INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.

Slides:



Advertisements
Similar presentations
© 2009 VMware Inc. All rights reserved vCenter Site Recovery Manager 5.1.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
The future of Desktops Transform Your Desktop with Virtualization.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Adam Duffy Edina Public Schools.  The heart of virtualization is the “virtual machine” (VM), a tightly isolated software container with an operating.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
VMware Update 2009 Daniel Griggs Solutions Architect, Virtualization Servers & Storage Solutions Practice Dayton OH.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
VIRTUALIZATION AND YOUR BUSINESS November 18, 2010 | Worksighted.
European Organization for Nuclear Research Virtualization Review and Discussion Omer Khalid 17 th June 2010.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
Norman Endpoint Protection Advanced security made easy.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Yury Kissin Infrastructure Consultant Storage improvements Dynamic Memory Hyper-V Replica VM Mobility New and Improved Networking Capabilities.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Microsoft’s Vision for IT as a Service The Server to Virtualized Datacenter to Private & Public Cloud Continuum David Greschler, Director, Microsoft Kondwani.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
Hyper-V Security Tips: Protect yourself from vulnerabilities that you never knew existed Symon PerrimanAlex Karavanov VP, Business DevelopmentDirector.
1 © 2008 Citrix Systems, Inc. — All rights reserved Citrix Essentials for Microsoft Hyper-V Selling & Positioning Strategies Insert speaker name and title.
Get More out of SQL Server 2012 in the Microsoft Private Cloud environment Steven Wort, Xin Jin Microsoft Corporation.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
1 Bitdefender 2013 Bitdefender “What business are we really in?” 1.Theodore Levitt.
ITServices Virtualization Terry Black January 2013.
Introducing Kaspersky Security for Virtualization Peter Beardmore Sr. Director of Product Marketing.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
IT Pro Day Windows Server 2012 Hyper-V – The next chapter Michel Luescher, Senior Consultant Microsoft Thomas Roettinger, Program Manager Microsoft.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Microsoft and Symantec
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Microsoft Azure Powers Optimized Features of ESET File Security and Its Superior Protection, High Detection Speed, and Smooth Operation MICROSOFT AZURE.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Kaspersky Small Office Security INTRODUCING New for 2014!
IT Pro Day Windows Server 2012 Hyper-V – The next chapter Michel Luescher, Senior Consultant Microsoft Thomas Roettinger, Program Manager Microsoft.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Brian Lauge Pedersen Senior DataCenter Technology Specialist Microsoft Danmark.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Simplest and most cost effective for SMBs Optimized & supported for specific hardware One-stop shop for hardware, OS, and CALs Lets partner focus on higher-margin.
PHD Virtual Technologies “Reader’s Choice” Preferred product.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Chapter 6: Securing the Cloud
Barracuda Web Security Flex
Barracuda Web Filtering Service
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Ransomware & Security for Virtualization
Customized Solutions to your needs
Product Datasheet AppSense DataNow 4.1
Capitalize on modern technology
Healthcare Cloud Security Stack for Microsoft Azure
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Cloud Security for Endpoints
Logicom Cloud Marketplace
Healthcare Cloud Security Stack for Microsoft Azure
Increase and Improve your PC management with Windows Intune
How Dell, SAP and SUSE Deliver Value Quickly
Presentation transcript:

INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS

WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM VM CENTRALIZED HW MANAGEMENT STABILITY DATA SECURITY

VIRTUAL ENVIRONMENTS IMMUNITY: TRUE OR FALSE? VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS ‘IN 2012, 60% OF VIRTUALIZED SERVERS WILL BE LESS SECURE THAN THE PHYSICAL SERVERS THEY REPLACE’ Gartner FALSE ? CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 FALSE ? MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES RESIDENT MALWARE CAN

THE GROWING MALWARE THREAT … Spam messages per day 315k+ 30M+ New threats per day Advanced protection is required Web-borne infections prevented per month Network attacks blocked per month 160M 270M 1999 2001 2003 2005 2007 2009 2011 2013

options FOR VIRTUAL PROTECTION NO PROTECTION TRADITIONAL 4 choices to make options FOR VIRTUAL PROTECTION NOT AN OPTION! PROTECTION GAPS LIGHT AGENT AGENTLESS VMWARE SUPPORT ONLY SUPERIOR SECURITY

NO PROTECTION – NOT AN OPTION VIRTUAL INFECTION AND SPREAD VIRTUAL EAVESDROPPING TARGET OF CYBERCRIMINALS MALWARE CAN SURVIVE “TEAR-DOWN” OF NON- PERSISTENT MACHINES

TRADITIONAL PROTECTION APPLIED TO VIRTUAL ENVIRONMENTS AV-STORMS REDUNDANT ANTI-MALWARE AND SIGNATURE FILES HIGHER BOOT LATENCY REDUCED CONSOLIDATION RATIOS

The light agent approach OPTIMIZED PERFORMANCE THROUGH TIGHT HYPERVISOR INTEGRATION LIGHT AGENT ALLOWS IN-DEPTH INDIVIDUAL MACHINE SCANNING FOR MAXIMUM PROTECTION SEPARATE DEDICATED SECURITY VIRTUAL MACHINE HANDLES THE HEAVY WORK. VIRTUAL, PHYSICAL AND MOBILE - MANAGED THROUGH A SINGLE CONSOLE HIGHLY SCALABLE FROM SMB TO LARGE ENTERPRISE ORGANIZATIONS

HOW KSV | LIGHT AGENT WORKS

KSV | LIGHT AGENT HIGHLIGHTS NO ADVERSE EFFECT ON HYPERVISOR PERFORMANCE FAST, STRAIGHTFORWARD DEPLOYMENT WITH NO REBOOTS CONTROLS LIMIT OR BLOCK TIME- AND SPACE- WASTING SOCIAL WEBSITES AND APPLICATIONS SUPPORTS ALL KEY MICROSOFT AND CITRIX VIRTUALIZATION TECHNOLOGIES SHARED CACHE TECHNOLOGY AVOIDS UNNECESSARY RE-SCANNING

File level protection AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION

NETWORK LEVEL PROTECTION FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES

CONTROLS WEB CONTROL APPLICATION CONTROL DEVICE CONTROL Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. WEB CONTROLS ALLOW INAPPROPRIATE INTERNET CONTENT – INCLUDING SOCIAL NETWORKS, MUSIC, VIDEO ETC - TO BE BLOCKED OR LIMITED DURING BUSINESS HOURS. APPLICATION CONTROLS REGULATE AND CONTROL THE OPENING OF PROGRAMS ON INDIVIDUAL VIRTUAL MACHINES. DEVICE CONTROLS PERMIT OR RESTRICT THE USE OF REMOVABLE DEVICES, INCLUDING EXTERNAL DRIVES, PRINTERS, CDS/DVDS, WI-FI OR BLUETOOTH. DEVICE CONTROL

MANAGEMENT - KASPERSKY SECURITY CENTER SINGLE INTUITIVE CONSOLE PHYSICAL, VIRTUAL AND MOBILE ENVIRONMENT MANAGED TOGETHER COMBINED VIRTUAL AND PHYSICAL MACHINE ADMINISTRATION AND REPORTING ‘SINGLE-PANE” APPROACH CREATES EFFICIENCY & SAVINGS FOR STRETCHED IT RESOURCES SCALABLE TO THE MOST COMPLEX ENTERPRISE ENVIRONMENTS

MICROSOFT HYPER-V AND CITRIX XEN SUPPORT A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS KEY SUPPORTED FEATURES: DYNAMIC MEMORY CLUSTER SHARED VOLUMES LIVE BACKUP KEY SUPPORTED FEATURES: DYNAMIC MEMORY CONTROL VM PROTECTION & RECOVERY (VMPR) XENMOTION (LIVE MIGRATION) MULTI-STREAM ICA CITRIX RECEIVER PERSONAL VDISK

FLEXIBLE LICENSING Choose between “Per-machine” or “Per-core” ‘PER MACHINE’ –BASED ON MAXIMUM NUMBER OF ACTIVATED VIRTUAL MACHINES RUNNING CONCURRENTLY ‘PER CORE’ – COVERS ALL HARDWARE CORES ACROSS THE ORGANIZATION /DATA CENTER. ‘PER CORE’ - IDEAL FOR INFRASTRUCTURE AS A SERVICE (IAAS), WHERE VM COUNT FLUCTUATES A SINGLE LICENCE COVERS BOTH HYPER-V, XEN AND VMWARE (AGENTLESS) PLATFORMS

FLEXIBLE LICENSING - HOW IT WORKS A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS PER- CORE PER- MACHINE Virtual Servers and Workstations BAND: 1+ CORE KEY FILE: 1 TERM: 1, 2, 3 YEARS BAND: 1+ SERVERS | 10+ WORKSTATIONS KEY FILE: 1 TERM: 1, 2, 3 YEARS EACH APPROACH APPLIES TO: BASE EDUCATIONAL RENEWAL PUBLIC SECTOR CROSS-GRADE GOVERNMENTAL

KSV | LIGHT AGENT IS: SIMPLIFIED MANAGEMENT PERFORMANCE ADVANCED FILE LEVEL PROTECTION NETWORK PROTECTION VIRTUAL MACHINE CONTROLS

KASPERSKY SECURITY FOR VIRTUALIZATION - LIGHT AGENT PROVIDES OUTSTANDING PROTECTION AND CONTROLS FOR HYPER-V AND XEN PLATFORMS AT FILE AND NETWORK LEVEL, WITHOUT COMPROMISING PERFORMANCE.

Thank you! Contact Kaspersky or your preferred reseller for more information on Kaspersky’s virtualization security options