Download presentation
Presentation is loading. Please wait.
1
RSA RSA Security Solutions for Virtualization Martin de Jongh Martin de Jongh, Presales team lead EMEA North
2
22 RSA Market Opportunity RSA capabilities for Virtualization RSA VCE’s Vblock security Words of Wisdom
3
3 RSA, The Security Division of EMC EMC ² EMC ² is the world leading information infrastructure company enabling organizations to bring the power of their information to life RSA RSA is the world leader in securing information infrastructure ensuring that information is always an asset and never a liability Add Intelligence Virtualize & Automate Store Protect Information VMWare VMWare is the world leading Virtualization company Virtualize, Optimize & Energize
4
4 RSA RSA Security Leadership Inventors of RSA algorithm 1 st year legacy 25 + organizations protected 35K + phishing attacks shut down 175K + 250M + online identities protected 1B + products shipped with RSA BSAFE ® encryption World’s Largest information security industry event year legacy 25 +
5
5 RSA RSA Security Leadership Source: Gartner Magic Quadrant Reports Authentication 1 st Data Loss Prevention Leader Web Fraud Detection Leader SIEM Leader Source: Frost & Sullivan
6
66 RSA Market Opportunity RSA capabilities for Virtualization RSA VCE’s Vblock security Words of Wisdom
7
2010 IT Budget wishlist for 2010 survey of 1,189 CIOs in the US and Canada.
8
Market Opportunity In 2009 only 18% of enterprise datacenter workloads that could be virtualized have been virtualized. Biggest increases in spending for 2010: Security (20%), Virtualization (12%) & Cloud Computing………. Through 2012, 60% of virtualized servers will be less secure than the physical servers they replace. In 2009 40% of virtualization deployment projects undertaken were without involving the information security team in the initial architecture and planning stages.
9
99 RSA Market Opportunity Cloud Computing RSA capabilities for Virtualization Summary Words of Wisdom
10
Clouds The Business View of Clouds
11
Clouds The Security View of Clouds
12
Security New Cloud Security challenges 1.Information Sensitivity – What information will be going to the cloud? – Are there privacy or confidentiality issues? 2.Information Mobility – Where physically will the information be? Are there legal/sovereignty issues? – Can I be sure I get it all back – and all copies are permanently deleted– if I stop using the cloud vendor or infrastructure? – Will the cloud vendor outsource any of its functions? Can I control that? 3.Transparency, Accountability, Trust – Can I get clarity into whether security controls, and other best practices, are being deployed? – Can I meet audit and compliance requirements for the information or business process? – Can I trust the cloud service provider? 4.Who Are My Neighbors? – Are there controls in terms of who else is using this cloud infrastructure? – Is there good discipline over separation of data, processes and infrastructure? – Is there strong identity management both for customers and for employees? 5.The Human Dimension – Can I get insight into hiring practices and training practices regarding privacy and security?
13
RSA/EMC/VMWare ’Private’ RSA/EMC/VMWare ’Private’ Cloud strategy
14
14 RSA Market Opportunity Cloud Computing RSA capabilities for Virtualization Summary Words of Wisdom
15
RSA Info Centric vs. Perimiter defense RSA capabilities for Virtualization Info Centric vs. Perimiter defense
16
RSA- within RSA’s approach - Transforming Security within the Virtualized infrastructures RSA RSA’s Vision Surpass the levels of security possible in today’s physical infrastructures by pushing information security enforcement down the virtual stack. Today Most security is enforced by the Network, OS and application stack. Security Management & Reporting (SIEM) vApp and VM layer Virtual Infrastructure (including hypervisor) VDC Services Layer APP OS APP OS APP OS Storage Compute Network 16 Cloud Computing
17
RSA Virtualization RSA capabilities for Virtualization RSA RSA portfolio Multi-product solutions -Encryption, Identity/Access controls, SIEM & DataLossPrevention RSA RSA SecurBook for VMWare View Solution Architecture Solution deployment and configuration guides Operational guidance for effective using the solution Troubleshooting guidance Solution guides for planning, deploying, and administering RSA solutions in an Virtual infra. “…we don't usually do this as part of our briefings, but I must say I looked at the RSA SecurBook and was very surprised with the level of detail and material in there. Lots of screen shots and other materials I wasn't expecting. Very nicely done. Excellent resource.” - Gartner Analyst, December 2009 “…we don't usually do this as part of our briefings, but I must say I looked at the RSA SecurBook and was very surprised with the level of detail and material in there. Lots of screen shots and other materials I wasn't expecting. Very nicely done. Excellent resource.” - Gartner Analyst, December 2009
18
RSA RSA Identity & Access controls for the Virtual Infrastructure VMware View (Desktop virtualization-VDI) RSA SecurID & Authentication Manager strong authentication secures access to the portal through which virtual desktops are accessed remotely VMware vSphere (ESX) (Sever virtualization) RSA SecurID & Authentication manager strong authentication secures administrative access to ESX console and vSphere Management Assistant Authentication Manager
19
RSA RSA Security Management & Reporting for the Virtual and physical infrastructure Overview Ease of analysis, implementation, compliance and change control in VMware environment. RSA enVision collects distinct logs from VMware environment thru 1 seamless, agentless connection – vCenter logs – VMWare Servers logs
20
RSA RSA enVision (SIEM) VMware Events and Activity
21
RSA RSA Data Loss Prevention Suite DISCOVER Where is my sensitive data? DISCOVER Where is my sensitive data? MONITOR Where is my sensitive data going? MONITOR Where is my sensitive data going? ENFORCE How do I prevent loss of my data? ENFORCE How do I prevent loss of my data? DLP Datacenter DLP Network DLP Endpoint Enterprise Manager Enterprise Manager Remediation Policies
22
Network INTERNET vShield Zone1 Zone2 Zone3 VMware VSphere Overview Leverages the capabilities of VMware vShield Zones to deploy RSA DLP internally as a OS imbedded virtual sensor monitoring data traversing among virtual networks. Uses a centrally managed policies and enforcement controls to prevent data loss in the virtual datacenter RSA RSA Data Loss Prevention for Virtual networks RSA DLP Sensor RSA DLP sensor RSA DLP Sensor RSA DLP Sensor vSafe RSA & VMware ‘ vSafe program ’
23
RSA Solution Suite RSA Solution Suite for Virtual infrastructure RSA SecurID for remote authentication RSA DLP RSA DLP for protection of data in use VMware Ionix SCM VMware Ionix SCM for security config and patch management RSA enVision for security monitoring and reporting RSA SecurID for ESX Service Console
24
RSAVblock RSA Secures the Core Vblock Platform (VCE) 24 RSA enVision RSA SecurID Strong authentication before access to ESX Service Console and vSphere Management Assistant Comprehensive visibility into security events Security incident management, compliance reporting Security and compliance officer vSphere Management Assistant Vmware Administrator Validated with Vblock vSphere Storage UCS
25
25 RSA Market Opportunity Cloud Strategy RSA capabilities for Virtualization Summary Words of Wisdom
26
Secure Information Monitor Infrastructure Protect Identities 100% RSA Summary: Leading the Way Toward 100% Virtualization RSA: Security and Compliance for Virtual Environments Identify targets for low risk virtualization Prevent data leakage between vShield Zones Data Loss Prevention which discovers and protects sensitive data in vShield Zones, VMware View, ESX and Vblock Ensure compliance across virtual and physical with a single platform Native Security Event and Incident Management support for VMware View, ESX, vCenter, vSphere and, Vblock BenefitsCapabilities Assure authorized access into every layer of the virtual environment Strong authentication into VMware View, ESX and Vblock
27
Additional Information RSA Security Brief: Security Compliance in a Virtual World RSA SecurBook for VMWare View RSA White Paper: VMWare Virtual Desktop Infrastructure Website: RSA Solutions for Virtual Environments RSA White Paper: Desktop Virtualization Management and Security
28
28 RSA Market Opportunity Cloud Strategy RSA capabilities for Virtualization Summary Words of Wisdom
29
RSA Internal only Words of Wisdom 29
30
Thank You!! Merci Grazie Gracias Obrigado Danke Japanese English French Russian German Italian Spanish Brazilian Portuguese Arabic Traditional Chinese Simplified Chinese Thai Korean Tack så mycket Swedish Takk! Norwegian Hartelijk dank! Dutch
31
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.