NSX Data Center for Security

Slides:



Advertisements
Similar presentations
Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh †‡ Srikanth Kandula ‡ Albert Greenberg ‡ †‡
Advertisements

Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
How to protect your Virtual Datacenter Michiel van den Bos.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
VMware NSX and Micro-Segmentation
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Transforming Server Virtualization with Cisco VN-Link Belmont Chia Consulting System Engineer.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
“ For A Moment, I Had A Feeling Of Total Security. Then Someone Said Cloud! “
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
Virtualization to Cloud: Accelerating Efficiency in the Data Center Hugh Jenkins Next Generation Compute Solutions.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SDN & NFV Driving Additional Value into Managed Services.
Check Point vSEC STORY [Protected] Non-confidential content.
NSX and vRealize Network Insight
Hybrid Management and Security
Chapter 6: Securing the Cloud
Stop Cyber Threats With Adaptive Micro-Segmentation
Organizations Are Embracing New Opportunities
Six Steps to Secure Access for Privileged Insiders and Vendors
Business Continuity Robert Hedblom | sumNERV John Joyner | ClearPointe
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Accelerate Your Journey to Cloud
New Heights by Guiding Them into the Cloud
Microsoft SharePoint Server 2016
Six Steps to Secure Access for Privileged Insiders and Vendors
1.
CIS 332 Course Experience Tradition / snaptutorial.com
Speaker’s Name, SAP Month 00, 2017
Best Practices for Securing Hybrid Clouds
How to prepare for the End of License of Windows Server 2012/R2
Threat Ready: The Benefits of Segmentation
Bill Banks | Security Engineer
Virtualization & Security real solutions
Secure & Unified Identity
VMware NSX and Micro-Segmentation
2018 Real Cisco Dumps IT-Dumps
Company Overview & Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Network Optimizer Optimize Your Business & Cloud Networks
Ed oms team OMS: Log Analytics Ed oms team.
Is your deployment in pants-down mode?
Automating Security in the Cloud
Brandon Traffanstedt Systems Engineer - Southeast
<Service provider solution name>
How to address security, cost, IT and migration concerns
The Software-Defined Perimeter in Action
DATS International Portfolio.
4/3/2019 8:56 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Dynamic WAN Selection Optimize Your Business & Cloud Networks
GRC - A Strategic Approach
Plan and design the solution
Recommendation Tree from a Marketing Manager
Recommendation Tree from a Marketing Manager
Presentation transcript:

NSX Data Center for Security CHALLENGES NSX Data Center for Security Cheat Sheet Rate of security breaches is increasing, despite increased security spending Data Breaches PERSONAS Lack of internal controls Few internal network controls exist to protect applications from lateral spread of attacks VP of Security/CISO Prevent data breaches Reduce security risk Maintain compliance Manage security operations Director of Networking Balance security with usability and accessibility Ensure 24/7 network uptime Reduce troubleshooting time Director of Infrastructure Do more with less Ensure infrastructure security, availability, and reliability Consolidate data centers Improve mobility support Applications and data change rapidly, security policies can’t keep up Constant change Apps and data are highly distributed across workloads, sites, and clouds – the traditional perimeter has dissolved Distributed apps and data Very little visibility exists into east-west traffic between applications in the data center Visibility DISCOVERY Have you failed an audit or suffered a data breach recently? Do you have good insight into east-west data center traffic? Do you contend with managing disparate security policies on-prem and in the cloud? What do you currently use to secure east-west data center traffic? How do you detect and respond to threats on data center endpoints? Is it difficult to maintain security policies as applications change over time? Is your network security provisioning automated?

Dynamic Service Insertion Network & Application Visibility SOLUTION COMPONENTS Micro-segmentation Micro-segment applications to prevent the lateral spread of threats throughout data center Dynamic Service Insertion Insert third party security services into the hypervisor to improve security posture and increase data center traffic efficiency Network & Application Visibility Gain visibility into application communication across data center to implement effective security policies. TRIGGERS/USE CASES Recent data breach or failed audit VDI project or newly deployed VDI environment Security hardware/software refresh (e.g. firewall, AV) Looking to embrace hybrid or cloud environment OBJECTION HANDLING VMware software is usually owned by the VI Admin, with NSX I will lose control of the network. NSX deployments that are most successful are led by the network team, but in close partnership with multiple teams including security and VI teams. However, NSX is a networking and security tool built specifically for Network Operations and Network Security practitioners. There is often a misperception that NSX removes power from networking practitioners. The features and capabilities are designed to solve their challenges and to give them more power and flexibility through the advantages of software. Micro-segmentation seems complicated and we don’t know where to start. There are a few hurdles to a micro-segmented environment that can trip up an organization: determining which policies to create, determining necessary security groups, maintaining policies over time. NSX Data Center’s built-in features and additional management tools address these challenges (Automatic rule/security group creation, automated provisioning capabilities, etc.) and VMware has best-practice guides to help customers through the process (5 Steps to Micro-segmentation). Can I replace my physical firewalls used to secure east-west traffic with NSX Data Center? Many customers find that they can replace or reduce the number of physical firewalls in their environment by leveraging Dynamic Service Insertion and the NSX distributed firewall capabilities to secure east-west traffic. WHY NSX DATA CENTER Intrinsic security, not bolted-on Security as agile and scalable as the apps and data it protects Enforce least-privilege across entire infrastructure RESOURCES NSX Vault Page Cyber Hygiene White Paper Virtual Network Assessment (VNA) Forrester Zero Trust White Paper Micro-segmentation Solution Brief Micro-segmentation for Dummies WHAT YOU NEED TO DO See it – Share demos on YouTube Try it – Use the Virtual Network Assessment to show customers what east-west traffic looks like in their environment today Try it – Leverage Hands-On-Labs to provide customers their own test-drive experience with the products Use this Cheat Sheet as your go-to resource to start conversations about Modern Security with your customers