SlideShare uma empresa Scribd logo
1 de 34
VMware vShield – Foundation for the Most 
Secure Cloud Deployments 
© 2009 VMware Inc. All rights reserved
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization – Key Security Enabler 
 vShield Products 
 Use Cases 
 Summary 
2 Confidential
Security Market Overview 
Segments We Address 
3 Confidential 
Market 
Size in 2012 
Endpoint Security 
Antivirus 
Security 
Operations 
Market Growth Rate 
Market Size($M) in 2009 
$27B Worldwide in 2009 
Anti-Virus 
$4,096 (7%) 
Application 
Security 
$2,987 (15%) 
Identity Mgmt 
$3,565(20%) 
Network Security 
$9,136 (8%) 
Data Security 
$3,258 (19%) 
Endpoint Security 
$3,001 
(2%) 
$713 
(8%) 
Source: FORRESTER, 2009 
Network 
Security 
Identity 
Management 
Others
Security and Compliance are the Primary Concerns with Cloud 
Virtualization forms the foundation for building 
private clouds. Security must change to 
support both. 
Public Cloud 
Internal IT 
 Rate Card 
 Hands-off 
 Self-service 
4 Confidential 
– Gartner, 2010 
? Security 
? Control 
? Compliance
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization – Key Security Enabler 
 vShield Products 
 Use Cases 
5 Confidential
6 Confidential 
• Limited control and visibility 
• Organizational confusion (VI, 
security, network) 
• Hindered IT compliance 
• Slow provisioning 
• Heightened risk exposures 
• VLAN sprawl 
• Gap between policy and 
enforcement 
• Manual re-implementation of 
security policies 
• Heightened risk exposures 
Security Challenges 
Traditional Security 
Expensive 
• Specialized hardware 
appliances 
• Multiple point solutions 
Rigid 
• Policy directly tied to 
implementation 
• Not virtualization and change-aware 
Effect 
Complex 
• Spaghetti of different rules and 
policies 
• Security “rationing” 
• Heightened risk exposures
The vShield Advantage: Increased Security 
Traditional Security vShield 
Complex 
• Spaghetti of different rules and 
policies 
7 Confidential 
Cost Effective 
• Single virtual appliance with 
breadth of functionality 
• Single framework for 
comprehensive protection 
Simple 
• No sprawl in rules, VLANs, agents 
• Relevant visibility for VI Admins, 
network and security teams 
• Simplified compliance 
Adaptive 
• Virtualization and change aware 
• Program once, execute everywhere 
• Rapid remediation 
Expensive 
• Specialized hardware 
appliances 
• Multiple point solutions 
Rigid 
• Policy directly tied to 
implementation 
• Not virtualization and change-aware 
Deployments on VMware are more secure than physical
VMware Transforms Security from Expensive to Cost Effective 
vShield eliminates the need for multiple special purpose 
 
hardware appliances – 3-5x Savings Capex, Opex 
Load balancer 
 
Firewall 
 
VPN 
 
Etc… vShield 
firewall 
VPN 
Load balancer 
Virtual 
Appliance 
8 Confidential
VMware Transforms Security from Complex… 
VLAN’s 
agent 
Complex 
• Policies, rules implementation - no clear separation of duties; 
organizational confusion 
• Many steps – configure network, firewall and vSphere 
• Spaghetti of VLANs, Sprawl - Firewall rules, agents 
9 Confidential 
Policies, 
Rules 
Network 
admin 
Security 
admin 
VI admin 
Overlapping 
Roles / 
Responsibilities 
Many steps. 
Configure 
•Network 
•Firewall 
•vSphere 
Define, Implement , 
Monitor, Refine, 
agent agent agent agent agent agent agent
… To Disruptively Simple 
Few steps: 
Configure 
vShield 
Define, Monitor, Refine, 
Implement 
Simple 
Network 
admin 
Security 
admin 
VI admin 
Clear separation 
of Roles / 
Responsibilities 
• Clear separation of duties 
• Few steps – configure vShield 
• Eliminate VLAN sprawl – vNIC firewalls 
• Eliminate firewall rules, agents sprawl 
10 Confidential
VMware Turns Security from Rigid… 
 BEFORE vShield 
• Security groups tied to 
physical servers 
• “Air gaps”, i.e. physical 
isolation, between security 
groups 
• VMs in a security group 
cannot be vMotioned to other 
hosts 
DMZ PCI compliant 
“Air gap” 
11 Confidential
….to Adaptive 
 AFTER vShield 
• Security groups becomes a 
VM construct rather than 
physical server construct 
• Security groups enforced with 
VM movement 
• Mix VMs from different 
groups on the same host 
DDMZZ PPCCII C Coommpplliianntt 
12 Confidential
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization – Key Security Enabler 
 vShield Products 
 Use cases 
 Summary 
13 Confidential
Why VMware vShield is a Security Enabler ? 
1. Unique introspection 
2. Policy abstraction 
Cost Effective 
• Single virtual appliance with breadth 
of functionality 
• Single framework for comprehensive 
protection 
Simple 
• No sprawl in rules, VLANs, agents 
• Relevant visibility for VI Admins, 
network and security teams 
• Simplified compliance 
14 Confidential 
Adaptive 
• Virtualization and change aware 
• Program once, execute everywhere 
• Rapid remediation
Security Enabler: Unique Introspection 
Introspect detailed VM state and VM-to-VM 
communications 
Processor 
vSphere + vShield 
 
 
memory 
 
Network 
15 Confidential 
Benefits 
• Comprehensive host and VM 
protection 
• Reduced configuration errors 
• Quick problem identification 
• Reduced complexity – no security 
agents per VM required
Security Enabler: Policy Abstraction 
Separate the policy definition from the policy 
Before 
vShield 
Policy tied to the 
physical host; 
lost during 
vMotion 
After 
vShield 
Policy tied to 
logical 
attributes 
implementation 
16 Confidential 
Benefits 
• Create and enforce security 
policies with live migration, 
automated VM load balancing 
and automated VM restart 
• Rapid provisioning of security 
policies 
• Easier compliance with 
continuous monitoring and 
comprehensive logging 
Policy tied to 
logical attributes; 
follow virtual 
machine
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization – Key Security Enabler 
 vShield Products 
 Use cases 
 Summary 
17 Confidential
2010 – Introducing vShield Products 
Securing the Private Cloud End to End: from the Edge to the Endpoint 
vShield Edge 1.0 
Edge 
Secure the edge of 
the virtual datacenter 
vShield App 1.0 and 
Zones 
Security Zone 
Application protection from 
network based threats 
18 Confidential 
vShield Endpoint 1.0 
Endpoint = VM 
Enables offloaded anti-virus 
Virtual Datacenter 1 Virtual Datacenter 2 
DMZ PCI 
compliant 
HIPAA 
compliant 
Web View 
VMware 
vShield 
VMware 
vShield 
VMware vShield Manager
vShield Edge 
Secure the Edge of the Virtual Data Center 
• Multiple edge security services in one appliance 
• Stateful inspection firewall 
• Network Address Translation (NAT) 
• Dynamic Host Configuration Protocol (DHCP) 
• Site to site VPN (IPsec) 
• Web Load Balancer 
• Network isolation(edge port group isolation) 
• Detailed network flow statistics for chargebacks, etc 
• Policy management through UI or REST APIs 
• Logging and auditing based on industry standard syslog 
format 
VMware 
vShield Edge 
VMware 
vShield Edge 
VMware 
vShield Edge 
19 Confidential 
Features 
Benefits 
• Lower cost and complexity by eliminating multiple 
special purpose appliances 
• Ensure policy enforcement with network isolation 
• Simplify management with vCenter integration and 
programmable interfaces 
• Easier scalability with one edge per org/tenant 
• Rapid provisioning of edge security services 
• Simplify IT compliance with detailed logging 
Tenant A Tenant C Tenant X 
Firewall Load balancer VPN 
Secure 
Virtual 
Appliance 
Secure 
Virtual 
Appliance 
Secure 
Virtual 
Appliance
vShield Lowers Cost of Security Significantly 
Cost per 
Mbps 
50$ 
45$ 
40$ 
35$ 
30$ 
25$ 
20$ 
15$ 
10$ 
5$ 
0$ 
Network edge security solution 
(Firewall + VPN + Load balancer) 
Security appliances 
.5Gbps 1Gbps 10Gbps 100Gbps 
Throughput 
20 Confidential 
vShield Edge 
>5x 
Assumptions 
• 100 VM per edge 
• vSphere & server costs 
• High availability 
Mbps = Megabits/sec 
Gbps = Gigabits/sec
vShield App 
Application Protection for Network Based Threats 
21 Confidential 
Features 
• Hypervisor-level firewall 
• Inbound, outbound connection control applied at 
vNIC level 
• Elastic security groups - “stretch” as virtual machines 
migrate to new hosts 
• Robust flow monitoring 
• Policy Management 
• Simple and business-relevant policies 
• Managed through UI or REST APIs 
• Logging and auditing based on industry standard 
syslog format
vShield App Provides Adaptive Security with Policy Abstraction 
DDMZZ PPCCII C Coommpplliianntt 
Security groups 
enforced with VM 
movement 
Policies based 
on logical 
attributes 
22 Confidential
vShield App 
Application Protection for Network Based Threats 
23 Confidential 
Features 
• Hypervisor-level firewall 
• Inbound, outbound connection control applied at 
vNIC level 
• Elastic security groups - “stretch” as virtual machines 
migrate to new hosts 
• Robust flow monitoring 
• Policy Management 
• Simple and business-relevant policies 
• Managed through UI or REST APIs 
• Logging and auditing based on industry standard 
syslog format 
Benefits 
• Increase visibility for inter-VM communications 
• Eliminate dedicated hardware and VLANs for 
different security groups 
• Optimize resource utilization while maintaining strict 
security 
• Simplified compliance with comprehensive logging of 
inter VM activity
vShield Endpoint 
Offload Anti-virus Processing for Endpoints 
• Eliminate anti-virus agents in each VM; anti-virus off-loaded 
• Enforce remediation using driver in VM 
• Policy and configuration Management: through UI or 
REST APIs 
• Logging and auditing 
24 Confidential 
Features 
to a security VM delivered by AV partners 
Benefits 
• Improve performance by offloading anti-virus functions in 
tandem with AV partners 
• Improve VM performance by eliminating anti-virus 
storms 
• Reduce risk by eliminating agents susceptible to attacks 
and enforced remediation 
• Satisfy audit requirements with detailed logging of AV 
tasks
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization - Key Security Enabler 
 vShield Products 
 Use cases 
 Summary 
25 Confidential
Service Provider - Offering Multi-Tenant Hosting Service 
Company A Company B Company C 
Company A Company B 
Company C 
• Host potentially hundreds or thousands of tenants in 
shared infrastructure with: 
• Traffic Isolation between the tenants 
• Complete protection and confidentiality of tenant 
apps and data 
• Integration with enterprise directory services (e.g. 
Active Directory) 
• Complying with various audit requirements 
26 Confidential 
Requirements 
Solution – vShield Edge, 
VMware Cloud Director 
• Guarantee full confidentiality and protection of tenant 
apps and data with built-in firewall and VPN 
• Use enterprise directory services for security policies 
• Accelerate compliance by logging all traffic information 
on per-tenant basis 
• Lower cost of security by 100+% by eliminating purpose 
built appliances and by increasing utilization and VM 
density 
Cisco VPN 
Juniper VPN 
Checkpoint VPN 
Vmware vCloud Director 
vShield 
Edge
Enterprise - Securing Business Critical Applications 
DMZ Development 
Finance 
Development Finance 
• Deploy production and development applications in a 
shared infrastructure with: 
• Traffic segmentation between applications 
• Authorized access to applications 
• Strict monitoring and enforcement of rules on inter- 
VM communications 
• Ability to maintain security policies with VM 
movement 
• Compliance to various audit requirements 
27 Confidential 
Requirements 
Solution - vShield App + Edge 
• Protect data and applications with hypervisor level 
firewall 
• Create and enforce security policies with virtual 
machine migration 
• Facilitate compliance by monitoring all application traffic 
• Improve performance and scalability with load balancer 
and software based solution 
VMware 
vShield App
Enterprise - Secure View Deployments 
Solution - vShield Endpoint+App+Edge 
• Improve performance by offloading AV processing 
• Reduce costs by freeing up virtual machine resources 
and eliminating agents 
• Improve security by streamlining AV functions to a 
hardened security virtual machine(SVM) 
• Protect View application servers from threats 
• Demonstrate compliance and satisfy audit requirements 
with detailed logging of offloaded AV tasks 
Public 
Network 
Private 
Network 
VMware 
vShield App 
28 Confidential 
Requirements 
• Support thousands of internal and external View users 
with: 
• Comprehensive security for View servers 
• Anti virus agents to protect client data and 
applications 
• Optimal performance and scalability 
DMZ View Desktops 
Remote User Local User
Agenda 
 Cloud Computing & Security 
 Security – State of the Market 
 Virtualization – Key Security Enabler 
 vShield Products 
 Use cases 
 Summary 
29 Confidential
vShield Edge 1.0 vs. vShield Zones 4.1 vs. vShield App 1.0 
30 Confidential
vShield Products 
Product SKUs List/VM SnS 
vShield Edge 1.0 $150 Standard Basic, Production 
vShield Endpoint 1.0 $50 Standard Basic, Production 
NA vSphere SnS applies 
$110 Standard Basic, Production 
$110 Standard Basic, Production 
Notes 
•VMware Cloud Director – Includes vShield Edge subset(Firewall, DHCP, NAT) 
•vShield App – Includes vShield Endpoint 
•VMware View 4.5 Premier SKUs – Include vShield Endpoint 1.0 
•All SKUs – Min 25-VM purchase 
31 
vShield Zones for vSphere 4.1 
(Included in vSphere Advanced and above) 
vShield App 1.0 (includes Endpoint 
and Zones) 
$150 
Standard Basic, Production 
Upgrade to full vShield Edge 1.0 from 
VMware Cloud Director 
Upgrade to vShield App 1.0 from 
vShield Endpoint 1.0 
31 Confidential
vShield Wins Best of VMworld 2010 
“VMware vShield marks a major improvement in security. It includes many 
essential features for virtualization security, and the ability to isolate traffic 
for different port groups is a highlight” 
32 Confidential
Quotes 
 “Definitely, the integration of vShield, offering application, network and end point 
security for the cloud, is a big step..” – CloudAve, Krishnan Subramanian 
 “The vision of moving legacy and new applications between public and private 
clouds necessitates a virtual security approach that surpasses static edge filtering 
commonly found in AV, IPS and firewalls.” – ComputerWorld, Eric Ogren 
 “You’ve got to hand it to VMware …..this week’s VMworld, the company announced 
the VMware vShield family of security products.” – Enterprise Strategy Group, Jon 
Oltsik 
 “vShield should help IT managers ensure that VMs can be protected and isolated in 
the virtual network with technology that is baked into the virtualization 
infrastructure.” – eWEEK, Cameron Sturdevant 
 “VMware has finally taken virtual machine security and added it through the entire 
virtualization stack.. The dark horse feature of this product? Load balancing. I tried 
it in the lab – it takes 30 seconds to set up load balancing. No more need for 
expensive F5’s – this could be a real game changer.” – Brandon Hahn 
33 Confidential
© 2009 VMware Inc. All rights reserved 
Thank You

Mais conteúdo relacionado

Mais procurados

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Hamza Malik
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1Chaing Ravuth
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 

Mais procurados (19)

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
Ccna4
Ccna4Ccna4
Ccna4
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 

Destaque

CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8Irsandi Hasan
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7Irsandi Hasan
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4Irsandi Hasan
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsAhmed Habib
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsAhmed Habib
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6Irsandi Hasan
 

Destaque (20)

ITE - Chapter 2
ITE - Chapter 2ITE - Chapter 2
ITE - Chapter 2
 
CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8CCNA Exploration 4 - Chapter 8
CCNA Exploration 4 - Chapter 8
 
CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7CCNA Exploration 4 - Chapter 7
CCNA Exploration 4 - Chapter 7
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA Security - Chapter 7
CCNA Security - Chapter 7CCNA Security - Chapter 7
CCNA Security - Chapter 7
 
CCNA Security - Chapter 4
CCNA Security - Chapter 4CCNA Security - Chapter 4
CCNA Security - Chapter 4
 
OSPF v3
OSPF v3OSPF v3
OSPF v3
 
ITE - Chapter 9
ITE - Chapter 9ITE - Chapter 9
ITE - Chapter 9
 
CCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentalsCCNA Security 09- ios firewall fundamentals
CCNA Security 09- ios firewall fundamentals
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
ITE - Chapter 7
ITE - Chapter 7ITE - Chapter 7
ITE - Chapter 7
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 

Semelhante a VMware vShield - Overview

VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationSuministros Obras y Sistemas
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
GAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO a.s.
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...Cisco DevNet
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld
 
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...VMworld 2013: Automating IT Configuration and Compliance Management for Your ...
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...VMworld
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingAvi Networks
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandAruj Thirawat
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
20151019 v mworld2015-recap-02
20151019 v mworld2015-recap-0220151019 v mworld2015-recap-02
20151019 v mworld2015-recap-02Kevin Groat
 

Semelhante a VMware vShield - Overview (20)

VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
GAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO VMware vCloud Air
GAMO VMware vCloud Air
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An Island
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...DEVNET-1009	Cisco Intercloud Fabric for Business (ICFB),  Helping Enterprises...
DEVNET-1009 Cisco Intercloud Fabric for Business (ICFB), Helping Enterprises...
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...VMworld 2013: Automating IT Configuration and Compliance Management for Your ...
VMworld 2013: Automating IT Configuration and Compliance Management for Your ...
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load Balancing
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - Thailand
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
20151019 v mworld2015-recap-02
20151019 v mworld2015-recap-0220151019 v mworld2015-recap-02
20151019 v mworld2015-recap-02
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 

Mais de Irsandi Hasan

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 

Mais de Irsandi Hasan (20)

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

VMware vShield - Overview

  • 1. VMware vShield – Foundation for the Most Secure Cloud Deployments © 2009 VMware Inc. All rights reserved
  • 2. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization – Key Security Enabler  vShield Products  Use Cases  Summary 2 Confidential
  • 3. Security Market Overview Segments We Address 3 Confidential Market Size in 2012 Endpoint Security Antivirus Security Operations Market Growth Rate Market Size($M) in 2009 $27B Worldwide in 2009 Anti-Virus $4,096 (7%) Application Security $2,987 (15%) Identity Mgmt $3,565(20%) Network Security $9,136 (8%) Data Security $3,258 (19%) Endpoint Security $3,001 (2%) $713 (8%) Source: FORRESTER, 2009 Network Security Identity Management Others
  • 4. Security and Compliance are the Primary Concerns with Cloud Virtualization forms the foundation for building private clouds. Security must change to support both. Public Cloud Internal IT  Rate Card  Hands-off  Self-service 4 Confidential – Gartner, 2010 ? Security ? Control ? Compliance
  • 5. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization – Key Security Enabler  vShield Products  Use Cases 5 Confidential
  • 6. 6 Confidential • Limited control and visibility • Organizational confusion (VI, security, network) • Hindered IT compliance • Slow provisioning • Heightened risk exposures • VLAN sprawl • Gap between policy and enforcement • Manual re-implementation of security policies • Heightened risk exposures Security Challenges Traditional Security Expensive • Specialized hardware appliances • Multiple point solutions Rigid • Policy directly tied to implementation • Not virtualization and change-aware Effect Complex • Spaghetti of different rules and policies • Security “rationing” • Heightened risk exposures
  • 7. The vShield Advantage: Increased Security Traditional Security vShield Complex • Spaghetti of different rules and policies 7 Confidential Cost Effective • Single virtual appliance with breadth of functionality • Single framework for comprehensive protection Simple • No sprawl in rules, VLANs, agents • Relevant visibility for VI Admins, network and security teams • Simplified compliance Adaptive • Virtualization and change aware • Program once, execute everywhere • Rapid remediation Expensive • Specialized hardware appliances • Multiple point solutions Rigid • Policy directly tied to implementation • Not virtualization and change-aware Deployments on VMware are more secure than physical
  • 8. VMware Transforms Security from Expensive to Cost Effective vShield eliminates the need for multiple special purpose  hardware appliances – 3-5x Savings Capex, Opex Load balancer  Firewall  VPN  Etc… vShield firewall VPN Load balancer Virtual Appliance 8 Confidential
  • 9. VMware Transforms Security from Complex… VLAN’s agent Complex • Policies, rules implementation - no clear separation of duties; organizational confusion • Many steps – configure network, firewall and vSphere • Spaghetti of VLANs, Sprawl - Firewall rules, agents 9 Confidential Policies, Rules Network admin Security admin VI admin Overlapping Roles / Responsibilities Many steps. Configure •Network •Firewall •vSphere Define, Implement , Monitor, Refine, agent agent agent agent agent agent agent
  • 10. … To Disruptively Simple Few steps: Configure vShield Define, Monitor, Refine, Implement Simple Network admin Security admin VI admin Clear separation of Roles / Responsibilities • Clear separation of duties • Few steps – configure vShield • Eliminate VLAN sprawl – vNIC firewalls • Eliminate firewall rules, agents sprawl 10 Confidential
  • 11. VMware Turns Security from Rigid…  BEFORE vShield • Security groups tied to physical servers • “Air gaps”, i.e. physical isolation, between security groups • VMs in a security group cannot be vMotioned to other hosts DMZ PCI compliant “Air gap” 11 Confidential
  • 12. ….to Adaptive  AFTER vShield • Security groups becomes a VM construct rather than physical server construct • Security groups enforced with VM movement • Mix VMs from different groups on the same host DDMZZ PPCCII C Coommpplliianntt 12 Confidential
  • 13. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization – Key Security Enabler  vShield Products  Use cases  Summary 13 Confidential
  • 14. Why VMware vShield is a Security Enabler ? 1. Unique introspection 2. Policy abstraction Cost Effective • Single virtual appliance with breadth of functionality • Single framework for comprehensive protection Simple • No sprawl in rules, VLANs, agents • Relevant visibility for VI Admins, network and security teams • Simplified compliance 14 Confidential Adaptive • Virtualization and change aware • Program once, execute everywhere • Rapid remediation
  • 15. Security Enabler: Unique Introspection Introspect detailed VM state and VM-to-VM communications Processor vSphere + vShield   memory  Network 15 Confidential Benefits • Comprehensive host and VM protection • Reduced configuration errors • Quick problem identification • Reduced complexity – no security agents per VM required
  • 16. Security Enabler: Policy Abstraction Separate the policy definition from the policy Before vShield Policy tied to the physical host; lost during vMotion After vShield Policy tied to logical attributes implementation 16 Confidential Benefits • Create and enforce security policies with live migration, automated VM load balancing and automated VM restart • Rapid provisioning of security policies • Easier compliance with continuous monitoring and comprehensive logging Policy tied to logical attributes; follow virtual machine
  • 17. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization – Key Security Enabler  vShield Products  Use cases  Summary 17 Confidential
  • 18. 2010 – Introducing vShield Products Securing the Private Cloud End to End: from the Edge to the Endpoint vShield Edge 1.0 Edge Secure the edge of the virtual datacenter vShield App 1.0 and Zones Security Zone Application protection from network based threats 18 Confidential vShield Endpoint 1.0 Endpoint = VM Enables offloaded anti-virus Virtual Datacenter 1 Virtual Datacenter 2 DMZ PCI compliant HIPAA compliant Web View VMware vShield VMware vShield VMware vShield Manager
  • 19. vShield Edge Secure the Edge of the Virtual Data Center • Multiple edge security services in one appliance • Stateful inspection firewall • Network Address Translation (NAT) • Dynamic Host Configuration Protocol (DHCP) • Site to site VPN (IPsec) • Web Load Balancer • Network isolation(edge port group isolation) • Detailed network flow statistics for chargebacks, etc • Policy management through UI or REST APIs • Logging and auditing based on industry standard syslog format VMware vShield Edge VMware vShield Edge VMware vShield Edge 19 Confidential Features Benefits • Lower cost and complexity by eliminating multiple special purpose appliances • Ensure policy enforcement with network isolation • Simplify management with vCenter integration and programmable interfaces • Easier scalability with one edge per org/tenant • Rapid provisioning of edge security services • Simplify IT compliance with detailed logging Tenant A Tenant C Tenant X Firewall Load balancer VPN Secure Virtual Appliance Secure Virtual Appliance Secure Virtual Appliance
  • 20. vShield Lowers Cost of Security Significantly Cost per Mbps 50$ 45$ 40$ 35$ 30$ 25$ 20$ 15$ 10$ 5$ 0$ Network edge security solution (Firewall + VPN + Load balancer) Security appliances .5Gbps 1Gbps 10Gbps 100Gbps Throughput 20 Confidential vShield Edge >5x Assumptions • 100 VM per edge • vSphere & server costs • High availability Mbps = Megabits/sec Gbps = Gigabits/sec
  • 21. vShield App Application Protection for Network Based Threats 21 Confidential Features • Hypervisor-level firewall • Inbound, outbound connection control applied at vNIC level • Elastic security groups - “stretch” as virtual machines migrate to new hosts • Robust flow monitoring • Policy Management • Simple and business-relevant policies • Managed through UI or REST APIs • Logging and auditing based on industry standard syslog format
  • 22. vShield App Provides Adaptive Security with Policy Abstraction DDMZZ PPCCII C Coommpplliianntt Security groups enforced with VM movement Policies based on logical attributes 22 Confidential
  • 23. vShield App Application Protection for Network Based Threats 23 Confidential Features • Hypervisor-level firewall • Inbound, outbound connection control applied at vNIC level • Elastic security groups - “stretch” as virtual machines migrate to new hosts • Robust flow monitoring • Policy Management • Simple and business-relevant policies • Managed through UI or REST APIs • Logging and auditing based on industry standard syslog format Benefits • Increase visibility for inter-VM communications • Eliminate dedicated hardware and VLANs for different security groups • Optimize resource utilization while maintaining strict security • Simplified compliance with comprehensive logging of inter VM activity
  • 24. vShield Endpoint Offload Anti-virus Processing for Endpoints • Eliminate anti-virus agents in each VM; anti-virus off-loaded • Enforce remediation using driver in VM • Policy and configuration Management: through UI or REST APIs • Logging and auditing 24 Confidential Features to a security VM delivered by AV partners Benefits • Improve performance by offloading anti-virus functions in tandem with AV partners • Improve VM performance by eliminating anti-virus storms • Reduce risk by eliminating agents susceptible to attacks and enforced remediation • Satisfy audit requirements with detailed logging of AV tasks
  • 25. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization - Key Security Enabler  vShield Products  Use cases  Summary 25 Confidential
  • 26. Service Provider - Offering Multi-Tenant Hosting Service Company A Company B Company C Company A Company B Company C • Host potentially hundreds or thousands of tenants in shared infrastructure with: • Traffic Isolation between the tenants • Complete protection and confidentiality of tenant apps and data • Integration with enterprise directory services (e.g. Active Directory) • Complying with various audit requirements 26 Confidential Requirements Solution – vShield Edge, VMware Cloud Director • Guarantee full confidentiality and protection of tenant apps and data with built-in firewall and VPN • Use enterprise directory services for security policies • Accelerate compliance by logging all traffic information on per-tenant basis • Lower cost of security by 100+% by eliminating purpose built appliances and by increasing utilization and VM density Cisco VPN Juniper VPN Checkpoint VPN Vmware vCloud Director vShield Edge
  • 27. Enterprise - Securing Business Critical Applications DMZ Development Finance Development Finance • Deploy production and development applications in a shared infrastructure with: • Traffic segmentation between applications • Authorized access to applications • Strict monitoring and enforcement of rules on inter- VM communications • Ability to maintain security policies with VM movement • Compliance to various audit requirements 27 Confidential Requirements Solution - vShield App + Edge • Protect data and applications with hypervisor level firewall • Create and enforce security policies with virtual machine migration • Facilitate compliance by monitoring all application traffic • Improve performance and scalability with load balancer and software based solution VMware vShield App
  • 28. Enterprise - Secure View Deployments Solution - vShield Endpoint+App+Edge • Improve performance by offloading AV processing • Reduce costs by freeing up virtual machine resources and eliminating agents • Improve security by streamlining AV functions to a hardened security virtual machine(SVM) • Protect View application servers from threats • Demonstrate compliance and satisfy audit requirements with detailed logging of offloaded AV tasks Public Network Private Network VMware vShield App 28 Confidential Requirements • Support thousands of internal and external View users with: • Comprehensive security for View servers • Anti virus agents to protect client data and applications • Optimal performance and scalability DMZ View Desktops Remote User Local User
  • 29. Agenda  Cloud Computing & Security  Security – State of the Market  Virtualization – Key Security Enabler  vShield Products  Use cases  Summary 29 Confidential
  • 30. vShield Edge 1.0 vs. vShield Zones 4.1 vs. vShield App 1.0 30 Confidential
  • 31. vShield Products Product SKUs List/VM SnS vShield Edge 1.0 $150 Standard Basic, Production vShield Endpoint 1.0 $50 Standard Basic, Production NA vSphere SnS applies $110 Standard Basic, Production $110 Standard Basic, Production Notes •VMware Cloud Director – Includes vShield Edge subset(Firewall, DHCP, NAT) •vShield App – Includes vShield Endpoint •VMware View 4.5 Premier SKUs – Include vShield Endpoint 1.0 •All SKUs – Min 25-VM purchase 31 vShield Zones for vSphere 4.1 (Included in vSphere Advanced and above) vShield App 1.0 (includes Endpoint and Zones) $150 Standard Basic, Production Upgrade to full vShield Edge 1.0 from VMware Cloud Director Upgrade to vShield App 1.0 from vShield Endpoint 1.0 31 Confidential
  • 32. vShield Wins Best of VMworld 2010 “VMware vShield marks a major improvement in security. It includes many essential features for virtualization security, and the ability to isolate traffic for different port groups is a highlight” 32 Confidential
  • 33. Quotes  “Definitely, the integration of vShield, offering application, network and end point security for the cloud, is a big step..” – CloudAve, Krishnan Subramanian  “The vision of moving legacy and new applications between public and private clouds necessitates a virtual security approach that surpasses static edge filtering commonly found in AV, IPS and firewalls.” – ComputerWorld, Eric Ogren  “You’ve got to hand it to VMware …..this week’s VMworld, the company announced the VMware vShield family of security products.” – Enterprise Strategy Group, Jon Oltsik  “vShield should help IT managers ensure that VMs can be protected and isolated in the virtual network with technology that is baked into the virtualization infrastructure.” – eWEEK, Cameron Sturdevant  “VMware has finally taken virtual machine security and added it through the entire virtualization stack.. The dark horse feature of this product? Load balancing. I tried it in the lab – it takes 30 seconds to set up load balancing. No more need for expensive F5’s – this could be a real game changer.” – Brandon Hahn 33 Confidential
  • 34. © 2009 VMware Inc. All rights reserved Thank You