Software EMEA Performance Tour Warsaw, Poland 24 April

Size: px
Start display at page:

Download "Software EMEA Performance Tour 2013. Warsaw, Poland 24 April"

Transcription

1 Software EMEA Performance Tour 2013 Warsaw, Poland 24 April

2 Security in the cloud & Use-case HP Enterprise Security Miroslav Knapovsky / 24 th April 2013

3 HP Enterprise Security HP ESP What we do Security Performance Suite Application Security HP Security Performance Suite Pillars Security Intelligence Network Security 3

4 HP Security Research HP ESP How we do Innovative Research Driving ESP Security Strategy Actionable Security Intelligence Publication On Critical Topics Today Experts in vulnerability, malware, threat actor, and software security research ZDI and other communities Globally-distributed team from top universities Content powers ArcSight, Fortify, and TippingPoint Intelligence delivered direct to end-users and the public Bi-weekly threat briefings on the web and itunes Publications on research spanning the ESP portfolio Speaking at top security conferences / tradeshows Trusted-source for advice on enterprise security 4

5 Modern breaches do not care about perimeter HP ESP Why we do Acquire target, sneak in, hop around (Perimeter doesn t help) Get privileged access to critical assets (Impact takes time) Conduct the crime for an extended time (Early detection matters) 5

6 Security in the cloud

7 Before the virtualization Security Zone 1 Security Zone May 6, 2013

8 After the virtualization function it(){ xpl.action= xpl.victim.value+xpl.path.value+x pl.file.value+xpl.injectcode. value;xpl.submit(); Security Zone 1 Security Zone May 6, 2013

9 Extending the security zone to cloud Sec. zone1 Sec. zone 2 function it(){ xpl.action= xpl.victim.value+xpl.path.value+x pl.file.value+xpl.injectcode. value;xpl.submit(); Security Zone 1 Security Zone May 6, 2013

10 Virtualization of security appliances? How to apply the CPU intense process of deep application inspection? Security Zone 1 Security Zone May 6, 2013

11 HP Single Security Model for the Physical AND Virtual Data Center Physical Servers Cluster Top of Rack Switch TippingPoint NGIPS R&D Servers VMWare ESX(i) Finance Servers Distributed vswitch R&D Zone OS OS App OS App OS App App vcontroller DMZ Zone OS OS App OS App OS App App Finance Zone OS OS App OS App OS App App 11 Virtualized Servers Cluster

12 Case Study Casablanca Int. / Big Blue One Objective Rapidly respond to customer demand for cloudbased services with reliable, secure and scalable platform BIG BLUE ONE jest unikalnym projektem firm Casablanca INT, Hewlett-Packard, VMware a AMD w zakresie publicznego rozwiązania cloud dla twojego IT, projektów online i aplikacji internetowych. BIG BLUE ONE jest oparte profesionalnej i zaawansowanej technologii HP CloudSystem Matrix, HP Networking i HP Security. 12

13 Case Study How it works Wymagania bezpieczeństwa dla cloud computing BIG BLUE ONE obsługiwane są przez Secure Virtualization Framework który zawiera HP TippingPoint i środki do routingu ruchu w vcontroller cloudzie. HP TippingPoint może analizować ruch przychodzących danych i wyszukiwać w nim próby do "identyfikacji", luk lub naruszenia bezpieczeństwa twoich usług. 13

14 Case Study Security as a Service by default 14

15 Converged Security Model for Physical and Virtual DCs VM1 VM2 VM3 VMn Virtualized Servers vcontroller vcontroller ESX Hosts vcontroller Data center Physical Servers WLAN Core HP CloudSystem Enterprise Solutions Tipping Point Integration Internet Edge NG-IPS Security Zone 15

16 HP Enterprise Security & HP Networking Better together story 16

17 Better Together HP ESP & HP Networking HP Performance Systems IT Performance Suite Security Performance Suite Legal & Compliance Performance Suite Marketing Performance Suite HPSR WebApp-DV RepSM Runtime Operational Analytics Big Data ALM Integration Security Sentinel HP Networking Solutions HP Networking 17

18 HPN Sentinel Security Application Sentinel has the capability of turning OpenFlow-enabled infrastructure device into enforcement device 18

19 Thank you / Dziękuję bardzo stay in touch:

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 CHANGING THE RULES OF NETWORKING Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 FORWARD LOOKING STATEMENTS This presentation may contain forward-looking statements that

More information

A comprehensive framework for securing virtualized data centers. Business white paper

A comprehensive framework for securing virtualized data centers. Business white paper A comprehensive framework for securing virtualized data centers Business white paper Contents Experiencing the virtualization wave...3 Addressing virtualization security challenges...3 Understanding security

More information

Simplifying IT with SDN & Virtual Application Networks

Simplifying IT with SDN & Virtual Application Networks Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

HP CloudSystem Enterprise

HP CloudSystem Enterprise Technical white paper HP CloudSystem Enterprise Securing CloudSystem Enterprise with HP Enterprise Security Table of contents Executive summary... 2 HP CloudSystem Enterprise overview... 2 HP CloudSystem

More information

Simple, scalable and secure unified wired and wireless networking

Simple, scalable and secure unified wired and wireless networking Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: lars@hp.com Copyright 2012 Hewlett-Packard

More information

Architecting Security for the Private Cloud. Todd Thiemann

Architecting Security for the Private Cloud. Todd Thiemann Architecting Security for the Private Cloud Todd Thiemann Classification 4/9/2010 Copyright 2009 Trend Micro Inc. 1 The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud

More information

Connected Intelligence and the 21 st Century Digital Enterprise

Connected Intelligence and the 21 st Century Digital Enterprise Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

1518 Best Practices in Virtualization & Cloud Security with Symantec

1518 Best Practices in Virtualization & Cloud Security with Symantec 1518 Best Practices in Virtualization & Cloud Security with Symantec Tues May 6, 11:00 Kevin Stultz Symantec Product Management Chip Epps Symantec Product Marketing 1 Agenda 1 2 Trends in Virtualization

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

HP Helion Cloud. 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處

HP Helion Cloud. 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處 HP Helion Cloud 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Agenda 2 Copyright 2013

More information

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers HP CLOUDSYSTEM A single platform for private, public, and hybrid clouds Simply the most complete cloud system for enterprises and service providers Solution brief It s a fact of life: cloud computing is

More information

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion

More information

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013

Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Copyright 2013 Vivit Worldwide Debunking the Myths: An Essential Guide to Software-Defined Networking April 17, 2013 Brought to you by Vivit Cloud Builders Special Interest Group (SIG) Jim Murphy Cloud

More information

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015 Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Atalla Data-Centric Security & Encryption Solutions Jean-Charles

More information

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products Threat landscape Riskier Enterprises + Advanced Attackers = More Attacks

More information

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY? Jennifer Ellard HP Session ID: SPO-W01B Session Classification: General Interest Agenda What is hype? What we hear from you? Separating

More information

Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador

Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador 2 2009 2010 HP Confidential INTELLIGENT SERVICE MANAGEMENT A USE CASE - TODAY - Solution - Process automation

More information

HP OpenStack & Automation

HP OpenStack & Automation HP OpenStack & Automation Where we are heading Thomas Goh Cloud Computing Cloud Computing Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources.

More information

Bezpečnosť dát v HP Cloude

Bezpečnosť dát v HP Cloude Bezpečnosť dát v HP Cloude Ochrana dát a súkromia v cloudových službách Február 2013 Agenda TRENDY RIEŠENIA HP PRÍKLADY 2 Security awareness at board level Security leadership is under immense pressure

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Virtual Application Networks Innovations Advance Software-defined Network Leadership

Virtual Application Networks Innovations Advance Software-defined Network Leadership Virtual Application Networks Innovations Advance Software-defined Network Leadership Simplifying, Scaling and Automating the Network Bethany Mayer Senior Vice President and General Manager HP Networking

More information

Innovation Session. CLOUD Tom Schoemaker. HP EMEA Software Performance Tour 2014

Innovation Session. CLOUD Tom Schoemaker. HP EMEA Software Performance Tour 2014 HP EMEA Software Performance Tour 2014 Innovation Session CLOUD Tom Schoemaker Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

Партнерство с HP ESP Сильная Команда и Безопасное Будущее

Партнерство с HP ESP Сильная Команда и Безопасное Будущее Партнерство с HP ESP Сильная Команда и Безопасное Будущее Мирко Шнайдер Менеджер по Работе с Партнерами HP Enterprise Security Products mirko.schneider@hp.com Октябрь 2013 What does it take? 1. Great Products!

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

HP ESP 2013 Solution Roadmap

HP ESP 2013 Solution Roadmap HP ESP 2013 Solution Roadmap C. K. Lin ( 林 傳 凱 ) Senior Channel Solution Manager, North Asia ck.lin@hp.com March 8, 2013 資 安 要 聞 議 程 HP ESP 簡 介 HP ESP 解 決 方 案 HP ESP 2013 Solution Roadmap Q&A HP ESP 簡

More information

Cloud Security: An Independent Assessent

Cloud Security: An Independent Assessent Cloud Security: An Independent Assessent A Quantix White Paper Dec 2010 Call us on: 0115 983 6200 Visit us on-line at: www.quantix-uk.com E-mail us at : enquiries@quantix-uk.com Why are people concerned

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services

Solution brief. HP CloudSystem. An integrated and open platform to build and manage cloud services Solution brief An integrated and open platform to build and manage cloud services The industry s most complete cloud system for enterprises and service providers Approximately every decade, technology

More information

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Five Steps For Securing The Data Center: Why Traditional Security May Not Work White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center

More information

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

From the Bottom to the Top: The Evolution of Application Monitoring

From the Bottom to the Top: The Evolution of Application Monitoring From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:

More information

HP Cloud technologies

HP Cloud technologies HP Cloud technologies ari.saareks@hp.com Cloud & Presales Manager Finland & Baltics 1 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

SPEED your path to virtualization.

SPEED your path to virtualization. SPEED your path to virtualization. 2011 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Introducing HP VirtualSystem Chief pillar of

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking

More information

Security Operation Centre 5th generation

Security Operation Centre 5th generation Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to

More information

VMware vshield App Design Guide TECHNICAL WHITE PAPER

VMware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications

More information

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015 #TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security

More information

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com 2010 2011 Hewlett-Packard Development Company, L.P. The information contained

More information

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Mobility Exploiting and Maintaining the New Face of Engagement Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

VMware for SMB environments(min. 505 1 st year)

VMware for SMB environments(min. 505 1 st year) VMware offers dozens of products, but at its core is vsphere, its virtualization platform, and vcenter Server, its management family. Understanding VMware's vsphere, vcenter and vcloud licensing is critical

More information

Limiting the Spread of Threats: A Data Center for Every User

Limiting the Spread of Threats: A Data Center for Every User SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««; Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization

More information

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of

More information

Understanding the HP CloudSystem Reference Architecture. White paper

Understanding the HP CloudSystem Reference Architecture. White paper Understanding the HP CloudSystem Reference Architecture White paper Table of contents 1. Introduction...3 2. CloudSystem overview...3 3. Basic CloudSystem architecture...4 4. HP CloudSystem Matrix...5

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

The future Cloud. Peter H. Moser, Jr. Manager, Portfolio Architects & Account CTOs

The future Cloud. Peter H. Moser, Jr. Manager, Portfolio Architects & Account CTOs The future Cloud Computing? Peter H. Moser, Jr. Manager, Portfolio Architects & Account CTOs 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Securing Virtual Environments

Securing Virtual Environments Securing Virtual Environments Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 INTRODUCTION Virtualization is sweeping through computer architectures. The benefits of running multiple

More information

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011 10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s

More information

HP Networking Is Poised to Capitalize on the Software-Defined Networking Market Transition

HP Networking Is Poised to Capitalize on the Software-Defined Networking Market Transition Lippis Report 210: HP Networking Is Poised to Capitalize on the Software-Defined Networking Market Transition By Nicholas John Lippis III President, Lippis Consulting HP has been an industry leader when

More information

VMware vsphere 4.1 with ESXi and vcenter

VMware vsphere 4.1 with ESXi and vcenter VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice

More information

Cloud beyond limits. Lorenzo Gonzales Strategist, HP Enterprise Group EMEA

Cloud beyond limits. Lorenzo Gonzales Strategist, HP Enterprise Group EMEA Cloud beyond limits Lorenzo Gonzales Strategist, HP Enterprise Group EMEA Opportunities or challenges? Always growing connections Immediate responses are expected Change is part of the system Interactions

More information

Convergence is accelerating the path to the New Style of Business

Convergence is accelerating the path to the New Style of Business Convergence is accelerating the path to the New Style of Business Paul Durzan Vice President Converged Data Center Infrastructure Hewlett Packard Enterprise Copyright 2012 Hewlett-Packard Development Company,

More information

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying

More information

HP Converged Infrastructure & Cloud

HP Converged Infrastructure & Cloud HP Converged Infrastructure & Cloud Mark Linesch Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. A new style of IT emerging

More information

Safeguarding the cloud with IBM Security solutions

Safeguarding the cloud with IBM Security solutions Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions

More information

Cisco ASA 1000V Cloud Firewall

Cisco ASA 1000V Cloud Firewall Data Sheet Cisco ASA 1000V Cloud Firewall Product Overview The Cisco ASA 1000V Cloud Firewall extends the proven Adaptive Security Appliance security platform to consistently secure the tenant edge in

More information

Monitoring & Measuring: Wi-Fi as a Service

Monitoring & Measuring: Wi-Fi as a Service Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless

More information

Enterprise Security and Risk Management

Enterprise Security and Risk Management Enterprise Security and Risk Management Growth, innovation, efficiency depend on security HP protects what matters Banking Manufacturing Public Sector $9 trillion USD per day 1000+ Business processes 13

More information

Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management

Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management Hybrid Delivery: The right IT strategy Creating the optimal mix of traditional IT and cloud services

More information

Automated Protection on UCS with Trend Micro Deep Security

Automated Protection on UCS with Trend Micro Deep Security Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project

More information

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for

More information

Innovation Session. MOBILITY Pieter Schouten. HP EMEA Software Performance Tour 2014

Innovation Session. MOBILITY Pieter Schouten. HP EMEA Software Performance Tour 2014 HP EMEA Software Performance Tour 2014 Innovation Session MOBILITY Pieter Schouten Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense

Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense Telco Systems and Celare in a nutshell Company overview Some of our customers Sister companies, subsidiary

More information

New Virtual Application Networks Innovations Advance Software-defined Network Leadership

New Virtual Application Networks Innovations Advance Software-defined Network Leadership New Virtual Application Networks Innovations Advance Software-defined Network Leadership Simplifying, Scaling and Automating the Network Gartner Hype Cycle 10 Year Cycle 2008 2011 2012 2 Source: Gartner

More information

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Security Solution Architecture for VDI

Security Solution Architecture for VDI Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)

More information

The New Style of IT. Marc Fischer VP Enterprise Servers, Storage and Networking. 03. April 2014 Connect Symposium

The New Style of IT. Marc Fischer VP Enterprise Servers, Storage and Networking. 03. April 2014 Connect Symposium The New Style of IT Marc Fischer VP Enterprise Servers, Storage and Networking 03. April 2014 Connect Symposium To remain static is to lose ground. David Packard Living in the Age of Tectonic Shifts Welcome

More information

Welcome. Lynn Anderson Senior Vice President, Communications

Welcome. Lynn Anderson Senior Vice President, Communications Welcome Lynn Anderson Senior Vice President, Communications Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Extends Converged

More information

TRANSFORMING NETWORKING WITH OPEN SDN. Jason Matlof, VP Marke1ng April, 2013

TRANSFORMING NETWORKING WITH OPEN SDN. Jason Matlof, VP Marke1ng April, 2013 TRANSFORMING NETWORKING WITH OPEN SDN Jason Matlof, VP Marke1ng April, 2013 CLOSED & PROPRIETARY NETWORKING EQUIPMENT Ver1cally Integrated Systems Have Changed LiEle Over the Past 15 Years Feature 1 Feature

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security

More information

The IT Infrastructure Company of the Next Decade

The IT Infrastructure Company of the Next Decade The IT Infrastructure Company of the Next Decade 1 Agenda Corporate Overview Our vision Key drivers Three Pillars of Innovation Summary 2 Safe Harbor Statement Except for the factual statements made herein,

More information

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum 2012-04-05 HUAWEI TECHNOLOGIES CO., LTD.

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum 2012-04-05 HUAWEI TECHNOLOGIES CO., LTD. 2012-04-05 Cloud Security Securing what you can t touch www.huawei.com www.huawei.com Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD. Why worry about cloud security?

More information

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware

More information

CONVERGED VIRTUAL STORAGE

CONVERGED VIRTUAL STORAGE CONVERGED VIRTUAL STORAGE 20th. July 2011 Dr. Dave Barnes, HP UK Storage Specialist 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice CHANGING

More information

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1 #ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million

More information

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information

More information

Swisscom Cloud. Building a secure cloud. SIGS, 09.09.2014 Christof Jungo

Swisscom Cloud. Building a secure cloud. SIGS, 09.09.2014 Christof Jungo Swisscom Cloud Building a secure cloud SIGS, 09.09.2014 Christof Jungo Cloud What is changing? 2 Enterprise Datacenter High secure tier 3 & 4 Server typ Processor architecture: various Baremetal & virtual

More information

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1) Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management

More information