SlideShare uma empresa Scribd logo
1 de 22
Security Designed for the Software-Defined
Data Center
3/14/2014 Confidential | Copyright 2013 Trend Micro Inc.
Bill McGee
SVP and General Manager, Cloud and Data Center Security
Trend Micro
March 13, 2014
Copyright 2014 Trend Micro Inc.
2
Have you simply
“lifted-and- shifted”
your traditional security to
your software-defined
data center?
Copyright 2014 Trend Micro Inc.
3
Many organizations are experiencing the following…
• Minutes to deploy a server…weeks to secure it
• Virtually scale beyond physical limits… until you hit
your security limit
• Servers that share resources…security that consumes it
Attackers
Potential Risks
• Vulnerability in server exploited
to introduce malicious code
• Company must restrict
access to certain applications
• Admin makes changes to
known good configuration
• Hacker attempts a SQL
injection attack
• Brute force authentication
attack is executed
Software-defined data center changes the game
The opportunity:
Automate and
optimize security as
part of your data
center operations
Copyright 2014 Trend Micro Inc. 5
Security principles remain the same;
APPROACH to security must change
CONTEXT Workload and application-aware
SOFTWARE Security that evolves with the data center
PLATFORM Single platform for data center and cloudSiloed
Generic
Hardware
ADAPTIVE Intelligent, dynamic policy enforcement
Automated provisioning specific to platform
Static
3/14/2014Copyright 2014 Trend Micro Inc. 6
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 7
Extend to cloud with confidence
Provisioning securely within a dynamic data center
How do you:
• Secure the VM the moment it is provisioned?
• Apply the right policies to that VM?
• Reduce the time to provision without
compromising on security?
• Securely bring up/down/move your VMs?
Copyright 2014 Trend Micro Inc. 8
Provisioning
Infrastructure
vCenter, AD,
vCloud and
AWS
SAP
Exchange
Servers
Oracle
Web
Servers
Web
Server
Automate security as part of your operations
• Gain visibility into environment using
vCenter and vCloud Director integration
• Recommend and apply policies
automatically - specific to your data
center
• Automatically scale up and
down as required—with no
security gaps
19
Rules
15
Rules
73
Rules
8
Rules
28
Rules
Copyright 2014 Trend Micro Inc. 9
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 11
Extend to cloud with confidence
Management Challenge: Keeping up-to-date
How do you:
• Quickly and easily identify an issue?
• Keep up to date with patches?
• Manage multiple controls as you execute your
strategy for your data center and cloud?
Copyright 2014 Trend Micro Inc. 12
Protect even before you patch
• Protect against
vulnerability exploits
before patches available
• Save money avoiding
costly emergency patching
• Patch at your convenience
Vulnerability Disclosed or
Exploit Available
Patch
Available
Complete
Deployment
Test
Soak
Exposure
Begin
Deployment
PatchedTrend Micro Virtual Patching
Copyright 2014 Trend Micro Inc. 14
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 15
Extend to cloud with confidence
Optimized for your virtual environments
Network Usage
Scan Speed
CPU/Memory Usage
IOPS
Storage
ESXi
SAN
Copyright 2014 Trend Micro Inc. 17
Proven impact on data center resources
18
Scan
Cache
*All results based on internal testing using VMware View simulators
Up to 20X Faster*
Full Scans
Up to 5X Faster
Realtime Scans
Up to 2X Faster
VDI Login
Copyright 2014 Trend Micro Inc. 18
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 19
Extend to external or public cloud with confidence
Public Cloud: Affects every organization
Public cloud extension of Private Cloud by I.T. (Bursting)
Business groups Bypass IT to use Public Cloud
Private Cloud forced to take on attributes of
Public Cloud (ITaaS)
Copyright
2013 Trend20
Security in the cloud is a Shared Responsibility
Partner Eco-System
• Operating Systems
• Application
• Security Groups
• OS Firewalls
• Anti-Virus
• Account Management
• Storage Encryption
• Facilities
• Physical Security
• Physical Infrastructure
• Virtualized Infrastructure
Customer
Domain
AWSDomain
Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Edge
Locations
Availability Zones
Regions
Enterprise Applications
Enterprise Operation Systems
Cloud Deployment Dynamics
Instance Awareness
• Dynamic real-time security
visibility and response
Complexity
• Supporting multi-region
and global deployments
Scale & Automation
• Elastic services and
applications managed with
new tools Data Protection
• Protection of all data across
boot & data volumes
Purchasing
• Ability to purchase
security aligned to cloud
models
Common Management & Reporting
Security platform for the modern data center
3/14/2014Copyright 2014 Trend Micro Inc. 25
Data Center
Physical Virtual Private Cloud Public Cloud
• Address security across ALL your environments
• Comprehensive security to address varying risk
Log
Inspection
Anti-
Malware
Intrusion
Prevention
Host
Firewall
Integrity
Monitoring
100% of the
top 10 automotive
companies.
96% of the top
50 global
corporations.
100% of the
top 10 telecom
companies.
80% of the top
10 banks.
90% of the top
10 oil companies.
Global Threat Intelligence
New malware every ½ second
CEO
Founded
Headquarters
Employees
Offices
2012 Sales
Eva Chen
1988, United States
Tokyo, Japan
5,137
36
$1.2B USD
A world safe for exchanging
digital information
Copyright 2014 Trend Micro Inc. 26
Thank you!
Copyright 2014 Trend Micro Inc.

Mais conteúdo relacionado

Mais procurados

Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesVMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure SentinelRobert Crane
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure StackPT Datacomm Diangraha
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9Amazon Web Services
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
CipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 

Mais procurados (20)

Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
CipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks: Introduction
CipherGraph Networks: Introduction
 
Cloud security
Cloud securityCloud security
Cloud security
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 

Destaque

PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenPMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenMediehuset Ingeniøren Live
 
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelSådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelMediehuset Ingeniøren Live
 
Workpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerWorkpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerMediehuset Ingeniøren Live
 
Digital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringDigital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringMediehuset Ingeniøren Live
 
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenInsight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenMediehuset Ingeniøren Live
 
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutModarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutMediehuset Ingeniøren Live
 
Dansk projektledelse: IPMA certificering af projektledere
Dansk projektledelse:  IPMA certificering af projektledereDansk projektledelse:  IPMA certificering af projektledere
Dansk projektledelse: IPMA certificering af projektledereMediehuset Ingeniøren Live
 
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierDen agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierMediehuset Ingeniøren Live
 
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Mediehuset Ingeniøren Live
 
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mediehuset Ingeniøren Live
 
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Mediehuset Ingeniøren Live
 

Destaque (18)

Debugging 2013- Sune Vuorela
Debugging 2013- Sune VuorelaDebugging 2013- Sune Vuorela
Debugging 2013- Sune Vuorela
 
Debugging 2013- Michael Rasmussen
Debugging 2013- Michael RasmussenDebugging 2013- Michael Rasmussen
Debugging 2013- Michael Rasmussen
 
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenPMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
 
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelSådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
 
Debugging 2013- Jesper Brouer
Debugging 2013- Jesper BrouerDebugging 2013- Jesper Brouer
Debugging 2013- Jesper Brouer
 
Workpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerWorkpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsninger
 
Digital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringDigital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell Planering
 
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenInsight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
 
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutModarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
 
Thomas Hansen - information management
Thomas Hansen - information management Thomas Hansen - information management
Thomas Hansen - information management
 
Dansk projektledelse: IPMA certificering af projektledere
Dansk projektledelse:  IPMA certificering af projektledereDansk projektledelse:  IPMA certificering af projektledere
Dansk projektledelse: IPMA certificering af projektledere
 
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierDen agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
 
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
 
Pitch slides datacenter 2014 færdige
Pitch slides datacenter 2014 færdigePitch slides datacenter 2014 færdige
Pitch slides datacenter 2014 færdige
 
Dit CV din fremtid
Dit CV din fremtidDit CV din fremtid
Dit CV din fremtid
 
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
 
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
 
Agenda rum 204 2014
Agenda rum 204 2014Agenda rum 204 2014
Agenda rum 204 2014
 

Semelhante a Datacenter 2014: Trend Micro - Bill MCGee

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...Amazon Web Services
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 

Semelhante a Datacenter 2014: Trend Micro - Bill MCGee (20)

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Datacenter 2014: Trend Micro - Bill MCGee

  • 1. Security Designed for the Software-Defined Data Center 3/14/2014 Confidential | Copyright 2013 Trend Micro Inc. Bill McGee SVP and General Manager, Cloud and Data Center Security Trend Micro March 13, 2014
  • 2. Copyright 2014 Trend Micro Inc. 2 Have you simply “lifted-and- shifted” your traditional security to your software-defined data center?
  • 3. Copyright 2014 Trend Micro Inc. 3 Many organizations are experiencing the following… • Minutes to deploy a server…weeks to secure it • Virtually scale beyond physical limits… until you hit your security limit • Servers that share resources…security that consumes it
  • 4. Attackers Potential Risks • Vulnerability in server exploited to introduce malicious code • Company must restrict access to certain applications • Admin makes changes to known good configuration • Hacker attempts a SQL injection attack • Brute force authentication attack is executed
  • 5. Software-defined data center changes the game The opportunity: Automate and optimize security as part of your data center operations Copyright 2014 Trend Micro Inc. 5
  • 6. Security principles remain the same; APPROACH to security must change CONTEXT Workload and application-aware SOFTWARE Security that evolves with the data center PLATFORM Single platform for data center and cloudSiloed Generic Hardware ADAPTIVE Intelligent, dynamic policy enforcement Automated provisioning specific to platform Static 3/14/2014Copyright 2014 Trend Micro Inc. 6
  • 7. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 7 Extend to cloud with confidence
  • 8. Provisioning securely within a dynamic data center How do you: • Secure the VM the moment it is provisioned? • Apply the right policies to that VM? • Reduce the time to provision without compromising on security? • Securely bring up/down/move your VMs? Copyright 2014 Trend Micro Inc. 8
  • 9. Provisioning Infrastructure vCenter, AD, vCloud and AWS SAP Exchange Servers Oracle Web Servers Web Server Automate security as part of your operations • Gain visibility into environment using vCenter and vCloud Director integration • Recommend and apply policies automatically - specific to your data center • Automatically scale up and down as required—with no security gaps 19 Rules 15 Rules 73 Rules 8 Rules 28 Rules Copyright 2014 Trend Micro Inc. 9
  • 10. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 11 Extend to cloud with confidence
  • 11. Management Challenge: Keeping up-to-date How do you: • Quickly and easily identify an issue? • Keep up to date with patches? • Manage multiple controls as you execute your strategy for your data center and cloud? Copyright 2014 Trend Micro Inc. 12
  • 12. Protect even before you patch • Protect against vulnerability exploits before patches available • Save money avoiding costly emergency patching • Patch at your convenience Vulnerability Disclosed or Exploit Available Patch Available Complete Deployment Test Soak Exposure Begin Deployment PatchedTrend Micro Virtual Patching Copyright 2014 Trend Micro Inc. 14
  • 13. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 15 Extend to cloud with confidence
  • 14. Optimized for your virtual environments Network Usage Scan Speed CPU/Memory Usage IOPS Storage ESXi SAN Copyright 2014 Trend Micro Inc. 17
  • 15. Proven impact on data center resources 18 Scan Cache *All results based on internal testing using VMware View simulators Up to 20X Faster* Full Scans Up to 5X Faster Realtime Scans Up to 2X Faster VDI Login Copyright 2014 Trend Micro Inc. 18
  • 16. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 19 Extend to external or public cloud with confidence
  • 17. Public Cloud: Affects every organization Public cloud extension of Private Cloud by I.T. (Bursting) Business groups Bypass IT to use Public Cloud Private Cloud forced to take on attributes of Public Cloud (ITaaS) Copyright 2013 Trend20
  • 18. Security in the cloud is a Shared Responsibility Partner Eco-System • Operating Systems • Application • Security Groups • OS Firewalls • Anti-Virus • Account Management • Storage Encryption • Facilities • Physical Security • Physical Infrastructure • Virtualized Infrastructure Customer Domain AWSDomain Foundation Services Compute Storage Database Networking AWS Global Infrastructure Edge Locations Availability Zones Regions Enterprise Applications Enterprise Operation Systems
  • 19. Cloud Deployment Dynamics Instance Awareness • Dynamic real-time security visibility and response Complexity • Supporting multi-region and global deployments Scale & Automation • Elastic services and applications managed with new tools Data Protection • Protection of all data across boot & data volumes Purchasing • Ability to purchase security aligned to cloud models
  • 20. Common Management & Reporting Security platform for the modern data center 3/14/2014Copyright 2014 Trend Micro Inc. 25 Data Center Physical Virtual Private Cloud Public Cloud • Address security across ALL your environments • Comprehensive security to address varying risk Log Inspection Anti- Malware Intrusion Prevention Host Firewall Integrity Monitoring
  • 21. 100% of the top 10 automotive companies. 96% of the top 50 global corporations. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. Global Threat Intelligence New malware every ½ second CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United States Tokyo, Japan 5,137 36 $1.2B USD A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 26
  • 22. Thank you! Copyright 2014 Trend Micro Inc.