26
Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

  • Upload
    others

  • View
    3

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Data Center Evolution:

Physical. Virtual. Cloud. Securing Your Journey to the Cloud

David Angwin

Page 2: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Where is Your Data? JOURNEY TO THE CLOUD

where is your

Data? SERVER

VIRTUALIZATION

HYBRID CLOUD PUBLIC CLOUD

BYOPC

DESKTOP

VIRTUALIZATION

PHYSICAL

DESKTOPS & SERVERS

MOBILE PRIVATE CLOUD

Page 3: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

One Security Model is Possible across Physical, Virtual, and Cloud Environments

CROSS-PLATFORM SECURITY

Physical Virtual Cloud

New platforms don’t change the threat landscape

Each platform has unique security risks

Integrated security is needed across all platforms

Page 4: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Physical Virtual Cloud

Manageability

Glut of security products

Less security

Higher TCO

Reduce Complexity

One Security Model is Possible across Physical, Virtual, and Cloud Environments

PLATFORM-SPECIFIC SECURITY RISKS

Integrated Security: Single Management Console

Performance & Threats

Traditional security

degrades performance

New VM-based threats

Increase Efficiency

Visibility & Threats

Less visibility

More external risks

Deliver Agility

Page 5: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Consolidate Physical Security REDUCE COMPLEXITY

Page 6: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

One Server Security Platform REDUCE COMPLEXITY

Firewall HIPS / Virtual

Patching

Web Application

Protection

Antivirus Integrity

Monitoring

Log

Inspection

Advanced

Reporting Module

Single Management

Console

Page 7: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Server and Desktop

Virtualization Security

INCREASE EFFICIENCY

Page 8: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Challenge: Resource Contention VIRTUALIZATION SECURITY

Typical AV

Console 3:00am Scan

Antivirus Storm

Automatic security scans overburden the system

Page 9: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Cloned

Challenge: Instant-on Gaps VIRTUALIZATION SECURITY

Dormant Active

Reactivated with

out dated security

Reactivated and cloned VMs can have out-of-date security

Page 10: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Challenge: Complexity of Management VIRTUALIZATION SECURITY

VM sprawl inhibits compliance

Patch

agents

Rollout

patterns

Provisioning

new VMs

Reconfiguring

agents

Page 11: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Attacks can spread across VMs

Challenge: Inter-VM Attacks / Blind Spots

VIRTUALIZATION SECURITY

Page 12: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

ESX

vSphere Platform

Guest VM’s

OS

Trend Micro Deep Security

Manager

Agent-less Security Architecture

vShield Endpoint ESX Module

vCenter

VM tools

vShield Manager

Trend Micro product

components

vShield Endpoint

Components

VMware

Platform

VI

Admin

Security

Admin

APPs APPs

APPs

Trend Micro Deep Security Virtual Appliance

Anti-Malware

- Real-time Scan

- Scheduled &

Manual Scan

Network Security

- IDS/IPS

- Web App Protection

- Application Control

- Firewall

Trend Micro filter driver

VMsafe-net API

vShield Endpoint API

Legend

Page 13: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

What is the Solution? Layered, Virtualization-Aware Security in One Platform

VIRTUALIZATION SECURITY

Security

Virtual

Appliance VM VM VM

With Agentless Security

VM

VM VM VM VM VM VM

Deep Security Integrated Modules:

• Antivirus

• Integrity Monitoring

• Intrusion Prevention

• Web Application Protection

• Application Control

• Firewall

• Log Inspection

Higher Density

Optimized Resources

Simplified Management

Stronger Security

Maximizes Performance and ROI

Page 14: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Agentless Anti-malware City of Oulu, Finland

CASE STUDY

Industry Municipal Government

Number of Employees 10,000

Challenge

• Merge infrastructures of four

surrounding cities in less

than one year

• Extend the lives of existing

PCs that cannot be

upgraded to Windows 7

• Minimize the start-up efforts

for the infrastructure merger

• Avoid complexity that would

slow systems or increase

workload

Solution

• vShield Endpoint and Trend

Micro Deep Security, for

agentless protection of

virtual desktop infrastructure

(VDI)

Business Results

• Protection that is easy to

deploy, administer, and scale

• Agentless security that is

more resource

• Instant protection of new

VMs at time of spin-up

Page 15: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Cloud Deployments

and Security

DELIVER AGILITY

Page 16: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Cloud Models: Who Has Control? CLOUD SECURITY

Servers Virtualization &

Private Cloud

Public Cloud

IaaS

Public Cloud

PaaS

Public Cloud

SaaS

End-User (Enterprise) Service Provider

Who is responsible for security?

With IaaS the customer is responsible for VM-level security

With SaaS or PaaS the service provider is responsible for security

Page 17: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Shared resources creates a mixed trust level environment

Challenge: Multi-tenancy / Mixed Trust Level VMs CLOUD SECURITY

Page 18: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

There can be less visibility and control of cloud data

Challenge: Data Access and Governance CLOUD SECURITY

Page 19: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

When data is moved, unsecured data remnants can remain

Challenge: Data Destruction CLOUD SECURITY

10011

01110

00101

10011

01110

00101

10011

0

00101

Page 20: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Sensitive Research Results

• Unreadable for unauthorized

users

• Control of when and

where data is accessed

• Server validation

• Custody of keys

Data Security Encryption

with Policy-based

Key Management

Server & App Security

Modular Protection

• Self-defending VM security

• Agentless and agent-based

• One management portal for

all modules, all deployments

2

1 vSphere & vCloud

Integration ensures servers have up-to-date security before encryption keys are released

What is the Solution? Data Protection CLOUD SECURITY

Page 21: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

2

2

VM VM VM VM VM VM VM VM VM VM VM VM

VMware vCloud

VMware

vSphere

Encryption throughout your cloud journey—data protection for

virtual & cloud environments

Enterprise Key

Key Service

Console

Trend Micro

SecureCloud

Data Center Private Cloud Public Cloud

Fitting Encryption into a VMware Ecosystem CLOUD SECURITY

Page 22: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Test

Deep Security / Secure Cloud Example

VMware Vsphere ESX

Customer

Customer 1 Customer 2

Unix/

Win

Server

Page 23: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Specialized Protection for Physical, Virtual, and Cloud

Physical Virtual Cloud

TREND MICRO DEEP SECURITY

Only fully integrated server security platform

First hypervisor-integrated agentless antivirus

First agentless file integrity monitoring (FIM)

Only solution in its category to be EAL4+

and FIPS certified

Page 24: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

2011 Technology Alliance Partner of the Year TREND MICRO: VMWARE’S NUMBER 1 SECURITY PARTNER

Improves Security

by providing the most secure virtualization

infrastructure, with APIs, and certification programs

Improves Virtualization

by providing security solutions architected to fully

exploit the VMware platform

2008 2009 2011

Feb: Join

VMsafe program

RSA: Trend Micro VMsafe

demo, announces

Coordinated approach &

Virtual pricing

RSA: Trend Micro

announces virtual appliance

2010:

>100 customers

>$1M revenue

VMworld: Announce

Deep Security 8

w/ Agentless FIM

1000 Agentless

customers

VMworld: Trend virtsec

customer, case study,

webinar, video

May: Trend

acquires

Third Brigade

July:

CPVM

GA

Nov: Deep Security 7

with virtual appliance

RSA: Trend Micro

Demos Agentless

2010

Q4: Joined

EPSEC vShield

Program

VMworld:

Announce

Deep Security 7.5

Sale of DS 7.5

Before GA

Dec: Deep Security 7.5

w/ Agentless Antivirus

RSA: Other

vendors

“announce”

Agentless

Page 25: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin

Trend is No.1 in Server and Virtualization

Security

Physical Virtual Cloud

VIRTUALIZATION AND CLOUD SECURITY

Trend

Micro

23.7%

Trend

Micro

13%

Source: IDC, 2011 - Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: 2011 Technavio – Global Virtualization Security Management Solutions

Page 26: Data Center Evolution: Physical. Virtual. Cloud. · Data Center Evolution: Physical. Virtual. Cloud. Securing Your Journey to the Cloud David Angwin