are your storage devices recycled securely?




                                           Classification 4/5/2011   Copyright 2009 Trend Micro Inc. 19
Protection at the Data Level
  Encryption designed to secure the cloud




                        Copyright 2009 Trend Micro Inc.
Identity and Integrity are paramount

Identity - “Is it mine?”                   Integrity - “Is it OK?”
 • Mounted data store                         • Firewall
 • Location                                   • AV
 • Start-up time                              • Self integrity check
 • Embedded keys                              • Deep Security




 Auto or Manual rules based key approval



                                     Copyright 2009 Trend Micro Inc. 21
Trend Micro Mapped Along the Journey
        IT Production   Business Production                                 ITaaS


                                                                         Data destruction   12

                                                                           Multi-tenancy    11

                                                            Diminished perimeter            10

                                               Data access & governance                     9

                                       Data confidentiality & integrity                     8

                                                         Mixed Trust Level VMs              7

                                             Complexity of Management                       6

                                                              Resource contention           5

                                      Compliance / Lack of audit trail                      4

                                                                         Instant-on gaps    3

                                                                         Inter-VM attacks   2

                                        Host controls under-deployed
                                       Copyright 2009 Trend Micro Inc.
                                                                                            1
08-31
Trend Micro: Server Security Leadership
 IDC Market Analysis: Worldwide Corporate Server Security Market Share

                                            Trend Micro
                                               22.9%




                                        All Others
                                          77.1%


These products are generally more robust than desktop endpoint security
 and are available for a much wider set of operating systems (Windows, Unix, and Linux).
This category also includes products that are designed to protect hypervisors and virtual
servers.”                                                        Source: Worldwide Endpoint Security 2010-2014
                                                                         Forecast and 2009 Vendor Shares, IDC

                                                     Copyright 2009 Trend Micro Inc. 23
Improves Security                                 Improves Virtualization
                                                           by providing security solutions
       by providing the most
                                                            architected to fully leverage
secure virtualization infrastructure,
                                                                the VMware platform
with APIs, and certification programs


The most comprehensive suite of next-generation,
virtualization security solutions:

  Virtual appliance- and guest-based

  Tightly integrated with, and leverages,
     VMware APIs and technologies.

 Architected to fully leverage the VMware platform
     for delivering better-than-physical security.
                                        Copyright 2009 Trend Micro Inc.
                                                                          24
Thank you from Trend Micro
            Copyright 2009 Trend Micro Inc.

More Related Content

What's hot

Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012Lars Neupart
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 

What's hot (20)

Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 

Similar to Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance

Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New1CloudRoad.com
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseMike K
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 

Similar to Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance (20)

Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Emc keynote 0945 1030
Emc keynote 0945 1030Emc keynote 0945 1030
Emc keynote 0945 1030
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
VMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell GroupwiseVMware Zimbra vs. Novell Groupwise
VMware Zimbra vs. Novell Groupwise
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 

More from UNIT4 IT Solutions

UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!
UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!
UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!UNIT4 IT Solutions
 
Bring Your Own Device, er is geen weg terug
Bring Your Own Device, er is geen weg terugBring Your Own Device, er is geen weg terug
Bring Your Own Device, er is geen weg terugUNIT4 IT Solutions
 
Het Nieuwe werken en IT Consumerization
Het Nieuwe werken en IT ConsumerizationHet Nieuwe werken en IT Consumerization
Het Nieuwe werken en IT ConsumerizationUNIT4 IT Solutions
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecUNIT4 IT Solutions
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenUNIT4 IT Solutions
 

More from UNIT4 IT Solutions (6)

UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!
UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!
UNIT4 Business Collaborator: het nieuwe samenwerken aan projecten!
 
Bring Your Own Device, er is geen weg terug
Bring Your Own Device, er is geen weg terugBring Your Own Device, er is geen weg terug
Bring Your Own Device, er is geen weg terug
 
Het Nieuwe werken en IT Consumerization
Het Nieuwe werken en IT ConsumerizationHet Nieuwe werken en IT Consumerization
Het Nieuwe werken en IT Consumerization
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
 
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingenDesktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
 
UNIT4 Hybrid Computing
UNIT4 Hybrid ComputingUNIT4 Hybrid Computing
UNIT4 Hybrid Computing
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance

  • 1. How Security can maximise your Virtualisation ROI Name Title, Date Copyright 2009 Trend Micro Inc. 1
  • 2. The journey to the cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 2
  • 3. The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud Virtual Physical Select enterprise applications in public cloud Servers virtualized with Servers virtualized in minimal changes to scalable, shared, datacenter processes automated & elastic Traditional environment datacenter Copyright 2009 Trend Micro Inc. 3
  • 4. Securing Cloud Computing Securing… Pillars of the Cloud is About Virtualisation Highly Mobile Devices Cloud Infrastructure Endpoint Revolution Dynamic Data Center with Ubiquitous, Borderless Shared System, Share Storage Data Access, Data Everywhere Hybrid Cloud Management Security That Fits Shared Data Storage Application Platform Cloud Data Cloud Application Ownership of Data vs. Computing New Platform for New Apps. Example, Confidentiality & Access Control Web Defacing, SQL Injection Copyright 2009 Trend Micro Inc.
  • 5. The journey to the cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 5
  • 6. The Dynamic Datacenter 88% of North American enterprises 2012, 60% of virtualized servers.. less [no] virtualization security strategy secure than… physical servers…. Forrester Research / Info Week “Addressing the Most Common Security Risks in Data Center Virtualization Projects” Gartner, 25 January 2010 Physical Virtual Cloud Technologies and practices for Number one concern (87.5%) securing physical servers won’t about cloud services is security. provide sufficient protections for VMs. Frank Gens, IDC, Senior VP & Chief Analyst Neil MacDonald, Gartner, June 2009 Copyright 2009 Trend Micro Inc.
  • 7. Security: the #1 Cloud Challenge Security and privacy were the foremost concerns by far, with a weighted score higher than the next three (performance, immaturity and regulatory compliance) combined. Gartner (April 2010) Copyright 2009 Trend Micro Inc. 7
  • 8. Assessing Risk in the Cloud Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Compliance / Lack of audit trail 7 Complexity of Management 6 Resource contention 5 Mixed trust level VMs 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed 1 Copyright 2009 Trend Micro Inc. 08-31
  • 9. The journey to the cloud Security issues & risks Securing your journey to the cloud Questions 4/5/2011 Copyright 2009 Trend Micro Inc. 9
  • 10. VMware Solutions for IT as a Service End User Computing • Secure • Manageable Management, Cloud Application Platform Security, Compliance. • Open Cloud Infrastructure and Management Copyright 2009 Trend Micro Inc.
  • 11. vShield Security Securing the Private Cloud End to End: from the Edge to the Endpoint vShield App 1.0 and vShield Edge 1.0 vShield Endpoint 1.0 Zones Edge Endpoint = VM Security Zone Secure the edge of Enables offloaded anti-virus Application protection from the virtual datacenter network based threats Virtual Datacenter 1 Virtual Datacenter 2 VMware VMware DMZ PCI HIPAA vShield Web View vShield compliant compliant VMware vShield Manager Copyright 2009 Trend Micro Inc.
  • 12. VMware and Trend Micro have partnered to deliver the first and only agentless anti-virus solution architected for VMware virtualized datacenters and desktops. • Enable our customers to maximize the benefits of virtualization, • Securely accelerating the journey to the cloud • Trend FIRST to partner with VMware to fully leverage the new vShield EndPoint platform “While their competitors talk about virtualization, Trend Micro is leading the way with product” Sept 3, 2010 12 Copyright 2009 Trend Micro Inc.
  • 13. Agentless Anti-Virus Overview These are the key “building blocks” for VMware customers Agent-less Anti-Virus for VMware The idea Protection for virtualized desktops and datacenters Trend Micro The components VMware Deep Security vShield Endpoint Anti-malware Enables offloading of antivirus A virtual appliance that detects processing to Trend Micro Deep and blocks malware (web threats, Security Anti-malware – a viruses & worms, Trojans). dedicated, security-hardened VM. Customer Benefits Higher Faster Better Stronger Consolidation Performance Manageability Security Differ- entiator The first and only agentless anti-virus solution architected for VMware 13 Copyright 2009 Trend Micro Inc.
  • 14. Protection beyond Anti-Malware Beyond providing Agentless AV, Trend Micro Deep Security provides additional protection for VMware customers DEEP SECURITY Agentless 1 vShield Detects and blocks malware (web threats, Anti-Malware viruses & worms, Trojans). (PCI*) Endpoint Agentless 2 Detects and blocks known and zero-day IDS / IPS attacks that target vulnerabilities (PCI*) VMsafe APIs Web Application Protection Shields web application vulnerabilities (PCI*) Provides increased visibility into, or control Application Control over, applications accessing the network Firewall Reduces attack surface. Prevents DoS & detects reconnaissance scans (PCI*) Agent-based 3 Detects malicious and unauthorized changes Integrity Monitoring to directories, files, registry keys. (PCI*) Agent-based 4 Log Inspection Optimizes the identification of important security events buried in log entries. (PCI*) (PCI*): Helps address one or more PCI Data Security Standards and other compliance 14 Copyright 2009 Trend Micro Inc. requirements
  • 15. Benefits that Matter to Customers • Higher consolidation Now, with Deep Security 7.5 − Inefficient operations removed AV Virtual VM VM VM VM • Faster performance Appliance − Freedom from AV Storms • Better manageability − No agents to configure, update & patch • Stronger security Previously − Instant ON protection − Tamper-proofing VM VM VM Copyright 2009 Trend Micro Inc. 15
  • 16. Deep Security enables higher VM densities • SYMC/MFE consume 3x –12x more resources in sch. scans & could not handle more than 25 desktop VMs/host • DS supports 2-3 times no. of desktop VMs/host than traditional AV • DS supports 40-60% more server VMs/host than traditional AV CPU IOPS Symantec Trend McAfee Symantec Trend McAfee 2143 307% 2053 % % 273% 692% 81% Symantec Trend McAfee Symantec Trend McAfee Scheduled scan resource usage over baseline – 50 VMs per host Copyright 2009 Trend Micro Inc.
  • 17. Data Security Challenges in the Cloud Encryption rarely used: Name: John Doe - Who can see your information? SSN: 425-79-0053 Visa #: 4456-8732… Storage volumes and servers are mobile: - Where is your data? Has it moved? Rogue servers might access data: Name: John Doe - Who is attaching to your storage? SSN: 425-79-0053 Visa #: 4456-8732… Audit and alerting modules lacking: - What happened when you weren’t looking? Encryption keys tied to vendor: - Are you locked into a single security solution? Who has access to your keys? Storage volumes contain residual data: - Are your storage devices recycled securely? Classification 4/5/2011 Copyright 2009 Trend Micro Inc. 19
  • 18. Protection at the Data Level Encryption designed to secure the cloud Copyright 2009 Trend Micro Inc.
  • 19. Identity and Integrity are paramount Identity - “Is it mine?” Integrity - “Is it OK?” • Mounted data store • Firewall • Location • AV • Start-up time • Self integrity check • Embedded keys • Deep Security Auto or Manual rules based key approval Copyright 2009 Trend Micro Inc. 21
  • 20. Trend Micro Mapped Along the Journey IT Production Business Production ITaaS Data destruction 12 Multi-tenancy 11 Diminished perimeter 10 Data access & governance 9 Data confidentiality & integrity 8 Mixed Trust Level VMs 7 Complexity of Management 6 Resource contention 5 Compliance / Lack of audit trail 4 Instant-on gaps 3 Inter-VM attacks 2 Host controls under-deployed Copyright 2009 Trend Micro Inc. 1 08-31
  • 21. Trend Micro: Server Security Leadership IDC Market Analysis: Worldwide Corporate Server Security Market Share Trend Micro 22.9% All Others 77.1% These products are generally more robust than desktop endpoint security and are available for a much wider set of operating systems (Windows, Unix, and Linux). This category also includes products that are designed to protect hypervisors and virtual servers.” Source: Worldwide Endpoint Security 2010-2014 Forecast and 2009 Vendor Shares, IDC Copyright 2009 Trend Micro Inc. 23
  • 22. Improves Security Improves Virtualization by providing security solutions by providing the most architected to fully leverage secure virtualization infrastructure, the VMware platform with APIs, and certification programs The most comprehensive suite of next-generation, virtualization security solutions:  Virtual appliance- and guest-based  Tightly integrated with, and leverages, VMware APIs and technologies.  Architected to fully leverage the VMware platform for delivering better-than-physical security. Copyright 2009 Trend Micro Inc. 24
  • 23. Thank you from Trend Micro Copyright 2009 Trend Micro Inc.