INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS
WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM VM CENTRALIZED HW MANAGEMENT STABILITY DATA SECURITY
VIRTUAL ENVIRONMENTS IMMUNITY: TRUE OR FALSE? VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS ‘IN 2012, 60% OF VIRTUALIZED SERVERS WILL BE LESS SECURE THAN THE PHYSICAL SERVERS THEY REPLACE’ Gartner FALSE ? CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 FALSE ? MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES RESIDENT MALWARE CAN
THE GROWING MALWARE THREAT … Spam messages per day 315k+ 30M+ New threats per day Advanced protection is required Web-borne infections prevented per month Network attacks blocked per month 160M 270M 1999 2001 2003 2005 2007 2009 2011 2013
options FOR VIRTUAL PROTECTION NO PROTECTION TRADITIONAL 4 choices to make options FOR VIRTUAL PROTECTION NOT AN OPTION! PROTECTION GAPS LIGHT AGENT AGENTLESS VMWARE SUPPORT ONLY SUPERIOR SECURITY
NO PROTECTION – NOT AN OPTION VIRTUAL INFECTION AND SPREAD VIRTUAL EAVESDROPPING TARGET OF CYBERCRIMINALS MALWARE CAN SURVIVE “TEAR-DOWN” OF NON- PERSISTENT MACHINES
TRADITIONAL PROTECTION APPLIED TO VIRTUAL ENVIRONMENTS AV-STORMS REDUNDANT ANTI-MALWARE AND SIGNATURE FILES HIGHER BOOT LATENCY REDUCED CONSOLIDATION RATIOS
The light agent approach OPTIMIZED PERFORMANCE THROUGH TIGHT HYPERVISOR INTEGRATION LIGHT AGENT ALLOWS IN-DEPTH INDIVIDUAL MACHINE SCANNING FOR MAXIMUM PROTECTION SEPARATE DEDICATED SECURITY VIRTUAL MACHINE HANDLES THE HEAVY WORK. VIRTUAL, PHYSICAL AND MOBILE - MANAGED THROUGH A SINGLE CONSOLE HIGHLY SCALABLE FROM SMB TO LARGE ENTERPRISE ORGANIZATIONS
HOW KSV | LIGHT AGENT WORKS
KSV | LIGHT AGENT HIGHLIGHTS NO ADVERSE EFFECT ON HYPERVISOR PERFORMANCE FAST, STRAIGHTFORWARD DEPLOYMENT WITH NO REBOOTS CONTROLS LIMIT OR BLOCK TIME- AND SPACE- WASTING SOCIAL WEBSITES AND APPLICATIONS SUPPORTS ALL KEY MICROSOFT AND CITRIX VIRTUALIZATION TECHNOLOGIES SHARED CACHE TECHNOLOGY AVOIDS UNNECESSARY RE-SCANNING
File level protection AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION
NETWORK LEVEL PROTECTION FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
CONTROLS WEB CONTROL APPLICATION CONTROL DEVICE CONTROL Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. WEB CONTROLS ALLOW INAPPROPRIATE INTERNET CONTENT – INCLUDING SOCIAL NETWORKS, MUSIC, VIDEO ETC - TO BE BLOCKED OR LIMITED DURING BUSINESS HOURS. APPLICATION CONTROLS REGULATE AND CONTROL THE OPENING OF PROGRAMS ON INDIVIDUAL VIRTUAL MACHINES. DEVICE CONTROLS PERMIT OR RESTRICT THE USE OF REMOVABLE DEVICES, INCLUDING EXTERNAL DRIVES, PRINTERS, CDS/DVDS, WI-FI OR BLUETOOTH. DEVICE CONTROL
MANAGEMENT - KASPERSKY SECURITY CENTER SINGLE INTUITIVE CONSOLE PHYSICAL, VIRTUAL AND MOBILE ENVIRONMENT MANAGED TOGETHER COMBINED VIRTUAL AND PHYSICAL MACHINE ADMINISTRATION AND REPORTING ‘SINGLE-PANE” APPROACH CREATES EFFICIENCY & SAVINGS FOR STRETCHED IT RESOURCES SCALABLE TO THE MOST COMPLEX ENTERPRISE ENVIRONMENTS
MICROSOFT HYPER-V AND CITRIX XEN SUPPORT A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS KEY SUPPORTED FEATURES: DYNAMIC MEMORY CLUSTER SHARED VOLUMES LIVE BACKUP KEY SUPPORTED FEATURES: DYNAMIC MEMORY CONTROL VM PROTECTION & RECOVERY (VMPR) XENMOTION (LIVE MIGRATION) MULTI-STREAM ICA CITRIX RECEIVER PERSONAL VDISK
FLEXIBLE LICENSING Choose between “Per-machine” or “Per-core” ‘PER MACHINE’ –BASED ON MAXIMUM NUMBER OF ACTIVATED VIRTUAL MACHINES RUNNING CONCURRENTLY ‘PER CORE’ – COVERS ALL HARDWARE CORES ACROSS THE ORGANIZATION /DATA CENTER. ‘PER CORE’ - IDEAL FOR INFRASTRUCTURE AS A SERVICE (IAAS), WHERE VM COUNT FLUCTUATES A SINGLE LICENCE COVERS BOTH HYPER-V, XEN AND VMWARE (AGENTLESS) PLATFORMS
FLEXIBLE LICENSING - HOW IT WORKS A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS PER- CORE PER- MACHINE Virtual Servers and Workstations BAND: 1+ CORE KEY FILE: 1 TERM: 1, 2, 3 YEARS BAND: 1+ SERVERS | 10+ WORKSTATIONS KEY FILE: 1 TERM: 1, 2, 3 YEARS EACH APPROACH APPLIES TO: BASE EDUCATIONAL RENEWAL PUBLIC SECTOR CROSS-GRADE GOVERNMENTAL
KSV | LIGHT AGENT IS: SIMPLIFIED MANAGEMENT PERFORMANCE ADVANCED FILE LEVEL PROTECTION NETWORK PROTECTION VIRTUAL MACHINE CONTROLS
KASPERSKY SECURITY FOR VIRTUALIZATION - LIGHT AGENT PROVIDES OUTSTANDING PROTECTION AND CONTROLS FOR HYPER-V AND XEN PLATFORMS AT FILE AND NETWORK LEVEL, WITHOUT COMPROMISING PERFORMANCE.
Thank you! Contact Kaspersky or your preferred reseller for more information on Kaspersky’s virtualization security options