Download presentation
Presentation is loading. Please wait.
Published byKatherine Simpson Modified over 8 years ago
1
Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1
2
Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Trend Micro is No.1 in Server and Virtualization Security Trend Micro 23.7% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Trend Micro 13% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Source: 2011 Technavio – Global Virtualization Security Management Solutions Why is Trend Micro an Expert? 2
3
Copyright 2011 Trend Micro Inc. Trend Micro protects 100% of the top 10 automotive companies. Trend Micro protects 96% of the top 50 global corporations. Trend Micro protects 100% of the top 10 telecom companies. Trend Micro protects 80% of the top 10 banks. Trend Micro protects 90% of the top 10 oil companies. * In calculating the above data, the percentage use of Trend Micro products include usage by parent companies and/or usage by any of their subsidiaries of any Trend Micro product or service. Trend Micro Global 500 Penetration Why is Trend Micro an Expert?
4
Copyright 2011 Trend Micro Inc. Physical Desktops & Servers Desktop Virtualization Server Virtualization Private Cloud Hybrid Cloud Public Cloud Mobile BYOPC 4 Journey to the Cloud Where is Your Data?
5
Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Cross-platform Security One Security Model is Possible across Physical, Virtual, and Cloud Environments New platforms don’t change the threat landscape Each platform has unique security risks Integrated security is needed across all platforms 5
6
Copyright 2011 Trend Micro Inc. Platform-specific Security Risks One Security Model is Possible across Physical, Virtual, and Cloud Environments Visibility & Threats Less visibility More external risks Performance & Threats Security degrades performance New VM-based threats Manageability Glut of security products Less security Higher TCO Virtual Cloud Physical Increase EfficiencyDeliver AgilityReduce Complexity Integrated Security Single Management Console 6
7
Copyright 2011 Trend Micro Inc. Physical Consolidate Physical Security Reduce Complexity
8
Copyright 2011 Trend Micro Inc. Advanced Reporting Module Single Management Console Firewall HIPS / Virtual Patching File Integrity Monitoring Antivirus Log Inspection Web Application Protection One Server Security Platform Reduce Complexity 8
9
Copyright 2011 Trend Micro Inc. Virtual Server and Desktop Virtualization Security Increase Efficiency
10
Copyright 2011 Trend Micro Inc. Typical AV Console 3:00am Scan Antivirus Storm Automatic security scans overburden the system Virtualization Security Challenge: Resource Contention 10
11
Copyright 2011 Trend Micro Inc. Reactivated and cloned VMs can have out-of-date security Dormant Cost Reduction & Consolidation 1 Virtualization Security Challenge: Instant-on Gaps Active Reactivated with out dated security Cloned 11
12
Copyright 2011 Trend Micro Inc. Attacks can spread across VMs Cost Reduction & Consolidation 1 Virtualization Security Challenge: Inter-VM Attacks / Blind Spots 12
13
Copyright 2011 Trend Micro Inc. VM sprawl inhibits compliance 13 Cost Reduction & Consolidation 1 Virtualization Security Challenge: Complexity of Management Patch agents Rollout patterns Provisioning new VMs Reconfiguring agents 13
14
Copyright 2011 Trend Micro Inc. Antivirus Integrity Monitoring AgentlessSecurityforVMware — Antivirus and more Agentless Security for VMware — Antivirus and more VM The Old Way Security Virtual Appliance VM With Agentless Security VM Intrusion Prevention Virtual Patching Firewall Web Application Protection Virtualization Security What is the Solution? A Dedicated Security Virtual Appliance VM Maximizes Performance and ROI 14
15
Copyright 2011 Trend Micro Inc. Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011; Saving estimate based on VMware ROI calculations 3X higher VDI VM consolidation ratios Cost Reduction & Consolidation 1 3-year Savings on 1000 VDI VMs = $539,600 Virtualization Security Increased ROI with Agentless Security Example: Agentless Antivirus 15
16
Copyright 2011 Trend Micro Inc. Security Virtual Appliance VM With Agentless Security VM Virtualization Security What is the Solution? Layered, Virtualization-Aware Security in One Platform VM Protect your efforts to consolidate servers, enable VDI, and support consumerization Integrated Modules: Antivirus Integrity Monitoring Intrusion Prevention Web Application Protection Application Control Firewall Log Inspection Simplified Management Higher Density Optimized Resources Stronger Security 16
17
Copyright 2011 Trend Micro Inc. 17 Keep your virtual systems, applications, and data secure Rules are developed and delivered automatically to protect Before patches are available Unsupported OSs and apps Legacy web applications Devices that are difficult to patch— ATM kiosk, point of sale, medical devices, etc. Prevent business disruption and data breach. Cost Reduction & Consolidation 1 Virtualization Security What is the Solution? Virtual Patching 17
18
Copyright 2011 Trend Micro Inc. vShield Endpoint Security Virtual Machine Other VMware APIs Security agent on individual VMs Integrates with vCenter Antivirus Agentless IDS / IPS Web Application Protection Application Control Firewall Log Inspection Agent-based Virtualization Security Integrity Monitoring vSphere Virtual Environment Cost Reduction & Consolidation 1 Virtualization Security Fitting into the VMware Ecosystem
19
Copyright 2011 Trend Micro Inc. Hypervisor-integrated agentless antivirus released in Nov. 2010 1000 agentless security customers in the first year Over 250,000 VMs are licensed for agentless antivirus Agentless FIM released in 2012 Multiple agentless security modules now available Largest customer purchase is 8,000 VMs Most dense deployment is 300 VMs/host “Deep Security provides a robust set of tools to add to your toolbox. The perceived performance improvement is visible to the naked eye.” - Ed Haletky, Virtualization Practice (www.virtualizationpractice.com) Cost Reduction & Consolidation 1 Virtualization Security Trend Micro Market Momentum Agentless Security 19
20
Copyright 2011 Trend Micro Inc. Cloud Computing Cloud Deployments and Security Deliver Agility
21
Copyright 2011 Trend Micro Inc. Additional Resources Scalability Cost savings Provides business agility Data Access Anytime, anywhere Device flexibility Supports BYOD and consumerization Security is the #1 cloud adoption inhibitor Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011 Cost Reduction & Consolidation 1 Cloud Security Why Companies Turn to the Cloud 21
22
Copyright 2011 Trend Micro Inc. Who is responsible for security ? With IaaS the customer is responsible for VM-level security With SaaS or PaaS the service provider is responsible for security Public Cloud PaaS Public Cloud IaaS ServersVirtualization & Private Cloud End-User (Enterprise) Service Provider Public Cloud SaaS Cost Reduction & Consolidation 1 Cloud Security Cloud Models: Who Has Control? 22
23
Copyright 2011 Trend Micro Inc. Cost Reduction & Consolidation 1 Cloud Security Challenge: Multi-tenancy / Mixed Trust Level VMs Shared resources creates a mixed trust level environment 23
24
Copyright 2011 Trend Micro Inc. Cost Reduction & Consolidation 1 Cloud Security Challenge: Data Access and Governance Cloud data can provide less visibility and control 10010011 01101100 10010011 01101100 24
25
Copyright 2011 Trend Micro Inc. 10011 01110 00101 Cost Reduction & Consolidation 1 Cloud Security Challenge: Data Destruction When data is moved, unsecured data remnants can remain 10011 01110 00101 10011 0 00101 25
26
Copyright 2011 Trend Micro Inc. Patient Medical Records Credit Card Payment Information Sensitive Research ResultsSocial Security Numbers Unreadable for unauthorized users Control of when and where data is accessed Server validation Custody of keys Encryption with Policy-based Key Management Self-defending VM security Agentless and agent-based One management portal for all modules, all deployments vSphere & vCloud Cost Reduction & Consolidation 1 Cloud Security What is the Solution? Data Protection Integration ensures servers have up-to-date security before encryption keys are released
27
Copyright 2011 Trend Micro Inc. VM Data Center Private Cloud Public Cloud VMware vCloud VMware vSphere Encryption throughout your cloud journey— data protection for physical, virtual & cloud Cost Reduction & Consolidation 1 Cloud Security Fitting Encryption into a VMware Ecosystem Enterprise Key Key Service Console Encryption Solution 27
28
Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Virtualization and Cloud Security Pulling It All Together Do you have one solution for physical, virtual, and cloud servers? Does your solution address the risks specific to each platform? Are you maximizing your performance for better ROI? 28
29
Copyright 2011 Trend Micro Inc. VM VMware Virtualization Security Virtual Appliance VM Agentless security Layered server security Encryption for vSphere Private Cloud Agentless security Layered server security Security Virtual Appliance VM Public Cloud Server security console Shared policy profile Virtual patching VM Encryption for vCloud Compliance support (FIM, Encryption, etc.) Encryption console Shared policy profile Key ownership Agent-based security Layered server security Encryption for leading cloud providers Compliance support (FIM, Encryption, etc.) VM Cost Reduction & Consolidation 1 Virtualization and Cloud Security One Security Model 29
30
Copyright 2011 Trend Micro Inc. Virtual Cloud Physical Virtualization and Cloud Security One Security Model is Possible Reduce Your Cost of Operations Reduce Your Investment in Management Increase Application Stability and Performance Achieve Compliance in Virtual and Cloud Environments Get Higher Virtualization and Cloud ROI Safely Use Private, Public, and Hybrid Clouds 30
31
Copyright 2011 Trend Micro Inc.Copyright 2012 Trend Micro Inc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.