2011 / 9/11/2015 2 S V E Security for Virtualized Environments The first comprehensive security solution for.

Slides:



Advertisements
Similar presentations
1 Bitdefender 2013 Virtualization Security Understanding The Impact.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC VSPEX END USER COMPUTING WITH VMWARE HORIZON VIEW For up to 2000 Virtual Desktops.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Antony Jo The University of Montana. Virtualization  The process of abstraction; making something more abstract  Many types: Server Desktop Application.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
David Overton – Partner Account Manager. Defining VDI V-alliance and VDI General Microsoft licensing principles for VDI Key questions you need to answer.
Best of.
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Norman Endpoint Protection Advanced security made easy.
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
© 2010 VMware Inc. All rights reserved Data Protection Module 10.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Introduction to the Microsoft Private Cloud WSV207 Symon Perriman Technical Evangelist Microsoft WSV207.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CredoGov VDI Introduction James Gunn
Introduction to the Virtual Desktop Pilot at Fermilab.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
Introduction to VMware Virtualization
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Why you should upgrade now!. Copyright © 2012 STORServer, All rights reserved. 2 STORServer uses Tivoli Storage Manager and it has been designed to address.
The Changing World of Endpoint Protection
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
V-Alliance Solution Overview Years of Business Success.
Desktop Virtualization
Cloud Interoperability & Standards. Scalability and Fault Tolerance Fault tolerance is the property that enables a system to continue operating properly.
VMware vSphere Configuration and Management v6
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Liberty Mutual Group Asset Management Inc. Group Liberty Mutual Group Asset Management Inc. Business Continuity & Securing Your Data Our responsibilities.
Red Hat Enterprise Linux Presenter name Title, Red Hat Date.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Citrix Academic Network
Chapter 6: Securing the Cloud
Boost VM Density with AV Designed for VDI
Introduction to VMware Virtualization
Ransomware & Security for Virtualization
How to prepare for the End of License of Windows Server 2012/R2
Virtualization & Security real solutions
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Logicom Cloud Marketplace
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Presentation transcript:

/ 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for Windows and Unix servers or desktops, in environments powered by any virtualization technology Solution Presentation – October 11, 2011

/ 9/11/ Do you protect your business or risk getting hacked? Lockheed Martin Hacked in May 2011 Hacking described as “significant and tenacious” Promptly blocked all remote VPN access Over 100,000 users had to change their passwords The International Monetary Fund Hacked in 2011 “This was a very major breach” The attack had occurred over the last few months Attack believed to come in the form of spear phishing

/ 9/11/ Do you protect your business or risk getting hacked? Sony PlayStation Network Hacked in April 2011 “A criminal cyber attack" on its data centre in the US 2 nd data breach for another 25m after 77m people’s details Experts say it could cost Sony & credit card issuers up to 2bn The incident already leaded to legal action and investigations RSA Security Hacked in March 2011 “Serious data breach; SecurID customers vulnerable” Technology tracks the identities of over 250m people Intruder could produce duplicates to RSA cards, making it possible to gain access to corporate networks and systems

/ 9/11/ Why Security for Virtualized Environments? Virtualization has emerged as a major enabler for the modern data center, increasing resource utilization, system support options and resilience Cloud computing technologies further that transformation, bringing on-demand provisioning and scalability to computing users In gaining ever-higher consolidation ratios and operational benefits of virtualization, organizations must not sacrifice Security

/ 9/11/ Security for Virtualized Environments (SVE) by Bitdefender Security for Virtualized Environments (SVE) by Bitdefender provides security that is build specifically for the virtualized environments allowing organizations to maintain higher consolidation ratios across their datacenters.

/ 9/11/ Two types of virtualization: server virtualization 1.For virtualized Windows, Linux and Solaris web/application servers 2.The main server virtualization infrastructure providers are: -VMware vSphere infrastructure (but not Server or Workstation!) -Microsoft with Windows Server 2008 R2 (Hyper-V) -Citrix XenServer infrastructure

/ 9/11/ Two types of virtualization: desktop virtualization 1.It separates a personal computer desktop environment from a physical machine using the client–server model of computing 2.Sometimes called as “Client Virtualization” or “Virtual Desktop Infrastructure” (VDI) 3.The main desktop virtualization infrastructure providers are: VMware View (but not ThinApp or Workstation!) Microsoft has virtual desktop infrastructure in Windows Server 2008 (based on Hyper-V hypervisor technology) Citrix XenDesktop

/ 9/11/ Two approaches: with agent vs. agentless

/ 9/11/ SVE Architecture Delivered within a Security Virtual Appliance running on a hardened Linux Server and is managed by Bitdefender Security Console SVE deduplicates and centralizes much of the scanning functionality at a single, dedicated virtual appliance on each physical host Integrated with Bitdefender Cloud Technologies for offering enhanced protection against 0-day malware Build to include coverage of: Virtualized servers and desktops (VDI) VMware, Citrix, Microsoft, Oracle, or any other system virtualization technology Windows, Linux, and Solaris File event, process, and memory scanning

/ 9/11/ The number-one-ranked security technology On average, Bitdefender detects and shields against 120,000 new e- threats per month and adds over 4,000 new signatures every day Bitdefender customers get around-the-clock protection with more than 16 updates per day, or nearly every hour Bitdefender was the only vendor scoring full 6 points in AV-Test’s Q1/2011 real-world detection capability tests

/ 9/11/ VBSpam award in every single antispam test Bitdefender analyzes and issues protection for 5 million spam messages every day, or about 35 million spam per week Bitdefender has continuously ranked top in Virus Bulletin’s (VB) tests for SPAM winning in July 2011 the 14 th VBSpam award in a row

/ 9/11/ Awards and certifications for Business Solutions CRN Test Center Review 2011 “a must-consider” Bitdefender Business Solutions 3.5, June 2011 AV-Comparatives “Seal of Approval” Bitdefender Business Solutions, September 2011 Gold Award - Bitdefender Business Security Suite Top Ten Reviews, February 2011 Virus Bulletin’s VB100 Award Bitdefender Client Security 3.5, File Servers 3.5, Samba Virus Bulletin’s VBSpam Award Bitdefender Security for Mail Servers 3.0.2, March 2011 Compatible with Windows 7 Bitdefender Client Security 3.5, 3.1.9, December 2010

/ 9/11/ More information at: bitdefender.com/sve

/ 9/11/ Thank you!