Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Ljubomir Ivaniš CPU d.o.o.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
The System Center Family Microsoft. Mobile Device Manager 2008.
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
The future of Desktops Transform Your Desktop with Virtualization.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
© 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
How to protect your Virtual Datacenter Michiel van den Bos.
Data Center Network Redesign using SDN
Cloud Computing Cloud Security– an overview Keke Chen.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Software-Defined Networks Jennifer Rexford Princeton University.
Dell Connected Security Solutions Simplify & unify.
Computing on the Cloud Jason Detchevery March 4 th 2009.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
AUTOMATING ADVANCED SECURITY
VMware NSX and Micro-Segmentation
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Micro segmentation with Next Generation Firewall and Vmware NSX
© 2014 VMware Inc. All rights reserved. NSX – Introduzione e casi d’Uso Luca Morelli – Sr Sales Engineer - NSX
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
The next big shift in your data center VMware NSX with HPE.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Clouding with Microsoft Azure
Check Point vSEC STORY [Protected] Non-confidential content.
Windows 2012R2 Hyper-V and System Center 2012
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Boost VM Density with AV Designed for VDI
Stop Cyber Threats With Adaptive Micro-Segmentation
STEPS TO A CLOUD READY DATA CENTER
Organizations Are Embracing New Opportunities
Security Virtualization
Cloud Security– an overview Keke Chen
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Hybrid Management and Security
Prepared by: Assistant prof. Aslamzai
Real-time protection for web sites and web apps against ATTACKS
Ransomware & Security for Virtualization
Windows 10 & Intune: A Modern Desktop Management Story Joe Crandall.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Threat Ready: The Benefits of Segmentation
Virtualization & Security real solutions
Your Business Opportunity
CLOUD COMPUTING Presented By:- EduTechlearners
VMware NSX and Micro-Segmentation
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Managing Clouds with VMM
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Automating Security in the Cloud
Contact Center Security Strategies
Healthcare Cloud Security Stack for Microsoft Azure
Defending high value targets in the cloud using IP Reputation
NSX Data Center for Security
Microsoft Data Insights Summit
Healthcare Cloud Security Stack for Microsoft Azure
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1

Your data center Let’s begin with how things are, and how things should be… 2

The Evolving Architecture – The Neo IT Model 3 On-Premise Data Center New app frameworks Mobile Devices Virtual Desktop (VDI) Branch offices (Partner) Internet of things Public clouds

Data Center Virtualization Layer Intelligence in Software Operational Model of VM for Data Center Automated Configuration & Management What is a Software Defined Data Center (SDDC)? Intelligence in Hardware Dedicated, Vendor Specific Infrastructure Manual Configuration & Management Software Hardware Compute, Network and Storage Capacity Pooled, Vendor Independent, Best Price/Performance Infrastructure Simplified Configuration & Management

Compute Storage Network Custom Distributed Applications (Security, Application Load Balancing, Routing, HA, etc.) Google, Facebook, Amazon Software Automation Agility & Speed Network Services Distributed out to Applications Simplified Increased Stability & Reliability Lower Cost

Compute Storage Network Custom Distributed Applications (Security, Application Load Balancing, Routing, HA, etc.) Google, Facebook, Amazon Compute Storage Network Enterprise Applications Enterprise IT Data Center Virtualization Layer

Compute Storage Network Custom Distributed Application Design (Security, Application Load Balancing, Routing, HA, etc.) Google, Facebook, Amazon Compute Storage Network Enterprise Applications Enterprise IT Data Center Virtualization Layer

Compute Storage Network Enterprise Applications Enterprise IT Data Center Virtualization Layer The operational model of a VM for the entire data center Programmatically Create Snapshot Store Move Delete Restore The operational model of a VM for the entire data center Programmatically Create Snapshot Store Move Delete Restore

Demystifying Data Center Security 9 Perimeter FW Internal FW DMZ IPS Converged Infrastructure, running on data center compute resources and vSphere hypervisors Internet End user computing/desktops Application infrastructure Internet-facing servers: Web, , DNS, etc. Also for VDI: Horizon View Security Server A/V Other server security Client

Why do breaches still occur? Data Center Perimeter Today’s data centers are protected by strong perimeter defense… But threats and exploits still infect servers. Low- priority systems are often the target. Threats can lie dormant, waiting for the right moment to strike. Server-server traffic growth has outpaced client-server traffic. The attack spreads and goes unnoticed. Possibly after months of reconnaissance, the infiltration relays secret data to the attacker. Attacks spread inside the data center, where internal controls are often weak. Critical systems are targeted

Problem: Data Center Network Security Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible Little or no lateral controls inside perimeter Internet InsufficientOperationally Infeasible

Why traditional approaches are operationally infeasible… 12 Internet Perimeter Firewalls Create firewall rules before provisioning Update Firewall rules when move or change Delete firewall rules when app decommissioned Problem increases with more East-West traffic

Let’s start with a story about a firewall The Data Center Traditional Firewall Rule Mgt & Operations Physical Firewalls (2 – 100 Gbps) Physical Firewalls 13

Traditional Firewall Rule Mgt & Operations Physical Firewalls (2 – 100 Gbps) Physical Firewalls The Data Center Traditional Firewall Rule Mgt & Operations Virtual Firewalls (1 – 3 Gbps) Virtual Firewalls 14

Traditional Firewall Rule Mgt & Operations Virtual Firewalls (1 – 3 Gbps) Virtual Firewalls Automated Policy Mgt & Operations, Distributed Enforcement Kernel-based Performance, Distributed Scale-out Capacity (20 Gbps/host) Distributed Firewalling The Data Center 15

The Data Center 16

SDDC Platform – “Zero Trust” is Now Operationally Feasible 17 Hypervisor-based, in kernel distributed firewalling High throughput rates on a per hypervisor basis Every hypervisor adds additional east-west firewalling capacity Native feature of the VMware NSX platform Platform-based automation Automated provisioning and workload adds/moves/changes Accurate firewall policies follow workloads as they move Audit Compliance 20 Gbps Firewalling throughput per host Data center micro-segmentation becomes operationally feasible

Micro-segmentation simplifies network security  Each VM can now be its own perimeter  Policies align with logical groups  Prevents threats from spreading App DMZ Services DB Perimeter firewall AD NTPDHCPDNSCERT Inside firewall Finance Engineering HR

Network Virtualization is at the core of an SDDC approach Network, storage, compute Virtualization layer Non-Disrupting Deployment

Network, storage, compute Virtualization layer “Network hypervisor” Virtual Data Centers Network Virtualization is at the core of an SDDC approach Non-Disrupting Deployment

Intelligent Grouping Groups defined by customized criteria Operating System Machine Name Application Tier Services Security PostureRegulatory Requirements CONFIDENTIAL21

Automated Security in a Software-Defined Data Center Data Center Micro-Segmentation CONFIDENTIAL22

IsolationExplicit Allow Comm.Secure Communications IPS FIM AM WR Service Insertion Application A Application B App Tier DB Tier (e.g TCP,1433) No Communication Path Intrusion Protection File Integrity Anti-Malware Web Reputation Inserting Advanced Security Services For Fine-Grained Policy & Control

Copyright 2015 Trend Micro Inc.24 Internet Traffic Steering NSX: Advanced Partner Security Services Security Policy

Add Trend Micro advanced services to your micro-segmentation deployment for greater security Apply the NSX operational model to your advanced security products Adapt to changing security conditions in the data center by enabling security solutions that share intelligence Traditional Data Center Static service chain In a traditional data center, security services must be configured when the network is architected, meaning the “chain” of services is locked in once deployed. This is an inefficient use of resources and cannot defend against changing threat conditions. NSX Data Center Dynamic service chain In an NSX data center, 3 rd -party security solutions use NSX security tags to share intelligence, adapting to changing security conditions. NSX automatically applies the correct security function as needed NSX: Security Extensible Platform

Copyright 2015 Trend Micro Inc.26 Build security into the application lifecycle With VMware NSX and their partners, security is enforced through every step of an application’s lifecycle Prepare Deploy security service Create security groups and policies Instantiate Dynamically assign security groups and policies Monitor Run periodic automated scans for threats Monitor applications for vulnerabilities Monitor and record system changes Manage Address known threats & vulnerabilities Respond to emergent attacks Adjust security policy as app changes over time Decommission security services Report compliance and generate audit logs Decommission

NSX Vision Managing Security and Connectivity for many Heterogeneous End Points 27 Automation IT at the Speed of Business Security Inherently Secure Infrastructure Application Continuity Data Center Anywhere On-Premise Data Center New app frameworks Mobile Devices (Airwatch) Virtual Desktop (VDI) Branch offices (Partner) Internet of things Public clouds

Compute Virtualization Network Virtualization Software-Defined Storage Hybrid Cloud Mobile Workspace Intrinsic Security Server Virtualization 2000 Software-Defined Data Center 2011 Software-Defined Business 2016 VMware: Fearless Innovator of “Software-Defined” 28

Thank You!

Thank you

CONFIDENTIAL31