Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1.

Slides:



Advertisements
Similar presentations
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud With a Smart Protection.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
System Center 2012 R2 Overview
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
© 2010 VMware Inc. All rights reserved Confidential VMware Security Briefing Dan Watson, Senior Systems Engineer, VMware VMUG, Edinburgh, Feb 24, 2011.
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud Confidential | Copyright.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
Unified Logs and Reporting for Hybrid Centralized Management
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
© 2009 VMware Inc. All rights reserved Confidential VMware—Leading the New Era in IT Presenter Title, VMware.
Copyright 2011 Trend Micro Inc. Securing your Journey to the Cloud Kamal Sharma Technical Consultant Classification 8/27/
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© 2009 VMware Inc. All rights reserved VMworld Update Ian Moore - Country Manager Ireland ie.linkedin.com/in/iantmooreiantmoore.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
MICROSOFT CONFIDENTIAL – INTERNAL ONLY
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Network security Product Group 2 McAfee Network Security Platform.
2015 Security Conference Dave Gill Intel Security.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Copyright 2011 Trend Micro Inc. Deep Security 9 A Server Security Platform for Physical, Virtual, Cloud Available Aug 30, 2011 Presenter Name Presenter.
© 2011 VMware Inc. All rights reserved VMware – Cloud Security Solutions.
C © 2010 NetApp, Cisco, and VMware. All Rights Reserved. Presented Jointly by Cisco, NetApp, and VMware FlexPod for VMware.
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Complete Cloud Security Anyone, anywhere, any app, any device.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
© 2009 VMware Inc. All rights reserved Confidential VMware – The Journey to the Cloud Richard Stinton Senior Enterprise Cloud Architect – EMEA
Increasing Cloud Adoption Through Cloud Services Brokerage (CSB) Brent Brightwell Senior VP Products and Strategy DoubleHorn.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
Check Point vSEC STORY [Protected] Non-confidential content.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Veeam software Risk Mitigation and Protection
The time to address enterprise mobility is now
Chapter 6: Securing the Cloud
Boost VM Density with AV Designed for VDI
Avenues International Inc.
Hybrid Management and Security
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
Securing your Journey to the Cloud
Virtualization & Security real solutions
Maximize the value of your cloud
Secure & Unified Identity
Automated Live Workload Migration to vCloud Air with ATAmotion
Company Overview & Strategy
Healthcare Cloud Security Stack for Microsoft Azure
Check Point Connectra NGX R60
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Logicom Cloud Marketplace
Healthcare Cloud Security Stack for Microsoft Azure
NSX Data Center for Security
2/25/2019.
Zendos Tecnologia Utilizes the Powerful, Scalable
Presentation transcript:

Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1

Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Trend Micro is No.1 in Server and Virtualization Security Trend Micro 23.7% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Trend Micro 13% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Source: 2011 Technavio – Global Virtualization Security Management Solutions Why is Trend Micro an Expert? 2

Copyright 2011 Trend Micro Inc. Trend Micro protects 100% of the top 10 automotive companies. Trend Micro protects 96% of the top 50 global corporations. Trend Micro protects 100% of the top 10 telecom companies. Trend Micro protects 80% of the top 10 banks. Trend Micro protects 90% of the top 10 oil companies. * In calculating the above data, the percentage use of Trend Micro products include usage by parent companies and/or usage by any of their subsidiaries of any Trend Micro product or service. Trend Micro Global 500 Penetration Why is Trend Micro an Expert?

Copyright 2011 Trend Micro Inc. Physical Desktops & Servers Desktop Virtualization Server Virtualization Private Cloud Hybrid Cloud Public Cloud Mobile BYOPC 4 Journey to the Cloud Where is Your Data?

Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Cross-platform Security One Security Model is Possible across Physical, Virtual, and Cloud Environments New platforms don’t change the threat landscape Each platform has unique security risks Integrated security is needed across all platforms 5

Copyright 2011 Trend Micro Inc. Platform-specific Security Risks One Security Model is Possible across Physical, Virtual, and Cloud Environments Visibility & Threats Less visibility More external risks Performance & Threats Security degrades performance New VM-based threats Manageability Glut of security products Less security Higher TCO Virtual Cloud Physical Increase EfficiencyDeliver AgilityReduce Complexity Integrated Security Single Management Console 6

Copyright 2011 Trend Micro Inc. Physical Consolidate Physical Security Reduce Complexity

Copyright 2011 Trend Micro Inc. Advanced Reporting Module Single Management Console Firewall HIPS / Virtual Patching File Integrity Monitoring Antivirus Log Inspection Web Application Protection One Server Security Platform Reduce Complexity 8

Copyright 2011 Trend Micro Inc. Virtual Server and Desktop Virtualization Security Increase Efficiency

Copyright 2011 Trend Micro Inc. Typical AV Console 3:00am Scan Antivirus Storm Automatic security scans overburden the system Virtualization Security Challenge: Resource Contention 10

Copyright 2011 Trend Micro Inc. Reactivated and cloned VMs can have out-of-date security Dormant Cost Reduction & Consolidation 1 Virtualization Security Challenge: Instant-on Gaps Active Reactivated with out dated security Cloned    11

Copyright 2011 Trend Micro Inc. Attacks can spread across VMs Cost Reduction & Consolidation 1 Virtualization Security Challenge: Inter-VM Attacks / Blind Spots 12

Copyright 2011 Trend Micro Inc. VM sprawl inhibits compliance 13 Cost Reduction & Consolidation 1 Virtualization Security Challenge: Complexity of Management Patch agents Rollout patterns Provisioning new VMs Reconfiguring agents 13

Copyright 2011 Trend Micro Inc. Antivirus Integrity Monitoring AgentlessSecurityforVMware — Antivirus and more Agentless Security for VMware — Antivirus and more VM The Old Way Security Virtual Appliance VM With Agentless Security VM Intrusion Prevention Virtual Patching Firewall Web Application Protection Virtualization Security What is the Solution? A Dedicated Security Virtual Appliance VM Maximizes Performance and ROI 14

Copyright 2011 Trend Micro Inc. Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011; Saving estimate based on VMware ROI calculations 3X higher VDI VM consolidation ratios Cost Reduction & Consolidation 1 3-year Savings on 1000 VDI VMs = $539,600 Virtualization Security Increased ROI with Agentless Security Example: Agentless Antivirus 15

Copyright 2011 Trend Micro Inc. Security Virtual Appliance VM With Agentless Security VM Virtualization Security What is the Solution? Layered, Virtualization-Aware Security in One Platform VM Protect your efforts to consolidate servers, enable VDI, and support consumerization Integrated Modules: Antivirus Integrity Monitoring Intrusion Prevention Web Application Protection Application Control Firewall Log Inspection Simplified Management Higher Density Optimized Resources Stronger Security 16

Copyright 2011 Trend Micro Inc. 17 Keep your virtual systems, applications, and data secure Rules are developed and delivered automatically to protect Before patches are available Unsupported OSs and apps Legacy web applications Devices that are difficult to patch— ATM kiosk, point of sale, medical devices, etc. Prevent business disruption and data breach. Cost Reduction & Consolidation 1 Virtualization Security What is the Solution? Virtual Patching 17

Copyright 2011 Trend Micro Inc. vShield Endpoint Security Virtual Machine Other VMware APIs Security agent on individual VMs Integrates with vCenter Antivirus Agentless IDS / IPS Web Application Protection Application Control Firewall Log Inspection Agent-based Virtualization Security Integrity Monitoring vSphere Virtual Environment Cost Reduction & Consolidation 1 Virtualization Security Fitting into the VMware Ecosystem

Copyright 2011 Trend Micro Inc.  Hypervisor-integrated agentless antivirus released in Nov  1000 agentless security customers in the first year  Over 250,000 VMs are licensed for agentless antivirus  Agentless FIM released in 2012  Multiple agentless security modules now available  Largest customer purchase is 8,000 VMs  Most dense deployment is 300 VMs/host “Deep Security provides a robust set of tools to add to your toolbox. The perceived performance improvement is visible to the naked eye.” - Ed Haletky, Virtualization Practice ( Cost Reduction & Consolidation 1 Virtualization Security Trend Micro Market Momentum Agentless Security 19

Copyright 2011 Trend Micro Inc. Cloud Computing Cloud Deployments and Security Deliver Agility

Copyright 2011 Trend Micro Inc. Additional Resources Scalability Cost savings Provides business agility Data Access Anytime, anywhere Device flexibility Supports BYOD and consumerization Security is the #1 cloud adoption inhibitor Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011 Cost Reduction & Consolidation 1 Cloud Security Why Companies Turn to the Cloud 21

Copyright 2011 Trend Micro Inc. Who is responsible for security ? With IaaS the customer is responsible for VM-level security With SaaS or PaaS the service provider is responsible for security Public Cloud PaaS Public Cloud IaaS ServersVirtualization & Private Cloud End-User (Enterprise) Service Provider Public Cloud SaaS Cost Reduction & Consolidation 1 Cloud Security Cloud Models: Who Has Control? 22

Copyright 2011 Trend Micro Inc. Cost Reduction & Consolidation 1 Cloud Security Challenge: Multi-tenancy / Mixed Trust Level VMs Shared resources creates a mixed trust level environment 23

Copyright 2011 Trend Micro Inc. Cost Reduction & Consolidation 1 Cloud Security Challenge: Data Access and Governance Cloud data can provide less visibility and control

Copyright 2011 Trend Micro Inc Cost Reduction & Consolidation 1 Cloud Security Challenge: Data Destruction When data is moved, unsecured data remnants can remain

Copyright 2011 Trend Micro Inc. Patient Medical Records Credit Card Payment Information Sensitive Research ResultsSocial Security Numbers Unreadable for unauthorized users Control of when and where data is accessed Server validation Custody of keys Encryption with Policy-based Key Management Self-defending VM security Agentless and agent-based One management portal for all modules, all deployments vSphere & vCloud Cost Reduction & Consolidation 1 Cloud Security What is the Solution? Data Protection Integration ensures servers have up-to-date security before encryption keys are released

Copyright 2011 Trend Micro Inc. VM Data Center Private Cloud Public Cloud VMware vCloud VMware vSphere Encryption throughout your cloud journey— data protection for physical, virtual & cloud Cost Reduction & Consolidation 1 Cloud Security Fitting Encryption into a VMware Ecosystem Enterprise Key Key Service Console Encryption Solution 27

Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Virtualization and Cloud Security Pulling It All Together Do you have one solution for physical, virtual, and cloud servers? Does your solution address the risks specific to each platform? Are you maximizing your performance for better ROI? 28

Copyright 2011 Trend Micro Inc. VM VMware Virtualization Security Virtual Appliance VM Agentless security Layered server security Encryption for vSphere Private Cloud Agentless security Layered server security Security Virtual Appliance VM Public Cloud Server security console Shared policy profile Virtual patching VM Encryption for vCloud Compliance support (FIM, Encryption, etc.) Encryption console Shared policy profile Key ownership Agent-based security Layered server security Encryption for leading cloud providers Compliance support (FIM, Encryption, etc.) VM Cost Reduction & Consolidation 1 Virtualization and Cloud Security One Security Model 29

Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Virtualization and Cloud Security One Security Model is Possible Reduce Your Cost of Operations Reduce Your Investment in Management Increase Application Stability and Performance Achieve Compliance in Virtual and Cloud Environments Get Higher Virtualization and Cloud ROI Safely Use Private, Public, and Hybrid Clouds 30

Copyright 2011 Trend Micro Inc.Copyright 2012 Trend Micro Inc.