SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB

Size: px
Start display at page:

Download "SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB"

Transcription

1 SecureView & XenClient XT Security Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB AFMC PA Case Number: AFMC The material was assigned a clearance of CLEARED on 01 Sep 2011

2 Overview The Problem Background Solution Xen Background Programmatics SecureView 2.0 Xen Client XT Deep Dive Summary POCs 2 2

3 The Problem The Problem Uncertainty using untrusted software and hardware components in commercial and military computer systems for networked forces to maintain mission operations in high threat contested cyber environments Current State: DoD/IC missions & systems reliant on COTS IT management assumes inherent trust of networked systems Most components are developed in foreign countries Mistaken faith that compromised devices would be identified by Intrusion Detection Systems or AV The Solution Must Balance security, performance, and affordability Be flexible to include multi-platform and multi-mission support Be simple Increase the trust in computing on untrusted systems Maintain operations in a contested cyber environment 3 3

4 Requirements Require highest levels of Security, Isolation, Auditability Need access to multiple partner computing environments Each environment needs a segregated network Heavy duty workloads 4 4

5 SecureView Background AFRL requested to develop a secure MLS workstation by the DoD/IC. Zero tolerance for data exfiltration No split tunneling No print screen Malware resilient No third party screen scraping/key logging Minimal impact to host agency Rapid provisioning (4 hours) 5 5

6 The Solution Over a dozen different solutions were analysed over a six month period. A Type 1 client hypervisor architecture was selected. Based on Citrix s Xen Client Plus some GOTS enhancements SecureView is the name of the government program that utilizes XenClient XT as the basis for a multi level workstation. 6 6

7 SecureView (Login Screen) 7 7

8 The Partnership AFRL, Intel and Citrix kicked off a partnership in early Citrix & Intel have provided the government an unprecedented level of cooperation. Change requests are often turned around in a matter of days and weeks, not months and years. NSA CSS has provided steering, guidance, reference implementations NSA I773 provided testing resources. 8 8

9 What is XenClient? Local VM Desktop Local VM Desktop Citrix XenClient X86 Hardware Type 1 hypervisor: High performance because it runs on bare metal Built on 64-bit open source Xen technology Runs multiple virtual desktops simultaneously Hardware independent VMs Service VM Architecture for extensibility 9 9

10 Why the Xen Hypervisor? Enterprise and Cloud proven Mature market proven Xen virtualization engine Battle tested in large clouds and datacenters The Xen.org Open Source Development Community: Hundreds of developers, Companies, Universities and other orgs More than 25,000 code submissions in Xen 4.0 Reliability, security, performance, with full enterprise feature-set >85% of the Public Infrastructure Cloud runs on Xen Thin, Open Source, Inspected Thin hypervisor minimizes trusted codebase Thriving security community Open to inspection 10 10

11 Client Hypervisor Benefits Security, Manageability, Attestability and Supportability Runs multiple independent VMs with policy controlled information flow Enables Multiple Independent Levels of Security systems Enables out-of-band management & policy enforcement Control removable media access, image update, backup, attestation Thick or Thin mode of operation 11 11

12 SecureView Government Industry Collaboration 12 12

13 Modifications from XC to XCXT DRTM of hypervisor and dom0 (measured launch) Platform hardening Disaggregate and de-privilege functionality into dedicated service VMs Moved network stack to a separate service VM Implemented SELinux in dom0 and the NDVM with a custom set of SELinux policies Narrow interfaces between components Cross VM mouse control 13 13

14 Cost XenClient XT MSRP QTY 1 = $499/license Typical Citrix Federal/DoD volume discount = 51-52% Actual cost around $250/license Maintenance = 20% or $50/year 14 14

15 Supported Platforms As of Jun 2011, the following desktop platforms are supported: Dell Optiplex 980 HP 8100 (Numerous laptops) HCL will be expanded with v2.0 In testing: Dell Optiplex 990 HP

16 Program Documentation System Security Plan (SSP) Security Test Plan & Procedures (STP) Master Security Requirements Matrix (MSRTM) Installation & Configuration Guide (ICG) Administrator Guide (AG) User s Guide (UG) Integrated Support Plan (ISP) 16 16

17 Certification Xen Client XT was favorably evaluated against the new NIST Security Controls Catalog for Confidentiality: HIGH Integrity: HIGH Availability: MEDIUM ATO: 25 Aug

18 Comparison to other MLS Clients Unprecedented Security via hardware based security features: VT-d, VT-x, EPT, TPM, TXT Can be run on either thick or thin mode Supports robust 3D graphics Relatively Simple architecture Extensive desktop server backend not required but can be leveraged if desired Uses low cost commodity desktop hardware (or laptops) Cost ($250/client) is significantly cheaper than other MLS access solutions Industry Support 18 18

19 XenClient XT Architecture Deep Dive 19 19

20 Secure Isolation Maintaining isolation between VMs is priority #1 Essential for Cloud, and for Client Spatial and Temporal isolation Use good software engineering practice Thin hypervisor: minimize code running with privilege (60K- 70K SLOC) Disaggregate and de-privilege functionality into dedicated Service VMs Narrow interfaces between components Hypervisors are simpler than OS s, simpler than OS kernels Use modern high-level languages where possible New hardware technologies help VT-x, VT-d, EPT: reduce software complexity, enhanced protection TPM/TXT: Enable Dynamic Root of Trust 20 20

21 XenClient Architecture Service VM Control Domain Receiver for XC User VM User VM Xen Client Intel Hardware VT-d VT-x AES-NI 21 21

22 XenClient XT (SecureView) Architecture XenClient XenClient XT Unique Service VMs Control Domain Receive r for XC Network Isolation VPN Isolation User VM User VM SELinux Policy Granularity Policy Granularity Xen Client XT Xen Security Modules Intel vpro Hardware VT-d VT-x TXT AES-NI 22 22

23 Platform Hardening NSA s Xen Security Modules XSM-FLASK for Mandatory Access Control Low-level isolation enforcement, fine-grained privilege for Service VMs OpenEmbedded Linux used for platform Service VMs SELinux provides MAC Platform Service VMs: disaggregate and deprivilege Network Driver VMs, User Interface VM Per-VM Device Emulation VMs Compartmentalize complex guest-facing function, reduce to narrow interface Future: Virtual TPM VMs 23 23

24 Hardware Assisted Security Security rooted in the HW with Intel vpro Trusted boot with Intel Trusted Execution Technology Secure device access with Intel directed I/O virtualization technology Hardware accelerated disk encryption with Intel AES- NI 24

25 Measured Launch Verify Xen Client installation integrity, prevent offline tampering of installation or configuration state Measured Launch Intel TXT used to establish DRTM, measure Xen Client primary components on every boot Extend measurements to include secondary components Trusted Platform Module PCRs reflect the state and configuration of system All XenClient device configuration state is encrypted Encryption key is sealed by the TPM, only released if PCR values match those expected 25 25

26 XenClient XT: Trusted Execution Technology Hardening the foundation Power on HW System FW verified by TXT prior to boot Measure Firmware/BIOS TXT HW Hypervisor measured by TXT Measure Hypervisor Hypervisor HW Consult Trusted Platform Module to unseal device encryption key if measurements match Hypervisor HW Launch VMs, OS, etc App App App OS Hypervisor HW App App App OS Verify XenClient integrity, prevent offline tampering of installation or configuration state All XenClient configuration state is encrypted Encryption key is sealed by the TPM, only released if measurements match expected Unable to recover encryption key so boot cannot proceed System lockout. Recovery key required Hypervisor HW 26 26

27 Enhanced Policy Granularity Wipe on reboot Guest VMs Purge user changes, boot to a known clean VM Persist admin defined settings Local controls without Synchronizer Local disk encryption VM configurations lockdown Enhanced isolation policies Audio, Graphics, USB, Optical Drives Inter VM communication 27 27

28 Network Architecture Network Driver VM (NDVM) controls physical network devices Wired and Wireless (optional) VT-d IOMMU used to restrict device DMA Provides protection against buggy/malicious drivers or firmware NDVM can be security non-critical: reduces compromise to denial of service Network traffic passing through NDVM already encrypted In-VM VPN (using USB token), or per-vm Service VM implementing VPN NDVM can implement per-vm network restrictions E.g. require all VM traffic to go to a particular VPN endpoint IP to inhibit split tunnelling Bridged or DNAT, VLAN 28 28

29 XenClient XT: Network Isolation Service VMs Service VMs Require additional system resources Deliver highest levels of isolation Isolated Networking Service VM Device drivers, physical NIC access, and routing Network based attacks don t compromise the control domain VPN Service VMs VPN runs outside user VMs for increased isolation Allows split tunneling to be eliminated Advanced networking policy Access allowed to only approved infrastructure Per VM firewalling and QOS 29 29

30 IO Device Pass-through vs. Virtualization Pass-through dedicates a device to a particular VM Protection provided by VT-d IOMMU for PCIe devices Requires guest driver for particular device Device virtualization enables devices to be shared between VMs Higher-level model allows device to be multiplexed, hardware abstracted Presented to VMs using device emulation, or para-virtualization for improved performance and code simplicity Different levels possible: controller vs. end device E.g. Virtualize USB host controller, pass-through individual devices 30 30

31 Hardware Virtualization User VM User VM Control Domain Service VM Xen Hypervisor Audi Audio o Disk AMT NIC GPU USB x86 Hardware TXT TPM 31 31

32 Hardware Pass-Through Operation User VM User VM Control Domain Service VM Xen Hypervisor Audio Disk AMT NIC GPU USB x86 Hardware TXT TPM 32 32

33 Input Path Goals Prevent one VM from logging input intended for another VM Prevent injection of key events Full-screen and seamless desktop integration modes Keyboard and Pointer devices always controlled by platform Platform knows which VM is on screen, routes keyboard and mouse events exclusively to that VM Key sequences processed by platform for secure attention, VM switching Support for secure keyboard path even in seamless desktop mode When application window gets focus, keyboard is routed to the respective VM Allows mouse switching to move focus between different display heads 33 33

34 USB Device Virtualization Goals Provide broad USB device compatibility; good performance Control routing of devices to VMs through policy enforcement Implementation Platform owns USB host controller devices VMs have Xen para-virtual USB host controller When device plugged in, identify it, apply policy, make visible on guest host controller Forward USB messages between real and virtual host controllers Similar approach for SATA optical drives Enables Blu-ray playback, DVD writing, etc

35 GPU Virtualization Ultimate goals of GPU virtualization Support full-performance rendering from multiple VMs Full application compatibility Must retain isolation prevent screen scraping, pixel injection XenClient supports several different graphics architectures Implemented Hybrid virtualized/pass-through GPU Display-side of GPU is virtualized, rendering-side passedthrough to single VM One VM gets 3D performance, others get reduced capability via PV GPU Platform retains control of the GPU s display/output functions We always control which VM is on screen, don t rely on GPUowning VM to be running 35 35

36 SecureView

37 What s New in 2.0? Major themes: STM Integration Expanded hardware compatibility NSA HAP R2 Compliance Better enterprise management Production scale synchronizer Simplified user experience 37 37

38 Integration of SMM Transfer Monitor It has been proven that Intel TXT can be subverted via certain specialized attacks against SMM mode. SecureView 2.0 will include a System Management Mode (SMM) Transfer Monitor (STM) A correct STM implementation can mitigate SMM attacks. Developed by Dell in collaboration with the NSA Available on select Dell system 1QCY12 38

39 Additional Vendor Support XenClient 1.x XenClient

40 Production Ready Synchronizer Enhanced scalability Enhanced single server scalability Automatic throttling of connections under heavy load Support for large complex AD environments with AD trust Accelerated and optimized image transfers and installs DVD/USB pre-caching Backup optimizations User profile virtualization and focused backup for static image mode Restore user profile with newer OS/Apps image Faster backups with less CPU overhead Smart filtering of page file, hibernate file, and unused data blocks 40 40

41 Production Ready Synchronizer Operational enhancements Enhanced XenClient device details, reporting, and filtering Revamped installation system Appliance operations console At a glance system configuration Simple configuration management Internet facing Synchronizer enhancements Separated Admin UI and Client Access Device, User, and Group removal 41 41

42 Simplified User Interfaces XenClient Receiver Revamped to be simpler and more responsive New per VM details view replaces advanced view VM hotkey switching OEM branding support Synchronizer Revamped assignment and policy wizard Simplified Operations console New device details view 42 42

43 Additional Enhancements Up to 8GB of memory per VM Support for Windows 7 SP1 32/64 Experimental support for Ubuntu Improved integrated Windows 7 audio support 43 43

44 Secure Window Compositing NEAR TERM Combining application windows from multiple VMs into the same desktop display, adding colored borders Enabling seamless launch of applications running in different VMs Continue to prevent key logging FAR TERM: Use video overlays and secure compositing to prevent screen scraping/pixel injection while maintaining 3D performance (integrate NSA R23 SVP work) 44 44

45 Summary SecureView breaks new ground in client virtualization True type 1 hypervisor for robust isolation and performance Enhanced Isolation Pack meets government security criteria Open Source based More affordable More capable SecureView is available now NIST Certified (ATO 25 Aug 2011) 45 45

46 Points of Contact Program Manager Dr. Ryan Durante, AFRL/RIEB Lead Engineer Steve Scheiderich, MicroQuest Deputy Program Manager John Woodruff, AFRL/RIEB Xen Technical Lead Kevin Pearson, AFRL/RIEB NGMS Program Manager Steve Ochsner, NGMS LPS Lead TJ Vestal, AFRL/RIG

47 Q&A 47 47

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

SecureView Overview. Click to Edit Master Title Style. Click to Edit Master Subtitle Style. Updated 7 Oct 2013

SecureView Overview. Click to Edit Master Title Style. Click to Edit Master Subtitle Style. Updated 7 Oct 2013 SecureView Overview Updated 7 Oct 2013 Air Force Research Laboratory AFRL/RIEB afrl.rieb.secureview@us.af.mil 315-330-7658 Subtitle Style SAF PA Case Number: 88ABW-2013-4408 The material was assigned a

More information

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications White Paper SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications SecureView provides accredited cross-domain

More information

Protect sensitive data on laptops even for disconnected users

Protect sensitive data on laptops even for disconnected users WHITE PAPER A Citrix XenClient technical paper focusing on the security benefits of local virtual desktop technology for laptops Protect sensitive data on laptops even for disconnected users Use local

More information

Enabling Secure Mobile Operations with Commercial Products

Enabling Secure Mobile Operations with Commercial Products Enabling Secure Mobile Operations with Commercial Products Grant Wagner Technical Director Trusted Systems Research National Security Agency October 16, 2014 Overview Moving to Commercial Products Mobile

More information

Citrix XenServer 7 Feature Matrix

Citrix XenServer 7 Feature Matrix Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, 2014 10:00AM PDT 2 Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy

More information

RED HAT ENTERPRISE VIRTUALIZATION

RED HAT ENTERPRISE VIRTUALIZATION Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April

More information

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology Dell Client Systems Take Control of Your Environment Powered by Intel Core 2 processor with vpro technology Simplifying IT As IT infrastructures grow, heterogeneous environments expand. Growing infrastructures

More information

VMware End User Computing Horizon Suite

VMware End User Computing Horizon Suite VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with

More information

LOCAL VM DESKTOPS Delivering valuable, new usage scenarios to Enterprises

LOCAL VM DESKTOPS Delivering valuable, new usage scenarios to Enterprises LOCAL VM DESKTOPS Delivering valuable, new usage scenarios to Enterprises www.wipro.com Andrey Zhulenev Client Partner Cloud Computing Strategy and Incubation Stevan Arychuk Solution Architect Cloud Computing

More information

Guardian: Hypervisor as Security Foothold for Personal Computers

Guardian: Hypervisor as Security Foothold for Personal Computers Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Red Hat VDI. David Simmons

Red Hat VDI. David Simmons Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

IN DETAIL. Smart & Dedicated Servers

IN DETAIL. Smart & Dedicated Servers IN DETAIL Smart & Dedicated Servers Automate everything - including dedicated servers OnApp brings cloud hosting, dedicated hosting and hybrid hosting together in one platform. Through one control panel

More information

Intel Embedded Virtualization Manager

Intel Embedded Virtualization Manager White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization

More information

What s New with VMware Virtual Infrastructure

What s New with VMware Virtual Infrastructure What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management

More information

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

Intel Graphics Virtualization Technology Update. Zhi Wang, zhi.a.wang@intel.com

Intel Graphics Virtualization Technology Update. Zhi Wang, zhi.a.wang@intel.com Intel Graphics Virtualization Technology Update Zhi Wang, zhi.a.wang@intel.com Agenda The History Intel Graphics Virtualization Technology Update New Usage Scenarios Upstream Status Summary 2 Intel GPU

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

Securing Your Cloud with Xen Project s Advanced Security Features

Securing Your Cloud with Xen Project s Advanced Security Features Securing Your Cloud with Xen Project s Advanced Security Features Russell Pavlicek, Xen Project Evangelist CloudOpen North America 2013 Who is the Old, Fat Geek Up Front? Xen Project Evangelist Employed

More information

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG) Speakers: Gal Shpantzer, John Pescatore (SANS Institute) Chris Hallum (Microsoft)

More information

Citrix XenClient 1.0

Citrix XenClient 1.0 White Paper Citrix XenClient Citrix XenClient 1.0 Proof of Concept Implementation Guide www.citrix.com Contents Introduction... 3 Hardware and Software Requirements... 3 Installation and Configuration...

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

KVM KERNEL BASED VIRTUAL MACHINE

KVM KERNEL BASED VIRTUAL MACHINE KVM KERNEL BASED VIRTUAL MACHINE BACKGROUND Virtualization has begun to transform the way that enterprises are deploying and managing their infrastructure, providing the foundation for a truly agile enterprise,

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni, Pongsin Poosankam, y Matei Zaharia, Jun Han, y Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig,

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O

More information

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Before we can talk about virtualization security, we need to delineate the differences between the

Before we can talk about virtualization security, we need to delineate the differences between the 1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via

More information

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010 Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010 Giuseppe Gippa Paterno' Solution Architect EMEA Security Expert gpaterno@redhat.com Who am I Currently Solution Architect and EMEA Security

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager Hardware + Software Solutions for The Best in Client Management & Security Malcolm Hay Intel Manager vpro - Hardware Management & Security for the New Era of End User Computing Hardware Management Intel

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Software Execution Protection in the Cloud

Software Execution Protection in the Cloud Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

2972 Linux Options and Best Practices for Scaleup Virtualization

2972 Linux Options and Best Practices for Scaleup Virtualization HP Technology Forum & Expo 2009 Produced in cooperation with: 2972 Linux Options and Best Practices for Scaleup Virtualization Thomas Sjolshagen Linux Product Planner June 17 th, 2009 2009 Hewlett-Packard

More information

Attacking Hypervisors via Firmware and Hardware

Attacking Hypervisors via Firmware and Hardware Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor

More information

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com Next Generation Now: Virtualization A Unique Cloud Approach Jeff Ruby Channel Manager jruby@redhat.com Introducing Extensive improvements in every dimension Efficiency, scalability and reliability Unprecedented

More information

Frontiers in Cyber Security: Beyond the OS

Frontiers in Cyber Security: Beyond the OS 2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks

More information

How to Secure Infrastructure Clouds with Trusted Computing Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.

More information

Virtual Desktop VMware View Horizon

Virtual Desktop VMware View Horizon Virtual Desktop VMware View Horizon Presenter - Scott Le Marquand VMware Virtualization consultant with 6 years consultancy experience VMware Certified Professional 5 Data Center Virtualization VMware

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)

More information

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

EECatalog SPECIAL FEATURE

EECatalog SPECIAL FEATURE Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that

More information

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Knut Omang Ifi/Oracle 19 Oct, 2015

Knut Omang Ifi/Oracle 19 Oct, 2015 Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What

More information

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors About the Authors Dr. Charlton Barreto Platform Architect Intel Corporation Charlton Barreto is a member of Intel

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Security and Data Protection with Intelligent Desktop Virtualization Bernd Harzog Analyst Virtualization Management January 2012 2012 The Virtualization Practice.

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

Xen Cloud Platform Update

Xen Cloud Platform Update Xen Cloud Platform Update John Garbutt Senior Software Developer, Cloud, Citrix @johngarbutt What is Xen Cloud Platform? The Xen Hypervisor was designed for the Cloud straight from the outset! What is

More information

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of

More information

Virtual Machine Security

Virtual Machine Security Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal

More information

Masters Project Proposal

Masters Project Proposal Masters Project Proposal Virtual Machine Storage Performance Using SR-IOV by Michael J. Kopps Committee Members and Signatures Approved By Date Advisor: Dr. Jia Rao Committee Member: Dr. Xiabo Zhou Committee

More information

How To Build A Software Defined Data Center

How To Build A Software Defined Data Center Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved 18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization... Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique

More information

Virtualised MikroTik

Virtualised MikroTik Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information