RSA RSA Security Solutions for Virtualization Martin de Jongh Martin de Jongh, Presales team lead EMEA North.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

VMware User Group vNews
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.
© 2009 VMware Inc. All rights reserved IT Trends and Industry Vision Doug Bourgeois, Vice President, Chief Cloud Executive, VMware US Public Sector June.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
A Presentation for the Enterprise Architect © 2008 IBM Corporation IBM Technology Day - SOA SOA Governance Miroslav Petrek IT Software Architect
Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development.
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
1© Copyright 2010 EMC Corporation. All rights reserved.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2013 VCE Company, LLC. All rights reserved. CDCA SBIOI April 18, 2013 VCE: A FOUNDATION FOR IT TRANSFORMATION.
SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Amdocs Services Reach New Heights of Success
Tim Vander Kooi Systems
Introduction to VMware Virtualization
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Virtualisation Challenges IBM Smarter Storage Symposium – July 2012 Hardev Sanghera, Partner SE.
Trust: A Cloudy Concept Infrastructure Security in The Cloud Kartik Shahani Country Manager - India & SAARC RSA, The Security Division of EMC.
1© Copyright 2015 EMC Corporation. All rights reserved.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Building a Fully Trusted Authentication Environment
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Microsoft and Symantec
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Clouding with Microsoft Azure
Reduce Risk Across Hybrid IT
Service Assurance in the Age of Virtualization
Reduce Risk Across Hybrid IT
Boost VM Density with AV Designed for VDI
Dell EMC Service Provider Cloud Infrastructure
Partner Toolbox Cloud Infrastructure & Management
Hybrid Management and Security
Reduce Risk Across Hybrid IT
Virtualization & Security real solutions
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Securing Your Digital Transformation
Securing Cloud-Native Applications Jason Schmitt CEO

20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Public Key Infrastructure from the Most Trusted Name in e-Security
NSX Data Center for Security
Microsoft Data Insights Summit
Presentation transcript:

RSA RSA Security Solutions for Virtualization Martin de Jongh Martin de Jongh, Presales team lead EMEA North

22 RSA Market Opportunity RSA capabilities for Virtualization RSA VCE’s Vblock security Words of Wisdom

3 RSA, The Security Division of EMC EMC ² EMC ² is the world leading information infrastructure company enabling organizations to bring the power of their information to life RSA RSA is the world leader in securing information infrastructure ensuring that information is always an asset and never a liability Add Intelligence Virtualize & Automate Store Protect Information VMWare VMWare is the world leading Virtualization company Virtualize, Optimize & Energize

4 RSA RSA Security Leadership Inventors of RSA algorithm 1 st year legacy 25 + organizations protected 35K + phishing attacks shut down 175K + 250M + online identities protected 1B + products shipped with RSA BSAFE ® encryption World’s Largest information security industry event year legacy 25 +

5 RSA RSA Security Leadership Source: Gartner Magic Quadrant Reports Authentication 1 st Data Loss Prevention Leader Web Fraud Detection Leader SIEM Leader Source: Frost & Sullivan

66 RSA Market Opportunity RSA capabilities for Virtualization RSA VCE’s Vblock security Words of Wisdom

2010 IT Budget wishlist for 2010 survey of 1,189 CIOs in the US and Canada.

Market Opportunity In 2009 only 18% of enterprise datacenter workloads that could be virtualized have been virtualized. Biggest increases in spending for 2010: Security (20%), Virtualization (12%) & Cloud Computing………. Through 2012, 60% of virtualized servers will be less secure than the physical servers they replace. In % of virtualization deployment projects undertaken were without involving the information security team in the initial architecture and planning stages.

99 RSA Market Opportunity Cloud Computing RSA capabilities for Virtualization Summary Words of Wisdom

Clouds The Business View of Clouds

Clouds The Security View of Clouds

Security New Cloud Security challenges 1.Information Sensitivity – What information will be going to the cloud? – Are there privacy or confidentiality issues? 2.Information Mobility – Where physically will the information be? Are there legal/sovereignty issues? – Can I be sure I get it all back – and all copies are permanently deleted– if I stop using the cloud vendor or infrastructure? – Will the cloud vendor outsource any of its functions? Can I control that? 3.Transparency, Accountability, Trust – Can I get clarity into whether security controls, and other best practices, are being deployed? – Can I meet audit and compliance requirements for the information or business process? – Can I trust the cloud service provider? 4.Who Are My Neighbors? – Are there controls in terms of who else is using this cloud infrastructure? – Is there good discipline over separation of data, processes and infrastructure? – Is there strong identity management both for customers and for employees? 5.The Human Dimension – Can I get insight into hiring practices and training practices regarding privacy and security?

RSA/EMC/VMWare ’Private’ RSA/EMC/VMWare ’Private’ Cloud strategy

14 RSA Market Opportunity Cloud Computing RSA capabilities for Virtualization Summary Words of Wisdom

RSA Info Centric vs. Perimiter defense RSA capabilities for Virtualization Info Centric vs. Perimiter defense

RSA- within RSA’s approach - Transforming Security within the Virtualized infrastructures RSA RSA’s Vision Surpass the levels of security possible in today’s physical infrastructures by pushing information security enforcement down the virtual stack. Today Most security is enforced by the Network, OS and application stack. Security Management & Reporting (SIEM) vApp and VM layer Virtual Infrastructure (including hypervisor) VDC Services Layer APP OS APP OS APP OS Storage Compute Network 16 Cloud Computing

RSA Virtualization RSA capabilities for Virtualization RSA RSA portfolio Multi-product solutions -Encryption, Identity/Access controls, SIEM & DataLossPrevention RSA RSA SecurBook for VMWare View Solution Architecture Solution deployment and configuration guides Operational guidance for effective using the solution Troubleshooting guidance Solution guides for planning, deploying, and administering RSA solutions in an Virtual infra. “…we don't usually do this as part of our briefings, but I must say I looked at the RSA SecurBook and was very surprised with the level of detail and material in there. Lots of screen shots and other materials I wasn't expecting. Very nicely done. Excellent resource.” - Gartner Analyst, December 2009 “…we don't usually do this as part of our briefings, but I must say I looked at the RSA SecurBook and was very surprised with the level of detail and material in there. Lots of screen shots and other materials I wasn't expecting. Very nicely done. Excellent resource.” - Gartner Analyst, December 2009

RSA RSA Identity & Access controls for the Virtual Infrastructure VMware View (Desktop virtualization-VDI) RSA SecurID & Authentication Manager strong authentication secures access to the portal through which virtual desktops are accessed remotely VMware vSphere (ESX) (Sever virtualization) RSA SecurID & Authentication manager strong authentication secures administrative access to ESX console and vSphere Management Assistant Authentication Manager

RSA RSA Security Management & Reporting for the Virtual and physical infrastructure Overview Ease of analysis, implementation, compliance and change control in VMware environment. RSA enVision collects distinct logs from VMware environment thru 1 seamless, agentless connection – vCenter logs – VMWare Servers logs

RSA RSA enVision (SIEM) VMware Events and Activity

RSA RSA Data Loss Prevention Suite DISCOVER Where is my sensitive data? DISCOVER Where is my sensitive data? MONITOR Where is my sensitive data going? MONITOR Where is my sensitive data going? ENFORCE How do I prevent loss of my data? ENFORCE How do I prevent loss of my data? DLP Datacenter DLP Network DLP Endpoint Enterprise Manager Enterprise Manager Remediation Policies

Network INTERNET vShield Zone1 Zone2 Zone3 VMware VSphere Overview Leverages the capabilities of VMware vShield Zones to deploy RSA DLP internally as a OS imbedded virtual sensor monitoring data traversing among virtual networks. Uses a centrally managed policies and enforcement controls to prevent data loss in the virtual datacenter RSA RSA Data Loss Prevention for Virtual networks RSA DLP Sensor RSA DLP sensor RSA DLP Sensor RSA DLP Sensor vSafe RSA & VMware ‘ vSafe program ’

RSA Solution Suite RSA Solution Suite for Virtual infrastructure RSA SecurID for remote authentication RSA DLP RSA DLP for protection of data in use VMware Ionix SCM VMware Ionix SCM for security config and patch management RSA enVision for security monitoring and reporting RSA SecurID for ESX Service Console

RSAVblock RSA Secures the Core Vblock Platform (VCE) 24 RSA enVision RSA SecurID Strong authentication before access to ESX Service Console and vSphere Management Assistant Comprehensive visibility into security events Security incident management, compliance reporting Security and compliance officer vSphere Management Assistant Vmware Administrator Validated with Vblock vSphere Storage UCS

25 RSA Market Opportunity Cloud Strategy RSA capabilities for Virtualization Summary Words of Wisdom

Secure Information Monitor Infrastructure Protect Identities 100% RSA Summary: Leading the Way Toward 100% Virtualization RSA: Security and Compliance for Virtual Environments Identify targets for low risk virtualization Prevent data leakage between vShield Zones Data Loss Prevention which discovers and protects sensitive data in vShield Zones, VMware View, ESX and Vblock Ensure compliance across virtual and physical with a single platform Native Security Event and Incident Management support for VMware View, ESX, vCenter, vSphere and, Vblock BenefitsCapabilities Assure authorized access into every layer of the virtual environment Strong authentication into VMware View, ESX and Vblock

Additional Information RSA Security Brief: Security Compliance in a Virtual World RSA SecurBook for VMWare View RSA White Paper: VMWare Virtual Desktop Infrastructure Website: RSA Solutions for Virtual Environments RSA White Paper: Desktop Virtualization Management and Security

28 RSA Market Opportunity Cloud Strategy RSA capabilities for Virtualization Summary Words of Wisdom

RSA Internal only Words of Wisdom 29

Thank You!! Merci Grazie Gracias Obrigado Danke Japanese English French Russian German Italian Spanish Brazilian Portuguese Arabic Traditional Chinese Simplified Chinese Thai Korean Tack så mycket Swedish Takk! Norwegian Hartelijk dank! Dutch

Thank you!