SlideShare uma empresa Scribd logo
1 de 15
 
[object Object],[object Object],[object Object]
Do you protect your business or  risk getting hacked?
Do you protect your business or  risk getting hacked?
Why Security for Virtualized Environments? ,[object Object],[object Object],[object Object]
Security for Virtualized Environments (SVE) by Bitdefender ,[object Object]
Two types of virtualization: server virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object]
Two types of virtualization: desktop virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
SVE Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The number-one-ranked security technology
VBSpam award in every single antispam test ,[object Object],[object Object]
Awards and certifications for Business Solutions CRN Test Center Review 2011 “ a must-consider ” Bitdefender  Business Solutions 3.5,  June 2011 AV-Comparatives “Seal of Approval” Bitdefender Business Solutions, September 2011 Gold Award - Bitdefender Business Security Suite Top Ten Reviews, February 2011 Virus Bulletin’s VB100 Award  Bitdefender Client Security 3.5, File Servers 3.5, Samba 3.1.2 Virus Bulletin’s VBSpam Award Bitdefender Security for Mail Servers 3.0.2, March 2011 Compatible with Windows 7 Bitdefender Client Security 3.5, 3.1.9, December 2010
[object Object]
[object Object]

Mais conteúdo relacionado

Mais procurados

DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructuregaurav jain
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationVMware
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Bahtiyar Bircan
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015John White
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Joshua McKenty
 

Mais procurados (18)

Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security Cloud Computing v.s. Cyber Security
Cloud Computing v.s. Cyber Security
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 

Destaque

Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01
Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01
Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01Vocational High School 3 Tegal
 
How fashion stores act on Facebook
How fashion stores act on FacebookHow fashion stores act on Facebook
How fashion stores act on FacebookPaul Dumitru
 
Catalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei ArtificialeCatalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei ArtificialeBitDefenderRo
 

Destaque (6)

Virusi
VirusiVirusi
Virusi
 
Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01
Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01
Seatrain100kversimei26utkictcenterdijkt 100627004943-phpapp01
 
How fashion stores act on Facebook
How fashion stores act on FacebookHow fashion stores act on Facebook
How fashion stores act on Facebook
 
Securitatea in mediul online pentru ONG-uri
Securitatea in mediul online pentru ONG-uriSecuritatea in mediul online pentru ONG-uri
Securitatea in mediul online pentru ONG-uri
 
Catalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei ArtificialeCatalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei Artificiale
 
Sisteme CRM pentru ONG-uri
Sisteme CRM pentru ONG-uriSisteme CRM pentru ONG-uri
Sisteme CRM pentru ONG-uri
 

Semelhante a Alexandru Catalin Cosoi

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationSuministros Obras y Sistemas
 
LOAD 2014-Prezentare BitDefender
LOAD 2014-Prezentare BitDefenderLOAD 2014-Prezentare BitDefender
LOAD 2014-Prezentare BitDefenderSilviu Cojocaru
 
Vce External Vmware Viewonvblock So
Vce External Vmware Viewonvblock SoVce External Vmware Viewonvblock So
Vce External Vmware Viewonvblock SoJoel E. Secory II
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWarencceconnect
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environmentASBIS SK
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paperAhmed Sallam
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Jeff Fisher
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811Morty Eisen
 
Vdi how-it-works618
Vdi how-it-works618Vdi how-it-works618
Vdi how-it-works618shiva2shetty
 
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...Eric Sloof
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategysolarisyougood
 

Semelhante a Alexandru Catalin Cosoi (20)

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 
LOAD 2014-Prezentare BitDefender
LOAD 2014-Prezentare BitDefenderLOAD 2014-Prezentare BitDefender
LOAD 2014-Prezentare BitDefender
 
Vce External Vmware Viewonvblock So
Vce External Vmware Viewonvblock SoVce External Vmware Viewonvblock So
Vce External Vmware Viewonvblock So
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
 
Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Vdi how-it-works618
Vdi how-it-works618Vdi how-it-works618
Vdi how-it-works618
 
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 

Alexandru Catalin Cosoi

  • 1.  
  • 2.
  • 3. Do you protect your business or risk getting hacked?
  • 4. Do you protect your business or risk getting hacked?
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13. Awards and certifications for Business Solutions CRN Test Center Review 2011 “ a must-consider ” Bitdefender Business Solutions 3.5, June 2011 AV-Comparatives “Seal of Approval” Bitdefender Business Solutions, September 2011 Gold Award - Bitdefender Business Security Suite Top Ten Reviews, February 2011 Virus Bulletin’s VB100 Award Bitdefender Client Security 3.5, File Servers 3.5, Samba 3.1.2 Virus Bulletin’s VBSpam Award Bitdefender Security for Mail Servers 3.0.2, March 2011 Compatible with Windows 7 Bitdefender Client Security 3.5, 3.1.9, December 2010
  • 14.
  • 15.

Notas do Editor

  1. By re-architecting the way that security is provided to servers and end-user systems, Bitdefender has not simply created security technology that provides the same value as in the traditional environments, but is, in-fact, better. There are several reasons why security in virtualized environments can be better than in traditional environments: elimination of boot-time vulnerability gaps, update and maintain a single scanning virtual machine and achieve power and hardware efficiencies across the environment. Organizations today look to virtualization technologies to increase the return on investment in data center infrastructure. Consolidation of server and enduser workloads onto shared infrastructure has led to cost reductions by deduplification of hardware resources. Virtualization also provides significant operational benefits through near-instant provisioning as organizations create and leverage private and public clouds. To realize the full potential of virtualized datacenters, organizations must also look to consolidating elements of the workloads themselves, security being an element that must be present across all workloads. In gaining ever-higher consolidation ratios and operational benefits, organizations must not sacrifice security while their valuable brands become increasingly threatened by evermore dedicated, sophisticated, and focused attackers. Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Virtualization platforms are software. All software has flaws. Therefore, virtualization platforms have flaws. The major virtualization platform vendors, VMware, Xen (now Citrix), and Microsoft, have all had several vulnerabilities over the last few years. However, the major components of a virtualization infrastructure and the IT strategy related to deployment and maintenance of virtualization technologies can be planned and secured fairly well.
  2. Security for Virtualized Environments (SVE) by Bitdefender is the first comprehensive security solution for virtualized datacenters, integrating VMware vShield™ to protect Windows servers and desktops, as well as Linux and Solaris systems. Integrated with VMware vShield and VMware vCenter, the unique architecture of SVE also allows it to defend systems running on any system virtualization technology. As organizations increase consolidation ratios, Bitdefender security that has been designed, from day one, to provide highly advanced, proactive, and reliable security in virtualized environments is a cornerstone of building and enhancing datacenter virtualization strategies.
  3. Server virtualization allows the conversion of one server into many virtual machines. By using specially designed software, an administrator can convert one physical server into multiple virtual machines. Each virtual server acts like a unique physical device, capable of running its own operating system. Each virtual machine is completely isolated from other virtual machines and is disconnected from the host by a thin layer of software known as a hypervisor. This allows each virtual machine to run different operating systems and applications. The traditional one server to one application architecture - you are running out of resources and performance is suffering. Once you order new server hardware, you wait for delivery, configure it, install your business application, test the server and finally start using it in production environments. This process can take a long time. It is also a manually intensive process that will use your team every team you outgrow your current infrastructure. With a virtual server solution you can accomplish all this in a very short period of time. Server virtualization software separates the OS and application from the underlying server hardware and with multiple virtual machines on a single server you can use each of each of them to run different OSs and applications. You can move your virtual machines from one piece of hardware to another whenever you want to maximize utilization, simplify maintenance or recover from hardware failures without slowing down your applications or users. Security for Virtualized Environments uses unique technology to achieve centralized scanning regardless of the virtualization technology (VMware, Citrix, Microsoft Hyper-V, etc). The main server virtualization infrastructure providers are: Vmware, Microsoft and Citrix. VMware is the market leader in data center virtualization. The company created technology that allows Bitdefender to perform anti-malware actions on a virtual machine from a virtual appliance. In VMware environments, Security for Virtualized Environments integrates with VMware vShield Endpoint, which provides introspection of the protected guest, caching of scan results, and a method of making objects that require scanning available to the Scanning Virtual Machine (SVM). In virtualized environments that do no leverage VMware, Bitdefender has created technology that provides introspection of the protected guest, caching of the scan result, and a method of making objects that require scanning available to the SVM via TCP/IP. The success of the technology is powered by the caching capabilities which perform functions such as de-duplicating scan results that are common across systems (for example, across a group of Red Hat Linux systems, the scanning results of the same system files is common). Windows Server 2008 R2 provides both server and client virtualization, enabled by Hyper-V and Remote Desktop Services (RDS). Hyper-V is Microsoft’s hypervisor which provides you with a scalable, reliable, and highly available virtualization platform included in the Windows Server 2008 R2 operating system. SP1 introduces new features to Hyper-V for creating dynamic virtual data centers and private clouds. These improvements provide you with increased availability and performance, improved management, and simplified methods for deployment including live migration. When combined with System Center, you are able to build out a dedicated private cloud environment to transform the way you deliver IT services to the business. Citrix XenServer is a complete, managed server virtualization platform built on the powerful Xen hypervisor. Xen technology is widely acknowledged as the fastest and most secure virtualization software in the industry. XenServer is designed for efficient management of Windows® and Linux® virtual servers and delivers cost-effective server consolidation and business continuity.
  4. Desktop virtualization, sometimes referred to as client virtualization , is defined as a virtualization technology that is used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the virtualized desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. Desktop virtualization "virtualizes desktop computers" and these virtual desktop environments are "served" to users on the network. Users interact with a virtual desktop in the same way that a physical desktop is accessed and used. Another benefit of desktop virtualization is that is lets you remotely log in to access your desktop from any location. One of the most popular uses of desktop virtualization is in the data center, where personalized desktop images for each user is hosted on a data center server. VDI (Virtual Desktop Infrastructure -- or Interface) is a popular method of desktop virtualization. This type of desktop virtualization uses the server computing model, as the desktop virtualization in this scenario is enabled through hardware and software. VDI hosts the desktop environment in a virtual machine (VM) that runs on a centralized or remote server. VMware View™ delivers desktop services from your cloud to enable end user freedom and IT management and control. VMware View allows IT to simplify and automate the management of thousands of desktops and to securely deliver desktop as a service to users from a central location with levels of availability and reliability unmatched by traditional PCs. By delivering secure access to applications and data to any device, when and where the user needs it, VMware View provides end users with the highest levels of mobility and flexibility. Microsoft Desktop Virtualization & Management solutions use key features and tools found in Windows Server Hyper-V, Microsoft Desktop Optimization Pack, and System Center to empower IT in providing a flexible work experience to users who want to connect from everywhere, on the devices they choose, whether inside or outside the corporate networks. These solutions deliver personalized, consistent, and secure experiences for users, while also improving compliance through centralized control and access to confidential data. Microsoft Desktop Virtualization helps you simplify management too by unifying IT operations onto a single infrastructure across physical and virtual assets. It enables instant provisioning of corporate applications and desktops, which get users up and running sooner, and equips IT to provide access to legacy applications during migration to Windows 7. Working with System Center management tools, Microsoft Desktop Virtualization automatically detects device configurations and network conditions to deliver the most appropriate services to each user. Citrix XenDesktop is a desktop virtualization solution that transforms Windows desktops and applications into an on-demand service available to any user, anywhere, on any device. With XenDesktop, you can securely deliver individual Windows, web and SaaS applications, or full virtual desktops, to PCs, Macs, tablets, smartphones, laptops and thin clients—all with a high-definition user experience.
  5. Until now the traditional approach used for protecting the virtual machines was basically consisting in installing an antivirus solution for each virtual machine, which was leading to a large resource consumption level for each virtual machine. The Bitdefender approach will ensure the scanning from a single point, integrated at the hypervisor level from VMWare. There will be no more antivirus solutions installed locally in each virtual machines. The scanning process will be run from the VMWare architecture, even if a specific virtual machine is turned off. Thanks to the Vshield integration we have access for scanning in the file system as it was conceived by VMware. This is applied for the Vmware solutions Windows operating machines. We can scan Linux and Solaris systems also or any other virtualization systems, using a technology integrated in the virtualization solution, using an agent (a sort of a driver) placed on the respective machine, the scan process taking place at a server level. The agent will intercept the accessed files and will send the hashes of the files to the scanning server, which will process them and send the answer back. There is only a centralized server on which all the scanning tasks are performed, there is nothing installed on the local machines.
  6. Security for Virtualized Environments by Bitdefender has, at its heart, a hardened Linux, scanning virtual appliance. Much of the scanning and maintenance (updates, upgrades, RAM, IOPS, etc.) requirements of antimalware clients are duplicated with each virtual machine when using traditional security solutions. SVE deduplicates and centralizes much of the scanning functionality at a single, dedicated virtual appliance on each physical host. The relationship between the virtual appliance and protected systems is interactive and intelligent. Patented technology that includes a series of sophisticated cache mechanisms acts to provide deduplication of effort within SVE itself. By being virtualization-aware via integration with VMware vCenter, Security Console guarantees that no host is overwhelmed during even the most intense full-system scans of multiple virtual machines (a condition known as “resource contention” or “AV storm” that results from full anti-malware clients across multiple virtual machines competing for host resources, thus preventing the host from servicing production workloads). Recognizing the need to provide comprehensive security in the most demanding and heterogeneous datacenters, SVE has been architected to include coverage of: - Virtualized servers and desktops - VMware, Citrix, Microsoft, Oracle, or any other system virtualization technology Windows, Linux, and Solaris File event, process, and memory scanning
  7. solution is the only one that has won an award in every single VBSpam test,
  8. Bitdefender products have received numerous industry certifications and awards that confirm its value and performance. Here are just a few examples: AV-Comparatives provides independent Anti-Virus software tests by using various sources of malware samples. The SC Magazine in the US reviewed the Bitdefender Client Security 3.1.8 and found it a strong AV solution with management of the registry and WMI scripting for better endpoint management. Virus Bulletin has awarded VB100 award for Bitdefender Client Security 3.1.9 in December 2010, for Bitdefender Security for File Servers 3.4 in June and October 2010; and for Bitdefender Security for Samba 3.1.2 in February 2011 with the highest final score . Each product within the Bitdefender business product portfolio all share the same version of anti-virus engine, so the detection and performance noted by Virus Bulletin can be applied to all solutions. Bitdefender Security for Mail Servers 3.0.2 was awarded its 12th VB Spam Verified distinction in march 2011. The "Compatible - Windows 7 Logo" means this product passed Microsoft's compatibility tests for 64-bit and 32-bit Windows 7. To earn the "Compatible with Windows 7" logo, software and hardware must pass Microsoft designed installation, performance, reliability, and security tests so you can be sure these products are compatible with Windows 7. And finally, the Top Ten REVIEWS evaluated a number of Small Business Internet Security Suites and found Bitdefender Business Security number one, earning Bitdefender the GOLD Award in February 2011.