The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
|
|
|
- Erick Carr
- 10 years ago
- Views:
Transcription
1 #1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of choice for hosting providers. More recently however, many providers have been adopting Microsoft s Hyper-V. Hyper-V offers core functionality that is very similar to that offered by VMware, but often does so at a substantially lower cost. In fact, a recent study by Gartner forecasts Microsoft and VMware sharing an equal percentage of new virtualization host deployments. Although it might clearly be in a hosting provider s best interest to adopt Hyper-V as opposed to VMware, providers must exercise due diligence in making sure that their Hyper-V clouds are properly secured. While the concept of server security might initially seem routine and mundane, there are two factors that hosting providers must keep in mind while choosing a security solution. The first of these factors is that the solution of choice needs to be aligned with Hyper-V economics. Cost is one of the major reasons for choosing Hyper-V over competing solutions such as vsphere or XenServer. As such, a Hyper-V security solution should not erode the savings that were achieved by choosing Hyper-V in the first place. Overpriced security suites make hosting providers less profitable, and may force a provider to pass costs on to customers. Doing so is especially undesirable when you consider that customers often turn to cloud hosting providers as a way of decreasing costs. When a provider s costs increase it risks losing customers to lower priced competitors. The other high level concept that providers must keep in mind when choosing a hosting solution is efficiency. The solution must run efficiently on the hosting provider s servers, so as not to decrease performance or virtual machine density. Likewise, the solution must be efficient to manage and it must provide scalability as the cloud networks grow. Cloud scale networks are challenging enough to manage without the security software getting in the way or adding to the complexity.
2 Cost and efficiency are easily two of the most important factors to consider when picking out a security solution for Hyper-V hosts, but cost and efficiency are meaningless unless the security solution is able to do its job. The bottom line is that whatever security software an organization adopts, it just has to work. A security suite must protect Hyper-V servers and the virtual machines running on them from a variety of threats both known and unknown. Securing a hosting provider s cloud is a tall order. Hosting providers by their very nature make big targets for those who have malicious intent. As such, the key to securing a public Hyper-V cloud is to anticipate and then mitigate various threats to security, all the while keeping an eye on costs and operational efficiency. The Challenge of Public Cloud Security Security must be a top priority for a public cloud provider. The negative press surrounding a security breach can potentially drive a provider out of business and may also subject the provider to civil litigation. Unfortunately, the unique nature of a public cloud provider s infrastructure makes achieving the proper level of security more difficult than it might be in a private organization. By far the biggest challenge when it comes to securing a public Hyper-V cloud is that of locking down a multi-tenant environment. In essence, public cloud providers must come up with a way to secure resources that they do not fully control. Providers typically control infrastructure components, but not virtual machine contents or configurations. However, this is only one of several major security challenges. A second challenge stems from the fact that cloud providers typically try to maximize the return on their hardware investment by achieving the highest possible virtual machine density. The problem with this is that as the number of virtual machines running on a server increases, so too does the number of potential exposure points. If a virtual machine (or the host OS) is compromised, that virtual machine could potentially be used as a platform for launching attacks against other VMs. Another challenge that public cloud providers must cope with is the complexity of Hyper-V virtual networks. Hyper-V hosting providers isolate customers from one another through the use of tenant level virtual networks. The side effect to building virtual networks that provide tenant isolation is that tenant level virtual networks may create a blind spot for security software. Unless a firewall for example, has been specifically designed for Hyper-V, it will be unable to analyze virtual network traffic. Finally, public cloud provider s networks are extremely dynamic. Tenants constantly delete unwanted virtual machines and provision new ones. Load balancing software live migrates virtual machines from one host server to another in response to shifting workloads. As such, any suitable security solution must be able to adapt in real time to constantly changing conditions. As you can see, there are a number of unique challenges associated with securing a public Hyper-V cloud. The remainder of this paper explores specific security issues that public cloud providers must address on their Hyper-V clouds, and provides strategies that address the various security issues while also taking cost and efficiency into account. 2
3 Malware One of the most important issues that public cloud hosting providers must contend with is that of malware prevention. Unfortunately, the traditional approach to malware detection and removal is unsuitable for public cloud environments. Legacy malware prevention software typically relies on a scanning agent that must be installed on each server or on each virtual machine. It is this seemingly simple concept that leads to a number of different problems. As previously mentioned, one of the major challenges in securing a public hosting environment is the fact that it is difficult to secure what you do not fully control. Hosting providers typically use templates as a mechanism for allowing customers to create virtual machines on an as needed basis. Although it is possible to include a malware scanning agent within a virtual machine template, there is nothing stopping a tenant from removing or disabling the agent after a virtual machine has been created. The fact that customers can disable or even remove antivirus agents is disheartening enough, but there are other problems associated with legacy anti-malware techniques. One such problem is that of performance. In a hosting environment large numbers of virtual machines must share a finite pool of physical hardware resources. That being the case, the only way to achieve a high level of virtual machine density is to take steps to ensure efficient hardware usage, and to put controls in place to prevent resource contention from becoming problematic. Legacy antivirus software simply does not work well in virtual server environments. The scanning process is I/O intensive and may also consume significant CPU resources. While this may not be an issue for isolated scans, most antivirus software is designed to perform periodic scans on a scheduled basis. The problem with this is that the scanning process can lead to AV storms. Simultaneous scans across multiple virtual machines can consume an unacceptable level of hardware resources. It is possible to circumvent this resource consumption by putting controls in place, but doing so may lead to severely degraded performance for the virtual machine that is being actively scanned. Malware Prevention Best Practices Although there are clearly number of challenges associated with providing comprehensive malware protection in a hosted public cloud environment, there are some best practices that you can adhere to in an effort to provide malware protection without risking severely degraded performance, and without having to worry about end-users circumventing your security measures. One such best practice is to avoid the use of anti-malware agents. The various advantages of going with an agentless solution will be discussed in more detail later on, but one of the main benefits is that by going agentless you remove the customer s ability to disable the agent. As such, you can ensure that every virtual machine is being protected against malware. 3
4 Of course this raises the question of how you can enforce malware protection if there are no antimalware scanning agents running on the virtual machines. The trick is to focus on the hypervisor, rather than on the individual virtual machines. Anti-malware software should be moved to the virtualization stack rather than running inside of the virtual machines. Doing so allows the software to have a more comprehensive view of the system then it would if it were confined to the boundaries imposed by virtual machines. One big caveat to this approach is that the anti-malware software that you are using needs to be truly Hyper-V aware. Moving the malware scanning process out of the virtual machines and into the hypervisor involves more than just running antivirus software on the host operating system. In fact, Microsoft recommends excluding folders containing Hyper-V virtual machines from being scanned by anti-malware software that is running in the host operating system. Similarly, Microsoft recommends excluding the VMMS.EXE and the VMSWP.EXE processes. Failure to exclude these folders and processes can result in virtual machine corruption. Needless to say, this presents something of a security paradox. Failing to scan Hyper-V processes and virtual machines exposes the organization to malware threats. Conversely, scanning those virtual machines and processes risks corrupting the virtual machines. So what is a provider to do? The solution is to adopt an anti-malware application that has been specifically engineered for Hyper-V. Such software should run on the host server and integrate directly with the virtualization stack. Doing so would allow the software to intercept malware before it is written to a virtual machine, and do so in a way that eliminates the risk of virtual machine corruption. One of the really nice things about this type of approach is that it has the potential to greatly reduce the amount of time needed for performing anti-malware scans. The traditional approach to antimalware scanning involves performing a comprehensive scan of the full contents of a virtual machine, and comparing each file to a signature database in an effort to detect malware infections. When malware scanning is performed at the virtualization stack level, then it becomes possible to perform incremental scans. In other words, the anti-malware software is able to keep track of the blocks that have been written since the last scan occurred, and then run the scan against only those blocks. Previously existing storage blocks are assumed to be clean since they have already been scanned. This particular approach to antimalware scanning not only reduces scan times, but it also dramatically decreases the load that the scanning process exerts on the server, thereby minimizing performance degradation. Although this approach to anti-malware scanning works extremely well for malware prevention, it is still theoretically possible for a malware infection to occur. Imagine for example that a tenant s virtual machine was infected by a previously unknown piece of malware. Because the malware was previously unknown, the antivirus software may not be able to detect it. Eventually however, the antivirus software would presumably be updated and consequently become aware of the previously unknown malware. The problem is however, that the malware is already infecting a virtual machine. If the security software were to rely solely on incremental scans then the malware infection might never be detected and the malware might never be removed. As such, anti-malware software needs a way to initiate a manual scan. Of course there are a few criteria that the scan should ideally adhere to. 4
5 First, the anti-malware software needs to be able to stagger the scanning process so that scanning does not occur simultaneously across all virtual machines. Otherwise, resource contention could become a huge issue. Similarly, the anti-malware software should impose scanning thresholds to prevent the scanning process from consuming excessive system resources. A second criteria is that the antimalware software needs to have a centralized management and reporting console. A large-scale public cloud could potentially contain millions of virtual machines, and it would be next to impossible to track anti-malware scanning across all of those virtual machines without having a management console that was specifically designed for use in large-scale environments. The third criteria is probably the simplest, but it is also one of the easiest to accidentally overlook. The anti-malware software that you are using needs to be compatible with any operating system that could potentially be used within a virtual machine. Public cloud hosting providers typically provide customers with predefined templates that allow them to deploy various types of virtual machines. Providers commonly offer a mixture of Linux and Windows VMs. In such an environment, and antimalware solution that is not Linux compatible would result in unprotected exposure points. Considerations for Anti Malware Agents As previously discussed, it is in a public cloud hosting provider s best interest to avoid the use of antimalware agents at the virtual machine level and focus instead on implementing malware protection at the virtualization stack. One of the reasons that was cited for doing so was that performing malware scanning at the hypervisor level eliminates the possibility of a tenant removing or disabling an anti-malware agent. Of course this raises the question of why a tenant might disable anti-malware protection. Even if a tenant does not have malicious intent, there are any number of reasons why a tenant might choose to disable malware protection. Some for instance, might uninstall an anti-malware agent as a way of squeezing better performance out of a virtual machine. There have also been situations in which tenants uninstalled anti-malware agents as a way of reducing costs. Public cloud hosting providers usually charge tenants based on the resources that they consume. Eliminating an anti-malware agent reduces resource consumption, potentially resulting in a lower bill. Another common complaint from tenants is that certain types of agents are simply too intrusive. Some agents for example, attempt to install browser toolbars and modify the browser s homepage, among other things. Similarly, a tenant might remove an anti-malware agent because they prefer to use a different antimalware program, or because the agent is known to have compatibility issues with an application that they want to run inside of a virtual machine. The point is that there are any number of reasons why a tenant might possibly disable or uninstall an anti-malware agent, thereby rendering themselves vulnerable to a malware attack. Going with an agentless solution is a great way to prevent this type of tenant activity. Even so, preventing antimalware removal is not the only reason why an agentless solution is desirable. 5
6 At the beginning of this white paper, cost and efficiency were cited as to the factors that needed to be considered with regard to security. Both of these issues become factors in agent-based antimalware products. Cost can become a factor because many vendors license their anti-malware products on a per agent basis. Efficiency is also a factor with agent-based solutions. Not only do scanning agents place significant loads on the system and increase the problem of resource contention, but they also cause management inefficiencies. When an agent-based solution is used, administrators must perform a variety of agent related tasks, such as keeping the agents up to date or replacing missing agents. An agentless approach greatly reduces the administrative burden. Firewall Anti-malware scanning is extremely important, but it is only one part of a comprehensive security solution. Another critical part is a good firewall. While it is true that Windows operating systems include a built-in firewall, the Windows Firewall is inadequate for public hosting environments. One of the main problems with the Windows firewall is that it takes a unidimensional approach to security. A firewall running on a host server for example, would be able to monitor traffic along internal and external network connections, but it would not analyze traffic on private networks. Cloud providers depend on a complex structure of interwoven physical, logical, Virtual network segments. Most firewall software is inadequate for protecting these types of environments because the firewall protects only the networks that are immediately visible to the operating system. Multilayer virtual network structures simply cannot be protected with such software. The only way to adequately secure a Hyper-V based public cloud is to use firewall software that was specifically designed for Hyper-V, and that latches onto the Hyper-V extensible switch. Such a firewall should make use of the Windows Filter Platform, and to be able to inspect, drop, modify, or insert packets into a traffic stream. The bottom line is that unless a firewall knows how to make use of the Hyper-V extensible switch, it will inevitably have blind spots. Another reason why full virtual network awareness is essential is because hosting providers must be able to guarantee complete isolation to tenants, even if those tenant s virtual machines reside on a common host. Unless this level of isolation can be guaranteed by the firewall and the underlying virtual network stack, the hosting provider will be forced to implement isolation through VLANs. This may require the manual creation of hundreds of separate VLANs, which greatly complicates and increases the cost of management. Although it is critically important for a Hyper-V firewall to be virtual network aware, it is equally important for the firewall to perform all of the basic functionality that would be expected in a physical data center. Specifically, the firewall should be application aware and should be able to perform stateful packet inspections. Another important criteria is that the firewall needs to be manageable in a large-scale environment. The reporting engine needs to be able to consolidate thousands of individual firewall status messages into a concise report that is easy to read and that is fully actionable. At the same time however, the firewall needs to allow for granular action to be taken. Administrators should be able to isolate and secure virtual machines by name, ID, or even tenant, on an as needed basis. 6
7 Intrusion Detection Systems Another security mechanism that every public cloud provider needs is a good intrusion detection system. Although many providers rely on hardware based intrusion detection, it is also a good idea to supplement that protection with a software-based Intrusion Detection System that has been specifically engineered for Hyper-V environment. A Hyper-V Intrusion Detection System needs to be able to monitor physical, logical, and virtual networks, as well as individual virtual machines in a multitenant space. The software should include a database of known attacks, but should also be able to use heuristics to monitor for previously unknown attack methods. A Hyper-V based Intrusion Detection System needs to support cloud level scaling. Not only is this important from a reporting standpoint, but also from a responsiveness standpoint. An Intrusion Detection System is only effective if it is able to detect threats in real time, and then block the threat, and alert an administrator. This means that the Intrusion Detection System software must be designed in a way that prevents any significant lag in its detection capabilities, even as the cloud grows. Compliance One last consideration that needs to be taken into account is that of compliance. Although a public cloud provider might not necessarily be subject to any sort of regulatory compliance, they may have customers who are. A healthcare organization that is subject to HIPAA compliance for example, is only allowed to use cloud providers who are also certified to be HIPAA compliant. Although regulatory compliance goes beyond the scope of this white paper, it is worth mentioning that the security software that a public cloud provider uses must provide centralized management capabilities, and allow for the use of policies, rules, filters, and log analytics. In other words, the public cloud provider needs a way to perform a comprehensive security audit that will satisfy regulatory authorities should doing so become necessary. Conclusion The Internet has been described as the most hostile environment imaginable, and public cloud providers make easy targets. It is therefore critically important for public cloud providers to invest in security solutions that will keep their tenants safe. The only way for a provider to establish comprehensive security is to practice defense in depth by using a security package that is able to protect against numerous different types of threats across all layers of the cloud infrastructure. 7
8 About The Author Brien Posey is a freelance technical writer who has received Microsoft s MVP award eleven times for his work with Exchange Server, Windows Server, IIS and File Systems Storage. Brien has written or contributed to about three dozen books and has written well over 4,000 technical articles and white papers for a variety of printed publications and web sites. Brien M. In addition to his writing, Brien routinely speaks at IT conferences and is involved in a wide variety of other technology-related projects. Before becoming a freelance technical writer, Brien worked as a CIO for a national chain of hospitals and healthcare facilities. He has also served as a network administrator for some of the nation s largest insurance companies and for the Department of Defense at Fort Knox [email protected] (20)
The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V
The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V #1 Hyper-V Security The first agentless Security, Virtual Firewall, Anti-Malware
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
5 Best Practices to Protect Your Virtual Environment
CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2
White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines
Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey
Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning Brien M. Posey Introduction There usually isn t anything overly complicated about backing up a physical datacenter. While it s true
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Secure your Virtual World with Cyberoam
White paper Secure your Virtual World with Cyberoam www.cyberoam.com Virtualization The Why and the What... Rising Data Center costs... Ever-increasing demand for data storage... Under-utilized processors...
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
VIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT
INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM CENTRALIZED HW MANAGEMENT STABILITY DATA
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
Exchange DAG backup and design best practices
Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Security Virtual Infrastructure - Cloud
Security Virtual Infrastructure - Cloud Your Name Ramkumar Mohan Head IT & CISO Orbis Financial Corporation Ltd Agenda Cloud Brief Introduction State of Cloud Cloud Challenges Private Cloud Journey to
Total Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
Comparing SolarWinds IP Address Manager to Windows Server 2012 IP Address Management. By: Brien M. Posey. whitepaper
Comparing SolarWinds IP Address Manager to Windows Server 2012 IP Address Management By: Brien M. Posey When Microsoft released Windows Server 2012, one new feature introduced was IP Address Management
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.
White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE
White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
PICO Compliance Audit - A Quick Guide to Virtualization
WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
A review of BackupAssist within a Hyper-V Environment
A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...
Securing the Physical, Virtual, Cloud Continuum
Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud
The VMware Administrator s Guide to Hyper-V in Windows Server 2012. Brien Posey Microsoft MVMP @Veeam
The VMware Administrator s Guide to Hyper-V in Windows Server 2012 Brien Posey Microsoft MVMP @Veeam About today s webinar Thought leadership content from an industry expert This webinar is recorded and
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
A review of BackupAssist within a Hyper-V Environment. By Brien Posey
A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...
Two Great Ways to Protect Your Virtual Machines From Malware
Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Bitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes
WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION The Top Five Virtualization Mistakes Virtualization is taking the IT world by storm. After years of IT build-out, virtualization suddenly fixes
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
EXCHANGE TO OFFICE 365
EXCHANGE TO OFFICE 365 ARCHIVING CONSIDERATIONS by Brien Posey As an organization prepares to migrate mailboxes from an on premise Exchange Server to Office 365, it must carefully consider how the migration
Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey
Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey axcient.com 1 Introduction In the not-too-distant past, protecting an organization s data meant shipping backup tapes offsite
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Trend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
Securing the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
The Virtualization Practice
The Virtualization Practice White Paper: A Look at Trend Micro Deep Security 7.5 Edward L. Haletky Analyst March 2011 2011 The Virtualization Practice. All Rights Reserved. Abstract Trend Micro Deep Security
Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
