Enviar pesquisa
Carregar
Security Challenges in the Virtualized World IBM Virtual Server Protection for VMware
•
0 gostou
•
942 visualizações
Digicomp Academy AG
Seguir
Educação
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 38
Baixar agora
Baixar para ler offline
Recomendados
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
IBM India Smarter Computing
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
UNIT4 IT Solutions
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
HyTrust
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
HyTrust
E Vm Virtualization
E Vm Virtualization
Arturo Saavedra
VMware View 4
VMware View 4
netlogix
Recomendados
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
IBM India Smarter Computing
Ibm security virtual server protection
Ibm security virtual server protection
E-Government Center Moldova
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
UNIT4 IT Solutions
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
HyTrust
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
HyTrust
E Vm Virtualization
E Vm Virtualization
Arturo Saavedra
VMware View 4
VMware View 4
netlogix
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
IBM Danmark
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
EMCTechMktg
LotusLive Engage Security whitepaper: Why is security a competitive different...
LotusLive Engage Security whitepaper: Why is security a competitive different...
IBM
Stream 1 - Cloud Computing
Stream 1 - Cloud Computing
IBM Business Insight
Telesemana ce nominum:mef
Telesemana ce nominum:mef
Rafael Junquera
Enabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to IT
CA Nimsoft
VDI Monitoring
VDI Monitoring
krajav
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Lumension
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
Chris Pepin
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Arrow ECS UK
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Xenesys
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
bgalusha
Im cloud workshop denver 2
Im cloud workshop denver 2
David Stephens
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
Advanced Logic Industries
Smarter Computing: Expert Integrated System
Smarter Computing: Expert Integrated System
IBM Danmark
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Droidcon Berlin
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
Novell
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
CCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized Infrastructures
Thomas Gross
Mais conteúdo relacionado
Mais procurados
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
IBM Danmark
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
EMCTechMktg
LotusLive Engage Security whitepaper: Why is security a competitive different...
LotusLive Engage Security whitepaper: Why is security a competitive different...
IBM
Stream 1 - Cloud Computing
Stream 1 - Cloud Computing
IBM Business Insight
Telesemana ce nominum:mef
Telesemana ce nominum:mef
Rafael Junquera
Enabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to IT
CA Nimsoft
VDI Monitoring
VDI Monitoring
krajav
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Lumension
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
Chris Pepin
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Arrow ECS UK
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Xenesys
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
bgalusha
Im cloud workshop denver 2
Im cloud workshop denver 2
David Stephens
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
Advanced Logic Industries
Smarter Computing: Expert Integrated System
Smarter Computing: Expert Integrated System
IBM Danmark
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Droidcon Berlin
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
Novell
Mais procurados
(20)
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
VMworld 2012 - Spotlight Session - EMC Transforms IT - Jeremy Burton
LotusLive Engage Security whitepaper: Why is security a competitive different...
LotusLive Engage Security whitepaper: Why is security a competitive different...
Stream 1 - Cloud Computing
Stream 1 - Cloud Computing
Telesemana ce nominum:mef
Telesemana ce nominum:mef
Enabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to IT
VDI Monitoring
VDI Monitoring
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
Im cloud workshop denver 2
Im cloud workshop denver 2
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
Smarter Computing: Expert Integrated System
Smarter Computing: Expert Integrated System
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
Semelhante a Security Challenges in the Virtualized World IBM Virtual Server Protection for VMware
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
CCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized Infrastructures
Thomas Gross
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
Security in a Virtualised Environment
Security in a Virtualised Environment
Peter Wood
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 final
Abhed
Trend micro v2
Trend micro v2
JD Sherry
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
bjhutt
Cloud Computing and VCE
Cloud Computing and VCE
Cenk Ersoy
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
IBM Worklight-Overview
IBM Worklight-Overview
IBM WebSphereIndia
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
EMC Forum India
EMC Forum Track Introductions
EMC Forum Track Introductions
EMC Forum India
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
bjhutt
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
Nextel S.A.
Keeping IT Real Webinar
Keeping IT Real Webinar
johnworthington
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy Webinar
ITSM Academy, Inc.
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
ITband
POWER VM with IBM i and live partition mobility
POWER VM with IBM i and live partition mobility
COMMON Europe
Semelhante a Security Challenges in the Virtualized World IBM Virtual Server Protection for VMware
(20)
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
CCSW’12: Automated Verification of Virtualized Infrastructures
CCSW’12: Automated Verification of Virtualized Infrastructures
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Security in a Virtualised Environment
Security in a Virtualised Environment
Ibm virtualization techday v2.0 final
Ibm virtualization techday v2.0 final
Trend micro v2
Trend micro v2
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
Cloud Computing and VCE
Cloud Computing and VCE
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IBM Worklight-Overview
IBM Worklight-Overview
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
EMC Forum Track Introductions
EMC Forum Track Introductions
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
Keeping IT Real Webinar
Keeping IT Real Webinar
ITIL Virtualization - ITSM Academy Webinar
ITIL Virtualization - ITSM Academy Webinar
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
POWER VM with IBM i and live partition mobility
POWER VM with IBM i and live partition mobility
Mais de Digicomp Academy AG
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Digicomp Academy AG
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Digicomp Academy AG
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
Digicomp Academy AG
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Digicomp Academy AG
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
Digicomp Academy AG
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
Digicomp Academy AG
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Digicomp Academy AG
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
Digicomp Academy AG
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
Digicomp Academy AG
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Digicomp Academy AG
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Digicomp Academy AG
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Digicomp Academy AG
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Digicomp Academy AG
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
Digicomp Academy AG
Minenfeld IPv6
Minenfeld IPv6
Digicomp Academy AG
Was ist design thinking
Was ist design thinking
Digicomp Academy AG
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
Digicomp Academy AG
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Digicomp Academy AG
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Digicomp Academy AG
General data protection regulation-slides
General data protection regulation-slides
Digicomp Academy AG
Mais de Digicomp Academy AG
(20)
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
Minenfeld IPv6
Minenfeld IPv6
Was ist design thinking
Was ist design thinking
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
General data protection regulation-slides
General data protection regulation-slides
Último
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Celine George
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
MaryGraceBautista27
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
SpandanaRallapalli
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
phamnguyenenglishnb
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Celine George
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Carlos105
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Celine George
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Sabitha Banu
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
nelietumpap1
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
ChelloAnnAsuncion2
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
MiaBumagat1
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
JoshuaGantuangco2
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
JhezDiaz1
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
SamikshaHamane
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
iammrhaywood
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
nelietumpap1
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
Ashokrao Mane college of Pharmacy Peth-Vadgaon
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
thorishapillay1
Último
(20)
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Security Challenges in the Virtualized World IBM Virtual Server Protection for VMware
1.
1 1 0 . 0 3 .
IBM Virtual Server Protection 2 0 1 1 Security Challenges in the Virtualized World IBM Virtual Server Protection for VMware Peter Rossi, IBM Senior Security Specialist © 2009 IBM Corporation
2.
Agenda ■
IBM Security Framework ■ Security Challenges in the Virtualized World –Vulnerability examples ■ IBM Virtual Server Protection for VMware 2 10.03.2011 © 2011 IBM Corporation
3.
IBM Security Framework 3
10.03.2011 © 2011 IBM Corporation
4.
IBM delivers a
new approach to Security Management IBM's approach is to strategically IBM's approach is to strategically manage risk end-to end across all manage risk end-to end across all risk areas within an organization. risk areas within an organization. 4 10.03.2011 © 2011 IBM Corporation
5.
IBM Security Framework
Give the right users access to the right resources at the right time Protect sensitive business data Keep applications available and protected from malicious or fraudulent use. Optimize service availability by mitigating risks Provide actionable intelligence & improve physical infrastructure security 5 10.03.2011 © 2011 IBM Corporation
6.
IBM Tivoli Security
Focus Areas Trusting Managing Securing Protecting Identities Access Services Data IBM Payroll HCR U6 IBM Online banking E Customers, partners, RC FO EN L IC Y employees (known) PO IBM is #1 in this space Loan applications Retail sales Criminals, competitors, hackers (unknown) Inventory IBM is #1 in this space Manage those you know. Protect against those you don’t. COMPLIANCE IBM is #1 in this space Prove that you’re in control. 6 10.03.2011 © 2011 IBM Corporation
7.
Security Challenges in
the Virtualized World 7 10.03.2011 © 2011 IBM Corporation
8.
Server and Network
Convergence 8 10.03.2011 © 2011 IBM Corporation
9.
Security Challenges with
Virtualization: What is the Impact to Overall Security Posture? 9 10.03.2011 © 2011 IBM Corporation
10.
Security Challenges with
Virtualization: New Risks Traditional Threats Traditional threats can attack New threats to VM VMs just like real systems environments Virtual server sprawl —————————— Dynamic state —————————— Dynamic relocation Management Vulnerabilities —————————— Secure storage of VMs and the management data Resource sharing —————————— —————————— Requires new Single point of failure skill sets —————————— —————————— Loss of visibility Insider threat Stealth rootkits in hardware MORE COMPONENTS = MORE EXPOSURE 10 10.03.2011 © 2011 IBM Corporation
11.
The Importance of
Virtualization System Security ■ Businesses are increasingly relying on virtualization technology ■ In Q4 2009, 18.2% of servers shipped were virtualized1 – 20% increase over 15.2% shipped in Q4 2008 ■ Growing interest in cloud computing will fuel further demand ■ Vulnerability disclosures have grown as interest has grown 1Source: IDC 11 10.03.2011 © 2011 IBM Corporation
12.
The Risk Imposed
by Virtualization System Vulnerabilities ■ Disclosed vulnerabilities pose a significant security risk ■ 40% of all reported vulnerabilities have high severity – Tend to be easy to exploit, provide full control over attacked system ■ Exploits have been publically disclosed for 14% of vulnerabilities 12 10.03.2011 © 2011 IBM Corporation
13.
Vendor Disclosures Include
Some Surprising Results ■ Low percentages for Oracle, IBM, and Microsoft VMware: 80.9% RedHat: 6.9% Citrix: 5.8% Oracle: 1.8% IBM: 1.1% Microsoft: 0.9% 13 10.03.2011 © 2011 IBM Corporation
14.
Virtualization System Vulnerability
Classes ■ Vulnerabilities can be classified by what they affect Virtualiza o n Server Guest VM Users 5 System Administrators Virtualization System Admin Guest Guest VM VM VM Hypervisor 1 Hardware 2 3 4 6 Management Console Management Server 14 10.03.2011 © 2011 IBM Corporation
15.
Virtualization System Vulnerability
Classes ■ 1. Management console vulnerabilities –Affect the management console host –Can provide platform or information allowing attack of management server –Can occur in custom consoles or web applications ■ 2. Management server vulnerabilities –Potential to compromise virtualization system configuration –Can provide platform from which to attack administrative VM ■ 3. Administrative VM vulnerabilities –Compromises system configuration –In some systems (like Xen), equivalent to a hypervisor vulnerability in that all guest VMs may be compromised –Can provide platform from which to attack hypervisor and guest VMs 15 10.03.2011 © 2011 IBM Corporation
16.
Virtualization System Vulnerability
Classes ■ 4. Hypervisor vulnerabilities –Compromise all guest VMs –Cannot be exploited from guest VMs ■ 5. Guest VM vulnerabilities –Affect a single VM –Can provide platform from which to attack administrative VM, hypervisor, and other guest VMs ■ 6. Hypervisor escape vulnerabilities –A type of hypervisor vulnerability –Classified separately because of their importance –Allow a guest VM user to “escape” from own VM to attack other VMs or hypervisor –Violate assumption of isolation of guest VMs 16 10.03.2011 © 2011 IBM Corporation
17.
Virtualization System Vulnerability
Examples ■ Management console –CVE-2009-2277: A cross-site scripting vulnerability in a VMware web console allows remote attackers to steal cookie-based authentication credentials ■ Management server –CVE-2008-4281: VMware VirtualCenter management server can allow a local attacker to use directory traversal sequences to gain elevated privileges ■ Administrative VM –CVE-2008-2097: A buffer overflow in a VMWare management service running in the administrative VM could allow remote authenticated users to gain root privileges 17 10.03.2011 © 2011 IBM Corporation
18.
Virtualization System Vulnerability
Examples ■ Guest VM –CVE-2009-2267: A bug in the handling of page fault exceptions in VMware ESX Server could allow a guest VM user to gain kernel mode execution privileges in the guest VM ■ Hypervisor –CVE-2010-2070: By modifying the processor status register, a local attacker can cause the Xen kernel to crash ■ Hypervisor escape –CVE-2009-1244: An error in the virtual machine display function on VMware ESX Server allows an attacker in a guest VM to execute arbitrary code in the hypervisor 18 10.03.2011 © 2011 IBM Corporation
19.
Production Virtualization System
Vulnerabilities By Class Hypervisor (1.3%) Indeterminate (6.3%) Mgmt Server (6.3%) Hypervisor Guest VM (15.0%) escape (37.5%) Mgmt console (16.3%) Admin VM (17.5%) 19 10.03.2011 © 2011 IBM Corporation
20.
Gartner’s Perspective on
Secure Virtualization “IBM has the first commercial implementation of a rootkit detection/prevention offering that works from outside of the virtual machine it is protecting...” -Neil MacDonald, Gartner Neil MacDonald, Gartner 20 10.03.2011 © 2011 IBM Corporation
21.
IBM Virtual Server
Protection for VMware 21 10.03.2011 © 2011 IBM Corporation
22.
Virtualization Security Solutions
Existing solutions Threat protection Integrated virtual certified for protection of delivered in a virtual form- environment-aware threat virtual workloads factor protection ■ Firewall § Firewall § Firewall ■ Intrusion Prevention § Intrusion Prevention § Intrusion Prevention ■ System auditing § Virtual network segment § Virtual host protection and ■ File integrity monitoring protection/policy network policy enforcement ■ Anti-malware enforcement § Network access control ■ Security configuration Mgmt § Virtual infrastructure monitoring 22 10.03.2011 © 2011 IBM Corporation
23.
Integrated Security ■
Non-intrusive o No reconfiguration of the virtual network SiteProtector o No presence in the guest OS Management ■ Less management overhead o One Security Virtual Machine (SVM) per physical server Management SVM VM VM o 1:many protection-to-VM ratio Policy Applications Response Applications Applications ■ Automated Engines o Privileged presence gives SVM holistic view of OS Hardened OS OS the virtual network OS o Protection automatically applied as VM comes Kernel Kernel Kernel Kernel online VMsafe ■ Lower overhead o Eliminates redundant processing tasks Hypervisor ■ Protection for any guest OS Hardware 23 10.03.2011 IBM Confidential © 2011 IBM Corporation
24.
IBM Confien al
d IBM Virtual Server Protection for VMware Integrated threat protection for VMware vSphere 4 Helps customers to be more secure, compliant and cost-effective by delivering integrated and optimized security for virtual data centers. SiteProtector Management Benefits ■ Vulnerability-centric, protocol-aware analysis and protection ■ Abstraction from underlying network configuration ■ Automated protection for new VMs ■ Network-level workload segmentation ■ Privileged-level protection of OS kernel structures 24 10.03.2011 © 2011 IBM Corporation
25.
Our Protocol Analysis
Module is the engine behind our products Intrusion prevention just got smarter with extensible protection backed by the power of X-Force Client-Side Application Web Application Threat Detection & Virtual Patch Data Security Application Control Protection Protection Prevention What It Does: What It Does: What It Does: What It Does: What It Does: What It Does: Shields vulnerabilities Protects end users Protects web applications Detects and prevents Monitors and identifies Manages control of from exploitation against attacks targeting against sophisticated entire classes of threats unencrypted personally unauthorized applications independent of a applications used application-level attacks as opposed to a specific identifiable information and risks within defined software patch, and everyday such as such as SQL Injection, exploit or vulnerability. (PII) and other segments of the network, enables a responsible Microsoft Office, Adobe XSS (Cross-site confidential information such as ActiveX patch management PDF, Multimedia files and scripting), PHP file- Why Important: for data awareness. Also fingerprinting, Peer To process that can be Web browsers. includes, CSRF (Cross- Eliminates need of provides capability to Peer, Instant Messaging, adhered to without fear of site request forgery). constant signature explore data flow through and tunneling. a breach Why Important: updates. Protection the network to help At the end of 2009, Why Important: includes the proprietary determine if any potential Why Important: Why Important: vulnerabilities, which Expands security Shellcode Heuristics risks exist. Enforces network At the end of affect personal capabilities to meet both (SCH) technology, which application and service 2009, 52% of all computers, represent the compliance requirements has an unbeatable track Why Important: access based on vulnerabilities disclosed second-largest category and threat evolution. record of protecting Flexible and scalable corporate policy and during the year had no of vulnerability against zero day customized data search governance. vendor-supplied patches disclosures and vulnerabilities. criteria; serves as a available to remedy the represent about a fifth of complement to data vulnerability. all vulnerability security strategy. disclosures. 25 10.03.2011 © 2011 IBM Corporation
26.
IBM Confien al
d Automated Discovery/vNAC Features SiteProtector ■ Virtual network access Management control (VNAC) ■ Automated discovery SVM is notified The SVM reports to ■ Virtual Infrastructure as soon as a VM SiteProtector that a new comes online auditing integration VM is online and initiates a discovery scan. Benefits ■ Rogue VM protection ■ Virtual Infrastructure monitoring ■ Virtual network awareness ■ Quarantine or limit network access until VM security posture has been validated SVM limits network communications (quarantine group) until the VM is placed in a non-quarantine group 26 10.03.2011 © 2011 IBM Corporation
27.
Security Footprint Reduction
CPU-intensive “Lighter” agent used processing removed where guest OS from the guest OS and context is required ■ Security isolated in Security consolidated in SVM Virtual Machine ■ Less presence in guest OS equals: o improved stability o more CPU/memory available for workloads o decreased attack surface ■ Customer-defined thresholds for security resource usage ■ Over time, guest OS presence will be reduce to the absolute minimum 27 10.03.2011 © 2011 IBM Corporation
28.
Mobility (VMotion)
SiteProtector Management ■ Maintain security posture Abstraction from underlying irrespective of the physical server physical servers provides on which the VM resides dynamic security adapted for mobility 28 10.03.2011 © 2011 IBM Corporation
29.
Introspection-Based Rootkit Detection ■
Threat – Malware that embeds itself in the operating system to avoid detection ■ Functionality – Rootkit detection engine that uses memory introspection to identify modifications to key guest OS kernel data structures (SSDT & IDT) by malware 29 10.03.2011 © 2011 IBM Corporation
30.
Virtual Infrastructure Auditing ■
Threat – Virtual machine state change or migration that mixes trust zones ■ Functionality – Hooks into VMware management auditing to report events interesting from a security perspective 30 10.03.2011 © 2011 IBM Corporation
31.
VMsafe Network Packet
Inspection API Security Virtual Machine SlowPath Agent ■ vNetwork Data Path Agent DVFilter Library (FastPath Agent) VM VM – Installs as a kernel module and directly intercepts VMM VMM VMM packets in the virtual network packet stream ■ vNetwork Control Path Agent FastPath Agent (SlowPath Agent) FastPath – Resides in a security virtual Agent introspection appliance and can be used VMkernel for further thorough processing vswitch01 VMkernel Hardware Interface VMX parameters for SVM: ESX Server ethernet2.networkName = "ibm- vmwarenetwork-appliance" Physical Hardware VMX parameters for VM: ethernet0.filter0.name = "ibm-iss-vmkmod" VM network traffic ethernet0.filter0.onFailure = "failOpen" VMsafe introspection 31 10.03.2011 © 2011 IBM Corporation
32.
VMsafe CPU &
Memory API Security Virtual ■ Can inspect memory Machine locations and CPU registers VMsafe ■ Hypervisor Extension Library VM VM implemented as VMX/VMM V V M M modules s s VMM a VMM a VMM ■ VMsafe API Library on SVM f f e e ■ Capabilities – Detect current application state in the protected VMs CPU – Sense system VMkernel introspection configuration state from the control registers VMX parameters for SVM: VMkernel Hardware Interface ESX Server ethernet1.networkName = "ibm- vmwareintrospect-appliance" Physical VMX parameters for VM: Hardware vmsafe.enable = "true" vmsafe.agentAddress = "169.254.55.2" VM Memory/CPU calls VMsafe Vmsafe VMX/VMM extension vmsafe.agentPort = "49999" vmsafe.failOpen = "TRUE" VMsafe introspection 32 10.03.2011 © 2011 IBM Corporation
33.
IBM Virtual Server
Protection for VMware helps to meet compliance best practices 1. Configuration and change management processes should be extended to encompass the virtual infrastructure – Automatic discovery and protection as a VM comes online – Dashboard visibility into the virtual host OS and the virtual network to identify vulnerabilities. – IBM Virtual Patch® technology protects vulnerabilities on virtual servers regardless of patch strategy 2. Maintain separate administrative access control although server, network and security infrastructure is now consolidated – Virtual network access control • Quarantines or limits network access from a virtual server until VM security posture has been confirmed – Virtual Infrastructure auditing 3. Provide virtual machine and virtual network security segmentation – Network-level workload isolation 4. Maintain virtual audit logging – Virtual Infrastructure monitoring and reporting *Source: RSA Security Brief: Security Compliance in a Virtual World http://www.rsa.com/solutions/technology/secure/wp/10393_VIRT_BRF_0809.pdf 33 10.03.2011 © 2011 IBM Corporation
34.
IBM Virtual Server
Security for VMware helps customers to be more secure, compliant and cost-effective Integrated threat protection for the VMware vSphere 4 platform Helps meet regulatory compliance mandates by Protects and tracks providing security and access of critical data reporting functionality housed on virtual machines customized for the virtual infrastructure How we help your business Increases virtual Created for and server uptime and integrated with the availability with virtual virtual platform rootkit detection Increases ROI with dynamic VM security and discovery 34 10.03.2011 © 2011 IBM Corporation
35.
For more information
on IBM Virtualization Security Solutions White paper Virtualizations Security Solutions Web page (click the graphic) (click the graphic) http://www-935.ibm.com/services/us/iss/html/virtualization-security-solutions.html ftp://ftp.software.ibm.com/common/ssi/sa/wh/n/sew03016usen/SEW03016USEN.PDF Links work in slide show mode. 35 10.03.2011 © 2011 IBM Corporation
36.
Question?
Thank you! 36 10.03.2011 © 2011 IBM Corporation
37.
Trademarks and notes ■
IBM Corporation 2010 ■ IBM, the IBM logo, ibm.com, AIX, IBM Internet Security Systems, Proventia, Real Secure, SiteProtector, X-Force and Virtual Patch are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol (® or ™), these symbols indicate US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml ■ VMware, the VMware "boxes" logo and design, Virtual SMP and VMotion are registered trademarks or trademarks (the "Marks") of VMware, Inc. in the United States and/or other jurisdictions. ■ References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. ■ The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the reader may have to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. 37 10.03.2011 © 2011 IBM Corporation
38.
38
10.03.2011 © 2011 IBM Corporation
Baixar agora