Copyright 2009 Trend Micro Inc. Paul Burton Pre-Sales Manager -NEUR How Trend Micro address virtualisation challenges Classification 7/13/2015 1.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud Confidential | Copyright.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
Copyright 2010 Trend Micro Inc. Security and Compliance challenges in the Virtualized data centre John Burroughs, CISSP Solution Architect, EMEA Trend.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
5205 – IT Service Delivery and Support
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright 2011 Trend Micro Inc. Securing your Journey to the Cloud Kamal Sharma Technical Consultant Classification 8/27/
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
[Name / Title] [Date] Effective Threat Protection Strategies.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 1 Hosted Network Security EarthLink Complete™ Data.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Bill Jensen Bashar Kachachi Session Code: SIA309.
2015 Security Conference Dave Gill Intel Security.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Mailjet and Microsoft Azure Offer All-in-One Infrastructure and Deliverability while Saving IT and Enterprise Time and Money with Scalability MICROSOFT.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Microsoft Azure Powers Optimized Features of ESET File Security and Its Superior Protection, High Detection Speed, and Smooth Operation MICROSOFT AZURE.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1.
Boost VM Density with AV Designed for VDI
Infrastructure as a Service
Virtualization & Security real solutions
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Healthcare Cloud Security Stack for Microsoft Azure
Presentation transcript:

Copyright 2009 Trend Micro Inc. Paul Burton Pre-Sales Manager -NEUR How Trend Micro address virtualisation challenges Classification 7/13/2015 1

Copyright 2009 Trend Micro Inc. Agenda Server Virtualisation –Deep Security 7.5 Virtual Desktop Infrastructure –Officescan 10.5

Copyright 2009 Trend Micro Inc. The Benefits of Virtualisation Classification 7/13/ Reduce IT Capital Expense by 50% £ Reduce Administration overhead Reduce IT operational expense Increased Flexibility ScalabilityBusiness Agility

Copyright 2009 Trend Micro Inc. Server Virtualisation Classification 7/13/2015 4

Copyright 2009 Trend Micro Inc. Challenges of Virtualisation Security Same threats as in physical environments –Software Vulnerability Exploits –Patch Management –Web ApplicationThreats –Policy & Compliance –System & Data Integrity New challenges: 1.Inter-VM traffic 2.vMotion 3.VM Sprawl 4.Dormant VMs 5.Resource contention 7/13/2015 5

Copyright 2009 Trend Micro Inc. Virtualisation Security Challenges Same threats as in physical environments New challenges: 7/13/2015 Security ChallengesCompliance Challenge Inter Virtual Machine TrafficNetwork Segmentation IDS/IPS Concentration of Virtual Machine with Mixed Trust Levels Network Segmentation IDS/IPS Variable State - Instant ON, Reverted, Paused, Copied, Restarted... Network Segmentation IDS/IPS Patch Management Anti Virus Integrity Monitoring Virtual Machine MovementNetwork Segmentation IDS/IPS Virtual Machine SprawlNetwork Segmentation IDS/IPS

Copyright 2009 Trend Micro Inc. 7 IDS / IPS Web Application Protection Application Control Firewall Deep Packet Inspection Integrity Monitoring Log Inspection Anti-Virus Detects and blocks known and zero-day attacks that target vulnerabilities Shields web application vulnerabilities Provides increased visibility into, or control over, applications accessing the network Reduces attack surface. Prevents DoS & detects reconnaissance scans Detects malicious and unauthorized changes to directories, files, registry keys… Optimizes identification of important security events across multiple log files Detects and blocks malware (viruses & worms, Trojans) Trend Micro Deep Security Protection is delivered via Agent and/or Virtual Appliance 5 protection modules

Copyright 2009 Trend Micro Inc. Deep Security Product Components Deep Security Manager Deep Security Manager Security Center Alerts Security Profiles Security Updates Reports 8 Deep Security Agent Deep Security Agent Deep Security Virtual Appliance Deep Security Virtual Appliance

Copyright 2009 Trend Micro Inc. - Firewall - IDS / IPS - Anti-Malware The Trend Micro Approach 9 ESX Server Security VM Dormant Comprehensive, coordinated protection for all VMs Local, agent-based protection in the VM Security VM that secures VMs from the outside Multiple protection capabilities Integrates with VMware vCenter and VMsafe Vmsafe EPSEC/Seraph API Active

Copyright 2009 Trend Micro Inc. PHYSICAL VIRTUALCLOUD Integrity Monitoring Integrity Monitoring Log Inspection Log Inspection Secure Server Virtualization with Deep Security Anti – Malware Anti – Malware Firewall Deep Packet Inspection Deep Packet Inspection Within the DSVA

Copyright 2009 Trend Micro Inc. Why Customers Buy Deep Security Compliance –Reason to do it today –Internal compliance, security policy –External compliance, like PCI –Detailed reporting, audit support Virtualization Security –Reason to revisit security practices –Provides security necessary to achieve100% virtualization –Enables mobility and evolution to cloud computing Defense in Depth / Business Continuity –Best practice –Preventing data breach and business disruption –Zero-day protection and virtual patching –Detecting suspicious activity 7/13/ Confidential

Copyright 2009 Trend Micro Inc. Deep Security Center (also known as Labs) Dedicated team of security experts Track global vulnerabilities –100+ sources of information (public, private, govt): SANS, CERT, Bugtraq, VulnWatch, PacketStorm, and Securiteam –Member of Microsoft Active Protections Program Respond to new vulnerabilities and threats –Advisories & Security updates Six-step, rapid response process supported by automated tools On-going research to improve overall protection mechanisms 12 © Third Brigade, Inc.

Copyright 2009 Trend Micro Inc. Classification 7/13/ Deep Security Protection “Provides targeted, server and application protection for the widest range of platforms used to run mission critical systems”

Copyright 2009 Trend Micro Inc. What Is Core Protection for VMs? 7/13/ Trend Micro Confidentia l  Scanning and Cleaning offline VMs from dedicated scanning VM  Scheduled scan of active VMs from dedicated scanning VM  Local scanning & cleaning of active VMs agent through local real-time agent

Copyright 2009 Trend Micro Inc. Desktop Virtualisation Classification 7/13/

Copyright 2009 Trend Micro Inc. IT Environment Changes Threat Landscape Exponential growth in malware Web is number1 infection vector Vulnerabilities are exploited more quickly Web-based attacks

Copyright 2009 Trend Micro Inc. Signature file updates take too long Signature files are becoming too big Patches cannot be deployed in time Unique threat samples PER HOUR IT Environment Changes Challenge: Traditional Approaches Fail

Copyright 2009 Trend Micro Inc. IT Environment Changes virtualisation Enterprises extend virtualisation to desktops –Lower operational cost than physical hardware Easier deployment, patching, application provisioning –Extended desktop hardware lifecycles Windows 7 rollout funds may get reassigned to VDI –Security and data protection Data never leaves the data centre –Regulatory compliance More tightly controlled environment VDI adoption results in mixed environments

Copyright 2009 Trend Micro Inc. IT Environment Changes Challenge: Securing virtual desktops Malware risk potential: Identical to physical desktops New challenges, unique to VDI: –Identify endpoints virtualisation status –Manage resource contention CPU Storage IOPs Network

Copyright 2009 Trend Micro Inc. The “9-AM problem” –Multiple users log in and get updates at the same time Scheduled scans –Adds significant load to the endpoint –Multiplied by number of VMs Cumulative system load Conventional Endpoint Security Limits Desktop virtualisation Benefits IT Environment Changes Challenge: Resource Contention with VDI

Copyright 2009 Trend Micro Inc. IT Environment Changes Windows 7 First major Operating System rollout in years Higher endpoint requirements: –Call for desktop hardware refresh –Fuel adoption of desktop virtualisation Enterprise re-evaluate their endpoint protection: –Preserve Windows 7 performance –Bridge multiple Windows versions to support a smooth migration

Copyright 2009 Trend Micro Inc. 22 OfficeScan Innovative cloud-based technology  Policy based Web Reputation prevents access to malicious or infiltrated websites  New File Reputation provides faster protection with a minimal footprint Endpoint-centric security  Built-in threat cleaning automatically cleans endpoints when needed  Device control protects removable storage devices  Industries first solution optimized for Virtual Desktop Infrastrucutre (VMWARE & CITRIX) Advanced Firewall  Shields vulnerabilities before patching is possible  Protects from zero-day attacks

Copyright 2009 Trend Micro Inc. OfficeScan Plug-in architecture extends the solution lifecycle Adds protection technology –Virtual Patching –VDI Intelligence Adds management capabilities –Smartphones and PDAs –Apple MacIntosh computers OfficeScan Console Plug-in Manager

Copyright 2009 Trend Micro Inc. VDI-Intelligence Increases consolidation rates Prevents resource contention Pays for itself Comprehensive Protection Smart Protection Network Local Cloud support Virtual patching plug-in Introducing OfficeScan 10.5 Industry‘s first VDI-aware endpoint security 5 Best for Windows 7 Logo certification 32 bit and 64 bit Extensible plug-in architecture Enterprise-class management Scalability Role-based administration Active Directory Integration

Copyright 2009 Trend Micro Inc. OfficeScan 10.5 has VDI-Intelligence Detects whether endpoints are physical or virtual –With VMware View –With Citrix XenDesktop Serialises updates and scans –Controls the number of concurrent scans and updates per VDI host –Maintains availability and performance of the VDI host –Faster than concurrent approach Uses Base-Images to further shorten scan times –Pre-scans and white-lists VDI base-images –Prevents duplicate scanning of unchanged files on a VDI host –Further reduces impact on the VDI host

Copyright 2009 Trend Micro Inc. CLOUD-CLIENT ARCHITECTURE Speeds protection In-the-cloud technologies are constantly updated Frees resources Offloads growing patterns to the cloud Smart Protection Network GLOBAL THREAT INTELLIGENCE Correlated Integrates web, , and file reputation databases Instant feedback Immediately updates using global feedback loops WEB FILE

Copyright 2009 Trend Micro Inc. Prevents users from opening infected files Eliminates signature management effort Reduces resource impact on endpoints Enables accurate risk management Feeds back threat information into Smart Protection Network File Reputation Smart Protection Network Blocks access to dangerous web content Protects both on and off the network Supports any application Limits exposure to today‘s threats Web Reputation WEB FILE

Copyright 2009 Trend Micro Inc. Local Cloud Option for File Reputation AND Web Reputation Corporate Network Internet Local Smart Protection Network Server Query CRC/URL Immediate response FILE REPUTATION WEB REPUTATION Constant, real-time updates happen in the cloud Query CRC/URL Immediate response

Copyright 2009 Trend Micro Inc. Windows 7 support Logo-certification as compatible with Windows 7 –Supports XP, Vista, Win7 –Windows POSReady, Windows Embedded Enterprise –Supports Server 2003, 2003R2, 2008 and 2008R2 Integrates with Windows 7 Action centre Support for 32 and 64 bit environments Easy migration from physical to virtual deployments accross versions of Windows

Copyright 2009 Trend Micro Inc. Virtual Patching Intrusion Defense Firewall plug-in –Determines missing patches and existing vulnerabilities Operating System Common desktop applications –Recommends set of lightweight, fast-to-deploy filters Virtually patches the vulnerabilities Zero-Day protection Reports on attempts to exploit vulnerabilities –Removes filters as soon as the patch is deployed Patch endpoints on your terms, Without exposing them to exploits

Copyright 2009 Trend Micro Inc. The Result: Best overall protection in real-world tests

Copyright 2009 Trend Micro Inc. Enterprise-class management Unified management for physical and virtual endpoints Enterprise-class scalability –20,000 or more endpoints per single management server –Allows consolidation of management stations Role-based administration –Supports task delegation –Client-tree domains and sub-domains segregate customers/regions Improved Active Directory Integration –Bi-directional synchronisation with Active Directory –Security compliance reports highlight unprotected endpoints

Copyright 2009 Trend Micro Inc. Summary Industry‘s first VDI-aware endpoint security solution –optimised for physical and virtual desktops –optimises VDI Return on Investment –Pays for itself in 3 months or less Best Security for Windows 7 Smart Protection Network –File Reputation and Web Reputation drastically reduce risk exposure –Local Cloud deployment option for privacy and performance Management enhancements –Enables management server consolidation –More granular Role-based Administration

Copyright 2009 Trend Micro Inc. Classification 7/13/