VMware NSX and Micro-Segmentation

Slides:



Advertisements
Similar presentations
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
Advertisements

© 2014 VMware Inc. All rights reserved. NSX Icons NSBU Product Management March 2014, v1.0.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
How Law Firms are Using AWS Cloud IaaS FOR THE LEGAL IT PRO.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh †‡ Srikanth Kandula ‡ Albert Greenberg ‡ †‡
Agenda Presentation: Open Discussion Defining the Problem
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
© 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
How to protect your Virtual Datacenter Michiel van den Bos.
Data Center Network Redesign using SDN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Making the Virtualization Decision. Agenda The Virtualization Umbrella Server Virtualization Architectures The Players Getting Started.
The Next Phase of Virtual Infrastructure Kevin Bailey Director - Product Marketing EMEA Symantec Corporation.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
VMware NSX and Micro-Segmentation
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC THAT’S THE ANSWER WHAT’S THE QUESTION? Software Defined Networking Dan DeBacker Principal.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Transforming Server Virtualization with Cisco VN-Link Belmont Chia Consulting System Engineer.
Look, Ma, No Hardware -Stephanie Schossow. Cisco & VMware  September 16, Industry leaders in virtualization Cisco and VMware® announced that they.
© 2014 VMware Inc. All rights reserved. NSX – Introduzione e casi d’Uso Luca Morelli – Sr Sales Engineer - NSX
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
© 2011 VMware Inc. All rights reserved VMware – Cloud Security Solutions.
Cloud Agility with Performance Bridging the Performance Gap for Virtual Network Infrastructure Paul Andersen Sr. Marketing Director.
The next big shift in your data center VMware NSX with HPE.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
Check Point vSEC STORY [Protected] Non-confidential content.
CLOUD SECURITY Timothy Brown Director, Security & Virtualization
Service Assurance in the Age of Virtualization
Stop Cyber Threats With Adaptive Micro-Segmentation
STEPS TO A CLOUD READY DATA CENTER
Security Virtualization
Bentley Systems, Incorporated
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Real-time protection for web sites and web apps against ATTACKS
1.
Threat Ready: The Benefits of Segmentation
Bill Banks | Security Engineer
RackWare Solution with vCloud Air
Network Services, Cloud Computing, and Virtualization
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Company Overview & Strategy
Securing Cloud-Native Applications Jason Schmitt CEO
Virtualization Meetup Discussion
Defending high value targets in the cloud using IP Reputation
Internet and Web Simple client-server model
NSX Data Center for Security
Security Delivery Platform for the Micro-segmented Data Center
The Zero-Trust Model Redefining InfoSec.
Presentation transcript:

VMware NSX and Micro-Segmentation Irish R. Spring Systems Engineering Manager, NSBU Central

Why do breaches still occur? Today’s data centers are protected by strong perimeter defense… But threats and exploits still infect servers. Low-priority systems are often the target. Threats can lie dormant, waiting for the right moment to strike. 10110100110 101001010000010 1001110010100 Attacks spread inside the data center, where internal controls are often weak. Critical systems are targeted. Server-server traffic growth has outpaced client-server traffic. The attack spreads and goes unnoticed. Possibly after months of reconnaissance, the infiltration relays secret data to the attacker.

The legacy security model emphasized perimeter security Data Center Perimeter Internet Perimeter-centric network security has proven insufficient

And is incompatible with a world where security is needed everywhere Adding more internal security… requires placing more firewalls across workloads Physical Firewalls Cost prohibitive with complex configurations Internet Virtual Firewalls Slower performance, costly and complicated Data Center Perimeter

What’s needed: a new architectural approach Software-Defined Data Center Applications Virtual Machines Virtual Networks Virtual Storage Data Center Virtualization Compute Capacity Network Capacity Storage Capacity Location Independence

The next-generation networking model VSWITCH OS Hypervisor Software Network and Security Services Now in the Hypervisor Software Load Balancing L3 Routing L2 Switching Firewalling/ACLs Hardware

Visibility NSX is uniquely positioned to see everything NSX Applications Virtual Infrastructure NSX Physical Network Infrastructure Internet

Granular control becomes possible NSX vSwitch VM Hypervisor High throughput rates on a per-hypervisor basis Every hypervisor adds additional east-west firewalling capacity Native feature of the VMware NSX platform

Delivering better security automation NSX vSwitch VM Hypervisor Platform-based automation Automated provisioning and workload adds/moves/changes Accurate firewall policies follow workloads as they move Centralized management of single logical, distributed firewall

Delivering higher levels of data center security Micro-segmentation 1 2 3 Isolation and segmentation Unit-level trust / least privilege Ubiquity and centralized control VM VM VM

Simplifying network security Production Development Finance HR Security policies no longer tied to network topology Logical groups can be defined Prevents threats from spreading Web VM VM VM VM App VM VM VM VM DB VM VM VM VM

Thank you

DES MOINES 3600 109th Street Urbandale, IA 50322 515.422.9300 KANSAS CITY 6400 Glenwood St.| Suite 314 Overland Park, KS 66202 816.423.8048 OMAHA 5940 S. 118th St. Omaha, NE 68137 402.408.0581