SlideShare a Scribd company logo
1 of 24
Alvaro Ferro CCSP – CISSP – CCIE Security Written 30de Junio. SECURITY IN THE DATACENTER
Data Center Virtualization Trends Security in virtual environment Challenges due to Virtualization Secure Virtualization Framework Virtual Controller and Virtual Management Center Agenda 30 June 2011 2
Data Center Virtualization Trends vController+vFW and vMC
#1 Technology Priority in 2010 Survey of 1,586 CIOs Displaces Business Intelligence which held top position for the last 5 years! Source:  Gartner EXP, Jan 2010 2010 – virtualization reaches a tipping point Increased Data Center Security Focus 50% of Workloads by 2012 ,[object Object]
Source: Gartner, Oct 200950% ~ 58 million deployed x86 machines 16% 2010 2011 2012 30 June 2011 4
Do more with less Connect everyone to everything Present & Future Past Efficiency Drives Consolidation Virtualization, Blades, Increased Bandwidth Dispersed, Physical  New Apps, Protocols & Traffic Legacy + Web, IPv4 + IPv6, Data + Voice + Video Legacy, Client Server, IPv4, Data Data Center Trends Threat Landscape Change Sophisticated Targeted Attacks, Re-Perimeterization Worms, Viruses, Trojans, DDoS 30 June 2011 5
Securing the Data Center Attack Surface Data at Rest Attack Surface Attack Traffic Web Apps Vulnerability Scanning Protects Web App Vulnerabilities Enterprise Apps IPS Platform Operating Systems Network  Devices 30 June 2011 6
Security in virtual environment 30 June 2011 7
ENTENDAMOS LO SIGUIENTE “40% de los proyectos de implementación de ambientes virtualizados se llevaron a cabo sin la participación del equipo de seguridad en la arquitectura inicial y las etapas de planificación ” Riesgos mas comunes en proyectos de Virtualización La falta de visibilidad y controles en la comunicación entre VM-a-VM.   Perdida potencial en la separación de deberes (SOD) entre las áreas de redes y seguridad cuando se virtualiza.  Cargas de trabajo se consolidan en un servidor físico. Controles de acceso administrativo (Hypervisor/VMM). Source: MacDonald, Neal. Addressing the Most Common Security Risks in Data Center Virtualization Projects, Gartner, Inc. January 25, 2010
[object Object],Son ataques de rootkit diseñados para tomar el control de las máquinas virtuales mientras están en funcionamiento. ,[object Object],Es un exploit que permite moverse dentro de una máquina virtual. ,[object Object],Cuando una máquina virtual es capaz de acceder a otra máquina virtual. ,[object Object],Acceso no autorizado para la adquisición de algún archivo que contiene el VM ,[object Object],Proliferación de cargas de trabajo de los servidores virtualizados AMENAZAS: SEGURIDAD DE LA VIRTUALIZACIÓN Todas son posibilidades reales pero hay realidades prácticas!
CARACTERÍSTICAS: DEFENSA POR CAPAS ,[object Object]
Utilice programas de protección para  Zeroday
Convergencia en soluciones IPS (virtual & physical) para la segmentación de zonas de confianzasCore Virtualized Server VM VM VM Secure Network Fabric Switch App App App OS OS OS vNICs vNICs vNICs vSwitch Hypervisor pNICs Virtualized Servers Physical Servers
HP Secure®Virtualization Framework ,[object Object]
Plataforma IPS con VLAN translation
Virtual Controller (vController)
Virtual IPS (vIPS)
SMS / VMCTippingPontvIPS ,[object Object]
Active la amenaza de bloqueo-para el centro de datos virtual
Coherente política de seguridad & cumplimiento-entre el centro de datos virtuales y físicos
Full aislamiento de seguridad VM- desde maquinas virtuales y hosts
Visibilidad y control- integración VMC ,[object Object]
Seguridad para VMs (Móvil)- seguridad sigue VMs
Cobertura de amenazas de DVLabs– la mejor cobertura disponibleTIPPINGPOINT vCONTROLLER

More Related Content

What's hot

Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsJason Edelstein
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
Cloud security
Cloud securityCloud security
Cloud securityinsoonjo
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5DaveEdwards12
 
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)Scott Lowe
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateASBIS SK
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
VMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQVMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQRichard Common
 
NFV Security PPT
NFV Security PPTNFV Security PPT
NFV Security PPTNisarg Shah
 

What's hot (19)

Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
VMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats NewVMware vRealize Network Insight 3.5 - Whats New
VMware vRealize Network Insight 3.5 - Whats New
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
Cloud security
Cloud securityCloud security
Cloud security
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
 
Insecurity in security products v1.5
Insecurity in security products v1.5Insecurity in security products v1.5
Insecurity in security products v1.5
 
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
VMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQVMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQ
 
NFV Security PPT
NFV Security PPTNFV Security PPT
NFV Security PPT
 

Viewers also liked

Urogynics do you exert and squirt
Urogynics   do you exert and squirtUrogynics   do you exert and squirt
Urogynics do you exert and squirtWomensHealthFan
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?AlienVault
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...CSCJournals
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4editionRalf Braga
 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Phil Agcaoili
 
Iso2700
Iso2700 Iso2700
Iso2700 madunix
 
схемы по политике кибербезопасности
схемы по политике кибербезопасностисхемы по политике кибербезопасности
схемы по политике кибербезопасностиDmitry Sanatov
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework Raleigh ISSA
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businessescyrusone
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Data Center Security
Data Center SecurityData Center Security
Data Center SecurityCisco Canada
 
The Security Framework for Workflow Management Systems
The Security Framework for Workflow Management SystemsThe Security Framework for Workflow Management Systems
The Security Framework for Workflow Management SystemsSwanky Hsiao
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 

Viewers also liked (15)

Urogynics do you exert and squirt
Urogynics   do you exert and squirtUrogynics   do you exert and squirt
Urogynics do you exert and squirt
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4edition
 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
 
Iso2700
Iso2700 Iso2700
Iso2700
 
схемы по политике кибербезопасности
схемы по политике кибербезопасностисхемы по политике кибербезопасности
схемы по политике кибербезопасности
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
The Security Framework for Workflow Management Systems
The Security Framework for Workflow Management SystemsThe Security Framework for Workflow Management Systems
The Security Framework for Workflow Management Systems
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 

Similar to Campus jueves

VirtSec, and the Open Source impact
VirtSec,  and the Open Source impactVirtSec,  and the Open Source impact
VirtSec, and the Open Source impactKris Buytaert
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
VMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Tanzu
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environmentASBIS SK
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 
Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMwareAngel Villar Garea
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...solarisyourep
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...xKinAnx
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...Cisco DevNet
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Notecsharney
 
VMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPVMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPIBM System Networking
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudTjylen Veselyj
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your itsolarisyourep
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationSuministros Obras y Sistemas
 

Similar to Campus jueves (20)

VirtSec, and the Open Source impact
VirtSec,  and the Open Source impactVirtSec,  and the Open Source impact
VirtSec, and the Open Source impact
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
VMware Developer-Ready Transformation
VMware Developer-Ready TransformationVMware Developer-Ready Transformation
VMware Developer-Ready Transformation
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMware
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Note
 
VMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPVMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HP
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your it
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 

More from campus party

¿Qué es SCADA y cómo me afecta su (in)seguridad?
¿Qué es SCADA y cómo me afecta su (in)seguridad? ¿Qué es SCADA y cómo me afecta su (in)seguridad?
¿Qué es SCADA y cómo me afecta su (in)seguridad? campus party
 
Producción del largometraje pequeñas voces
Producción del largometraje pequeñas vocesProducción del largometraje pequeñas voces
Producción del largometraje pequeñas vocescampus party
 
Conferencia: Aplicaciones y el reto del desarrollo móvil
Conferencia: Aplicaciones y el reto del desarrollo móvilConferencia: Aplicaciones y el reto del desarrollo móvil
Conferencia: Aplicaciones y el reto del desarrollo móvilcampus party
 
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel ContrerasComo sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contrerascampus party
 
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel ContrerasComo sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contrerascampus party
 
X taller bluevialiminal
X taller bluevialiminalX taller bluevialiminal
X taller bluevialiminalcampus party
 
X liminal buevia 2 (dllo.)-taller
X liminal buevia 2 (dllo.)-tallerX liminal buevia 2 (dllo.)-taller
X liminal buevia 2 (dllo.)-tallercampus party
 
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1X elalgoritmodelamemoria maria juliana soto (social media) (1) 1
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1campus party
 
Theremin Alfredo Vargas
Theremin Alfredo Vargas Theremin Alfredo Vargas
Theremin Alfredo Vargas campus party
 
Sonido y cine Ricardo Escallon
Sonido y cine Ricardo Escallon Sonido y cine Ricardo Escallon
Sonido y cine Ricardo Escallon campus party
 
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautista
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés BautistaPhotoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautista
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautistacampus party
 
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonseca
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés FonsecaPhotoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonseca
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonsecacampus party
 
Aseguramiento de Vulnerabilidades Web con tecnologías OWASP
Aseguramiento de Vulnerabilidades Web con tecnologías OWASPAseguramiento de Vulnerabilidades Web con tecnologías OWASP
Aseguramiento de Vulnerabilidades Web con tecnologías OWASPcampus party
 
Mundos virtuales inmersivos y social shopping
Mundos virtuales inmersivos y social shopping Mundos virtuales inmersivos y social shopping
Mundos virtuales inmersivos y social shopping campus party
 
Creación transmediática y comunidades en práctica
Creación transmediática y comunidades en prácticaCreación transmediática y comunidades en práctica
Creación transmediática y comunidades en prácticacampus party
 
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...Implementación de Cloud Computing con Software Libre y medidas de seguridad p...
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...campus party
 

More from campus party (20)

Titulo
Titulo Titulo
Titulo
 
¿Qué es SCADA y cómo me afecta su (in)seguridad?
¿Qué es SCADA y cómo me afecta su (in)seguridad? ¿Qué es SCADA y cómo me afecta su (in)seguridad?
¿Qué es SCADA y cómo me afecta su (in)seguridad?
 
Producción del largometraje pequeñas voces
Producción del largometraje pequeñas vocesProducción del largometraje pequeñas voces
Producción del largometraje pequeñas voces
 
Conferencia: Aplicaciones y el reto del desarrollo móvil
Conferencia: Aplicaciones y el reto del desarrollo móvilConferencia: Aplicaciones y el reto del desarrollo móvil
Conferencia: Aplicaciones y el reto del desarrollo móvil
 
Liminal Bluevia 1
Liminal Bluevia 1Liminal Bluevia 1
Liminal Bluevia 1
 
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel ContrerasComo sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
 
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel ContrerasComo sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
Como sería un viaje a la velocidad de la luz - Miguel Ángel Contreras
 
X taller bluevialiminal
X taller bluevialiminalX taller bluevialiminal
X taller bluevialiminal
 
X liminal buevia 2 (dllo.)-taller
X liminal buevia 2 (dllo.)-tallerX liminal buevia 2 (dllo.)-taller
X liminal buevia 2 (dllo.)-taller
 
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1X elalgoritmodelamemoria maria juliana soto (social media) (1) 1
X elalgoritmodelamemoria maria juliana soto (social media) (1) 1
 
Theremin Alfredo Vargas
Theremin Alfredo Vargas Theremin Alfredo Vargas
Theremin Alfredo Vargas
 
Sonido y cine Ricardo Escallon
Sonido y cine Ricardo Escallon Sonido y cine Ricardo Escallon
Sonido y cine Ricardo Escallon
 
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautista
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés BautistaPhotoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautista
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Bautista
 
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonseca
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés FonsecaPhotoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonseca
Photoshop para fotógrafos. Del cuarto oscuro al cuarto digital - Andrés Fonseca
 
Aseguramiento de Vulnerabilidades Web con tecnologías OWASP
Aseguramiento de Vulnerabilidades Web con tecnologías OWASPAseguramiento de Vulnerabilidades Web con tecnologías OWASP
Aseguramiento de Vulnerabilidades Web con tecnologías OWASP
 
Mundos virtuales inmersivos y social shopping
Mundos virtuales inmersivos y social shopping Mundos virtuales inmersivos y social shopping
Mundos virtuales inmersivos y social shopping
 
Creación transmediática y comunidades en práctica
Creación transmediática y comunidades en prácticaCreación transmediática y comunidades en práctica
Creación transmediática y comunidades en práctica
 
Android+Arduino
Android+ArduinoAndroid+Arduino
Android+Arduino
 
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...Implementación de Cloud Computing con Software Libre y medidas de seguridad p...
Implementación de Cloud Computing con Software Libre y medidas de seguridad p...
 
Linux en caja
Linux en cajaLinux en caja
Linux en caja
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Campus jueves

  • 1. Alvaro Ferro CCSP – CISSP – CCIE Security Written 30de Junio. SECURITY IN THE DATACENTER
  • 2. Data Center Virtualization Trends Security in virtual environment Challenges due to Virtualization Secure Virtualization Framework Virtual Controller and Virtual Management Center Agenda 30 June 2011 2
  • 3. Data Center Virtualization Trends vController+vFW and vMC
  • 4.
  • 5. Source: Gartner, Oct 200950% ~ 58 million deployed x86 machines 16% 2010 2011 2012 30 June 2011 4
  • 6. Do more with less Connect everyone to everything Present & Future Past Efficiency Drives Consolidation Virtualization, Blades, Increased Bandwidth Dispersed, Physical New Apps, Protocols & Traffic Legacy + Web, IPv4 + IPv6, Data + Voice + Video Legacy, Client Server, IPv4, Data Data Center Trends Threat Landscape Change Sophisticated Targeted Attacks, Re-Perimeterization Worms, Viruses, Trojans, DDoS 30 June 2011 5
  • 7. Securing the Data Center Attack Surface Data at Rest Attack Surface Attack Traffic Web Apps Vulnerability Scanning Protects Web App Vulnerabilities Enterprise Apps IPS Platform Operating Systems Network Devices 30 June 2011 6
  • 8. Security in virtual environment 30 June 2011 7
  • 9. ENTENDAMOS LO SIGUIENTE “40% de los proyectos de implementación de ambientes virtualizados se llevaron a cabo sin la participación del equipo de seguridad en la arquitectura inicial y las etapas de planificación ” Riesgos mas comunes en proyectos de Virtualización La falta de visibilidad y controles en la comunicación entre VM-a-VM. Perdida potencial en la separación de deberes (SOD) entre las áreas de redes y seguridad cuando se virtualiza. Cargas de trabajo se consolidan en un servidor físico. Controles de acceso administrativo (Hypervisor/VMM). Source: MacDonald, Neal. Addressing the Most Common Security Risks in Data Center Virtualization Projects, Gartner, Inc. January 25, 2010
  • 10.
  • 11.
  • 12. Utilice programas de protección para Zeroday
  • 13. Convergencia en soluciones IPS (virtual & physical) para la segmentación de zonas de confianzasCore Virtualized Server VM VM VM Secure Network Fabric Switch App App App OS OS OS vNICs vNICs vNICs vSwitch Hypervisor pNICs Virtualized Servers Physical Servers
  • 14.
  • 15. Plataforma IPS con VLAN translation
  • 18.
  • 19. Active la amenaza de bloqueo-para el centro de datos virtual
  • 20. Coherente política de seguridad & cumplimiento-entre el centro de datos virtuales y físicos
  • 21. Full aislamiento de seguridad VM- desde maquinas virtuales y hosts
  • 22.
  • 23. Seguridad para VMs (Móvil)- seguridad sigue VMs
  • 24. Cobertura de amenazas de DVLabs– la mejor cobertura disponibleTIPPINGPOINT vCONTROLLER
  • 27. Challenges Due to Virtualization vController+vFW and vMC
  • 28.
  • 29. Can’t be secured with virtual IPS
  • 30.
  • 31.
  • 32. Traffic does not enter the physical network for inspection
  • 33.
  • 34. Physical IPS options are cost prohibitive for these uses1 IPS Platform 2 Top of Rack Switch 3 2 Virtualized Host Virtualized Host Virtualized Host 3 4 1 VM VM VM VM VM VM OS OS OS OS OS OS App App App App App App VMs moved to separate site 4 The Virtual Network Visibility Gap 30 June 2011 15
  • 35. Secure Virtualization Framework, VController and vMC vController+vFW and vMC
  • 36.
  • 37. Virtual Controller + Virtual Firewall (vController+vFW)
  • 38.
  • 39.
  • 41. Host servers and operating systems
  • 42. Enterprise and Web applications
  • 43.
  • 44. Protects VMs with out-of-date patching due to server/VM shut-downsSingle Set of Security Policies across Physical and Virtual DC TippingPoint IPS Top of Rack Switch Virtualized Hosts Physical Hosts Protect the High Value Data Center 30 June 2011 18
  • 45.
  • 46.
  • 47.
  • 49. Physical host to physical host traffic
  • 50. Physical host to VM traffic
  • 51.
  • 52. Untrusted VMs or zonesSingle Set of Security Policies for Entire DC Protection VMware vCenter Management Network Top of Rack Switch Virtualized Host Hypervisor vSwitch VMsafe Kernel Module Redirect Policy vController + vFW OS OS OS OS App App App App Application VMs Service VM Apply Security Policies Between DC Trust Zones 30 June 2011 20
  • 53. VMware VMSafe Hypervisor Integration vController is fully integrated with VMware vSphere using the VMSafe API VMware vCenter Integration VMC is fully integrated with VMware’s vCenter management console Member of VMware Global Technology Alliance Partner (TAP) Program Certified per “VMware Ready” Program Supports VmwarevShere 4 (ESX / ESXi4) VmWARE Ready 30 June 2011 21
  • 54. N-Platform IPS Top of Rack Switch Physical Finance Servers Physical R&D Servers Distributed vSwitch vController+vFW vController+vFW vController+vFW Finance Zone DMZ Zone R&D Zone OS OS OS OS OS OS OS OS OS OS OS OS App App App App App App App App App App App App Virtualized Servers Cluster Single security model for the physical AND virtual data center Data Center Security 30 June 2011 22
  • 55. Q&A

Editor's Notes

  1. Slide 1:Hello, my name is ________________ and I am ___________________ for HP Networking’s security business unit. And today I’d like to talk to you about HP TippingPoint’s new Virtual Controller plus Virtual Firewall and our Virtual Management Center.  
  2. Slide 2:Specifically, I’ll go through:The Data Center Virtualization Trends that we seeChallenges enterprise organization face due to VirtualizationPresent HP TippingPoint’s Secure Virtualization Framework, andOur new Virtual Controller plus Virtual Firewall, and Virtual Management Center products
  3. Slide 3:So first let’s look at today’s data center virtualization trends.  
  4. Slide 4:First let’s look at the increased IT focus on data center virtualization. Gartner conducted a CIO survey in early 2010 and found that the #1 technology priority for CIO’s is data center virtualization. This is a huge change given that virtualization wasn’t even on the list 2 years previously and it has displaced business intelligence which held the top spot for the last 5 years. But, it’s not just security of virtualization CIO’s are concerned about. They are interested in the business benefits of virtualization, ensuring their existing processes and procedures work with a virtualized environment, ensuing they are properly securing these virtual environments, and that they are maintaining the necessary separation of duties within IT. Second, in late 2009 Gartner estimated that 50% of enterprise workloads would be running on virtualized infrastructure by the end of 2012. This is again a huge increase from the 16% that were running on virtualized infrastructure at the beginning of 2010.  
  5. Slide 5:Next, let’s look how enterprise data centers are changing. In the past enterprises built out data centers in an effort to connect everyone in the organization to the applications and data they required. But in most companies the result was a dispersed data center infrastructure. Now the need to reduce costs and improve data center efficiency is driving a physical consolidation of the data center. Companies are simply trying to do more with less. And tools like virtualization software, and higher density blade servers are helping to drive this consolidation. All of this is resulting in higher bandwidth in these data centers. [Build 1]In addition, new applications, new protocols and new traffic types are all appearing in the data center. An increase in web applications, voice and video traffic and even IPv6 protocols are changing the data center environment from a security perspective. [Build 2]Finally, the threat landscape outside the data center is changing. Threats are now more sophisticated, targeted and mostly financially motivated. And because of this companies no longer rely on a single security perimeter around the enterprise network. Companies are now building separate security perimeters around individual assets in the network like the data center. This is a trend often referred to as Re-Perimeterization.  
  6. Slide 6:Now let’s look at what it takes to actually secure the data center and protect the entire Attack Surface of the data center. There are several components in today’s data center attack surface, each of which has vulnerabilities that we must protect.We have to prevent attacks on Network Device vulnerabilities,Vulnerabilities in Operating Systems running within the data center,Vulnerabilities in Enterprise Applications running within the data center, andEven vulnerabilities in Web Applications running within the data center. Fortunately, this is exactly what the Intrusion Prevention System or IPS is designed to accomplish. [Build 1]In fact, most people don’t even realize that that the HP TippingPoint IPS can be used to protect Web Application Vulnerabilities. [Build 2]Finally, when combined with vulnerability scanners, customers can scan the entire data center attack surface, identify all of the vulnerabilities that exist, and then ensure that the IPS protection profiles are configured to protect those vulnerabilities. So at the end of the day, the IPS is the best way to protect the entire data center attack surface.  
  7. Slide 7:Now let’s look at the security challenges posed by the implementation of virtualization in the data center.  
  8. Slide 8:There are several areas that security professionals are concerned about when it comes to securing the data center and specifically virtualized data center infrastructure. First is the introduction of the Hypervisor into the data center. The hypervisor becomes a mission critical component in the data center and is now also a new part of the data center attack surface that we must protect. Second companies need to be able to inspect traffic moving between one physical host and another to prevent one compromised host from attacking another. Third, we must also be able to inspect traffic moving from one Virtual Machine or VM to another VM, even if the VMs are on the same virtualized host. And fourth, virtualization makes it very easy for a VM and its applications to move from one physical host to another, to another within the data center. So we have to ensure that the security posture for that VM stays the same no matter where the VM moves within the data center.  
  9. Slide 9:Now let’s look at the HP TippingPoint Secure Virtualization Framework and how we address these virtualization challenges.  
  10. Slide 10:HP TippingPoint introduced the Secure Virtualization Framework in the spring of 2010. It is a combination of products designed to secure the entire data center including virtualized data center infrastructure, and it consists of 3 different products:The physical IPS Platform shown here hung off the Core SwitchThe Virtual Controller plus Virtual Firewall or vController+vFW, shown here installed on a virtualized hostAnd the Virtual Management Center or VMC shown here installed on a virtualized host on the management network The one point I want to make about the Secure Virtualization Framework, and I will emphasize this point in several places during this presentation, it that it is all about giving our customers a “Single Security Model for Securing Both the Physical and Virtualized Data Center”. So let’s now look at the Secure Virtualization Framework in more detail.
  11. Slide 11:So the first thing we do is install the HP TippingPoint IPS at the perimeter of the data center as shown here. Not the perimeter of the network, but at the perimeter of the data center, isolating the data center from the rest of the network and the outside world. What we’re showing here is the IPS installed at the perimeter of a simple data center with both physical hosts and virtualized hosts, a top of rack switch and a core switch, which could also be a distribution switch. This gives us the ability to inspect all traffic moving into and out of the data center effectively segmenting the data center for the rest of the network. This is also where we protect the entire Data Center Attack Surface that we discussed earlier from outside attacks including attacks on vulnerabilities in the virtualization software or hypervisor and even virtual desktop infrastructure. This is also where our Virtual Patching concept comes in. HP TippingPoint has always been focused on providing vulnerability filters in our IPS to prevent attacks on entire vulnerabilities as opposed to individual exploits, and so once you enable our vulnerability filters on the IPS it is like having all of the systems in the data center fully patched against the latest vulnerabilities or in essence having a “Virtual Patch” in place. In fact, in many cases we have protection for undisclosed vulnerabilities well before the software vendor discloses the vulnerability or makes a patch available to the public. So with this step we have a single set of security polices at the perimeter protecting both the physical and virtual data center assets.  
  12. Slide 12:Next we need to visualize or discover the entire virtualized infrastructure and deploy the vController+vFW on each of the discovered virtualized hosts. [Build 1]The first step is the simple installation of the Virtual Management Center or vMC on a stand-alone server or virtual machine. In fact, it can be installed in a VM on the same server hosting VMware’s vCenter. Once vMC is installed on the Management Network it communicates with the VMware vCenter which is the VMware management console. [Build 2]At that point the vMC is able to auto-discover the entire virtualized data center including providing real-time visibility of every virtualized host, and every virtual machine on each host. In addition, it provides a logical overview of the network topology showing how all of the virtual machines are interconnected in the data center. This allows customers to get their hands around the entire virtual data center so they can easily start to visualize and control VM sprawl and can identify mis-configurations in the virtual network as well. [Build 3]Once vMC identifies all of the virtualized hosts, it can be used to auto-deploy a vController+vFW installation on each of the virtualized hosts. There is a single instance of vController installed on each virtualized host regardless of how many virtual machines are running on each host.
  13. Slide 13:Now at this point we have all the pieces of the Secure Virtualization Framework in place. In the graphic here on the right, you can see the physical IPS installed at the perimeter, the vMC installed on the management network, and the vController+vFW installed in the Service VM on this exploded view of one of the virtualized hosts in the data center. Again, there is only a single installation of vController+vFW on each virtualized host. It is installed in the Service VM and plugs into the VMware hypervisor via the VMware VMsafe API. Once in place the vController+vFW essentially introduces a “firewall like policy ” into the hypervisor. Basically, vController+vFW can see all traffic coming from any of the application VMs on the virtualized host and allows us to apply a policy that allows us to do 3 things:First, is the traffic permitted or not? If it is allowed the traffic is allowed to pass.Second, if the traffic is not allowed, we can block it outright at the hypervisor level with the vFW capability.And third, if the traffic is permitted, should it be inspected? If we want to inspect the traffic, the vController redirects the traffic via a dedicated VLAN to the physical IPS for inspection. The IPS inspects the traffic, blocks any malicious content, and then passes the inspected traffic back to the vController via a dedicated VLAN where vController then directs the traffic to its original destination. So now we can completely enforce our security policies in the both the physical and virtual data center. This includes the ability to inspect:Traffic coming into and going out of the data center at the perimeter,Traffic between physical hosts in the data center,Traffic between physical host and VMs, and evenTraffic between two VMs on the same virtualized host. And because every vController+vFW in the data center has all of our security redirection policies, we have the same security posture in place for each VM or application no matter where it moves in the data center. We now have a single set of security policies and for the entire data center including the ability to enforce those policies in both the physical and virtual data center. 
  14. Slide 14:The components of our Secure Virtualization Framework are VMware certified per the VMware Ready program. First, the vController+vFW is fully integrated with the VMware hypervisor via the VMsafe API.Second, the vMC is fully integrated with the VMware management console vCenter. I should however mention that currently our solution is only compatible with the VMware virtualization solution, and not with Microsoft’s Hyper-V or with Citrix solutions.
  15. Slide 15:So in conclusion, the Secure Virtualization Framework gives us the ability to deliver a single security model for the physical and virtual data center. We can use our physical IPS Platform to segment different physical trust zones in the network. For example, companies may want to require inspection for all traffic between their R&D applications and their Finance applications. This is easily accomplished by routing the traffic through the physical IPS Platform. But now, we can enforce the same security policies in the virtualized data center. We can completely segment or enforce inspection between the R&D applications and Finance applications even when those applications are running on VMs on the same virtualized host. 
  16. Slide 16:Thank you for your time today. May I answer any questions you have?