Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud With a Smart Protection.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud Confidential | Copyright.
The Microsoft Cloud Azure Platform This presentation incorporates some content from Microsoft.
Security Issues and Challenges in Cloud Computing
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Cloud Computing (101).
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
1 Enabling Desktops as a Service ® The Secret to Choosing a Successful Virtual Desktop Model Danny Allan, CTO March 10, 2012.
SOFTWARE AS A SERVICE PLATFORM AS A SERVICE INFRASTRUCTURE AS A SERVICE.
Cloud Computing Myths and Realities Towards a policy Framework for Arab countries.
Plan Introduction What is Cloud Computing?
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
WHAT IS PRIVATE CLOUD? Michał Jędrzejczak Główny Architekt Rozwiązań Infrastruktury IT
Copyright 2011 Trend Micro Inc. Securing your Journey to the Cloud Kamal Sharma Technical Consultant Classification 8/27/
CLOUD COMPUTING For Beginners.
Introduction to Cloud Computing
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Derek Slayton Sr. Director, Products Citrix Systems.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Web Site Content Protection Solution. Protecting Web Site Content with.
Prepared By : Bhavin Tank(S.Y.B.Sc.(IT)) College of Computer Science & IT, Junagadh Cloud Computing.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Cloud Computing John Engates CTO, Rackspace Presented: Rackspace Customer Conference, 2008 October 29, 2008.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
INTRODUCTION TO CLOUD COMPUTING ggg UNDERSTANDING CLOUD COMPUTING UNDERSTANDING CLOUD COMPUTING DEFINITION CLOUD COMPUTING.
Cloud Interoperability & Standards. Scalability and Fault Tolerance Fault tolerance is the property that enables a system to continue operating properly.
Martijn Vlek Sr Director Fusion Middleware Oracle EMEA
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
Clouding with Microsoft Azure
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
Boost VM Density with AV Designed for VDI
Understanding The Cloud
Avenues International Inc.
What is Cloud Computing - How cloud computing help your Business?
Hot Topics:Mobility in the Cloud
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Virtualization & Security real solutions
Cloud Computing ISY143.
Cloud Testing Shilpi Chugh.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Emerging technologies-
Computers Are Your Future Twelfth Edition
Cloud Computing: Concepts
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Healthcare Cloud Security Stack for Microsoft Azure
Presentation transcript:

Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era

Copyright 2009 Trend Micro Inc. The Evolving Datacenter Lowering Costs, Increasing Flexibility Classification 11/3/10 18 Physical Servers virtualized in scalable, shared, automated & elastic environment Private Cloud Public Cloud Select enterprise applications in public cloud Virtual Servers virtualized with minimal changes to datacenter processes Traditional datacenter Security Challenges

Copyright 2009 Trend Micro Inc. Resource contention Typical AV Console 3:00am Scan Security Inhibitors to Virtualization 1

Copyright 2009 Trend Micro Inc. Active Dormant Reactivated with out-of-date security     Instant-on gaps 2 New VMs Security Inhibitors to Virtualization

Copyright 2009 Trend Micro Inc. Patch agents Rollout patterns Provisioning new VMs Complexity of Management 3 Reconfiguring agents Security Inhibitors to Virtualization

Copyright 2009 Trend Micro Inc. DeepSecurity – A coordinated approach Hypervisor Security VM Deep Packet InspectionFirewallAnti VirusLog InspectionIntegrity Monitoring Also works for VDI

Copyright 2009 Trend Micro Inc. Control vs Responsibility? ServersVirtualization & Private Cloud Public Cloud PaaS Public Cloud IaaS Public Cloud SaaS 21 % Enterprise Responsibility Control Gap

Copyright 2009 Trend Micro Inc. Amazon Web Services™ Customer Agreement Security. We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications. (3 March 2010) The cloud customer has responsibility for security and needs to plan for protection.

SecureCloud: Enterprise Controlled Data Protection for the Cloud Enterprise Datacenter or SaaS Offering Patent pending Trend Micro technology enables enterprises to retain control of data in the cloud Enterprise Key 1DeepSecurity creates a secure shell within which it is safe to process sensitive data 2.All data is encrypted before it leaves the secure shell 3.The encryption keys are controlled by the data owner, not the cloud service provider

Copyright 2009 Trend Micro Inc. A New Model for Security – Securing the Computing Chain All environments should be considered un-trusted Users access app Image ensures data is always encrypted and managed Host defends itself from attack Encrypted Data Encryption keys controlled by data owner When this whole chain is secure: Components can move Shared ROI goes up Location doesn’t matter Virtual “neighbours” don’t matter