Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
|
|
- Juniper Glenn
- 8 years ago
- Views:
Transcription
1 Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist
2 Agenda What is the Cloud? Virtualization Basics How Virtualization and Cloud Affect Datacenter Security How to Secure our Cloud and Make it Compliant Network Security and Secure Multi-tenancy in the Cloud
3 What is the Cloud and What Does it Means To Security SaaS Salesforce.com, Google Apps, etc The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. PaaS Vmforce, Google AppEngine, etc IaaS Terremark, Rackspace, Savvis, etc *Graphics Courtesy of Chris Hoff and the Cloud Security Alliance
4 Security Considerations of Each Type of Cloud Software (SaaS) Least extensibility and greatest amount of security responsibility taken on by the cloud provider Infrastructure (IaaS) Greatest extensibility and least amount of security responsibility taken on by the cloud provider Platform (PaaS) Lies somewhere in the middle, with extensibility and security features which must be leveraged by the customer
5 Infrastructure as a Service Hardware Virtualization is the basis of the IaaS Model Examples include: VMware vsphere MS HyperV Citrix XenServer Redhat KVM
6 Virtualization Basics
7 Next Step is to Leverage Virtualization to Provide Pools of Shared Resources Traditional View Virtual Datacenter Exchange Operating VMware Infrastructure System PCI Operating VMware Infrastructure System VMware vsphere DNS Operating VMware Infrastructure System CRM Operating VMware Infrastructure System CPU Pool Memory Pool Storage Pool Interconnect Pool
8 Platform Sec.
9 Secure the Underlying Platform 1st Use the Principles of Information Security Hardening and Lockdown Defense in Depth Authorization, Authentication, and Accounting to enforce Separation of Duties and Least Privileges Administrative Controls For virtualization this means: Harden the Virtualization layer Setup Access Controls Secure the Guests Leverage Virtualization Specific Administrative Controls What Auditors Want to See: Network Controls Change Control and Configuration Management Access Controls & Management Vulnerability Management
10 Protection of Management Interfaces is Key vnic vnic vnic VMkernel Production vswitch1 Mgmt Storage vswitch2 vmnic Segment out all non-production networks Use VLAN tagging, or Use separate vswitch (see diagram) Strictly control access to management network, e.g. RDP to jump box, or VPN through firewall Prod Network Mgmt Network VMware vsphere 4 Hardening Guidelines vcenter Other ESX/ESXi hosts IP-based Storage 10
11 Separation of Duties Must Be Enforced More Power Super Cloud Admin Cloud Networking Admin Cloud Server Admin Cloud Storage Admin Less Power Tenant A Admin Tenant B Admin Tenant C Admin VM Admin VM Admin VM Admin VM Admin VM Admin VM Admin
12 Security Perspective On Customer Deployment Architectures 0 PHYSICAL AIR GAPPED PODS MIXED TRUST CLUSTERS ON-PREMISE PRIVATE CLOUD DEDICATED PRIVATE CLOUD (ebay, CSC) PUBLIC MULTI-TENANT CLOUD (Terremark, EC2) Physical deployments are still considered to be most secure and remain in all enterprises Air gapped pods are preferred by security teams for virtualized high risk assets (SOX, PCI, DMZ) Mixed trust clusters typically have the M&M security model, blocking important asset migration to them Private cloud is an extension of the mixed trust deployment, with more automation and self service Dedicated Private Cloud SLAs make it virtually the same risk level as the on-premise deployments Multi-tenant Public Cloud is just emerging, with concerns around visibility, audit, control and compliance
13 The Datacenter needs to be secured at different levels Perimeter Security Sprawl: hardware, FW rules, VLANs Rigid Perimeter FW rules security device (s) at the edge Performance Firewall, VPN, bottlenecks Intrusion Prevention Load balancers Cost & Complexity Keep the bad guys out At the vdc Edge Internal Security VLAN 1 VLANs VLAN or subnet based policies Interior or Web application Firewalls DLP, application identity aware policies Segmentation of applications, servers End Point Security Desktop AV agents, Host based intrusion DLP agents for privacy End Point Protection 13
14 Simple Definition of a Virtual Datacenter The isolated and secured share of a virtualized multitenant environment. Like a physical datacenter shares the Internet for interconnectivity, the tenants of a cloud (public or private) share the local network within the private datacenter or in the service providers network, and also like a physical datacenter, each tenant also has their own private, isolated, and secured virtual networking infrastructure. DMZ Tenant 1 Tenant 2 Tenant App1 App2 DMZ App1 App2 DMZ App1 App2 14
15 Securing virtual Data Centers (vdc) with legacy security solutions Internet PERIMETER SECURITY WEB ZONE INTERNAL SECURITY APPLICATION ZONE DATABASE ZONE ENDPOINT SECURITY Air Gapped Pods with dedicated physical hardware Mixed trust clusters without internal security segmentation Configuration Complexity vsphere vsphere vsphere o VLAN sprawl VIRTUALIZED DMZ WITH FIREWALLS o Firewall rules sprawl o Rigid network IP rules without resource context Private clouds (?) Legacy security solutions do not allow the realization of true virtualization and cloud benefits 15
16 Air Gapped Design Costly and Inefficient Internet Remote Access VPN Gateway VPN Gateway VPN Gateway L2-L3 Switch L2-L3 Switch L2-L3 Switch Aggregation Firewall Firewall Firewall Load Balancer Load Balancer Load Balancer Access Switch Switch Switch vsphere vsphere vsphere vsphere vsphere vsphere Company X Company Y Company Z 16
17 Multi-tenancy Physical Firewall and VLAN Internet Access- Aggregation L2-L3 Switch VLAN1000 VLAN 1001 VLAN 1002 Firewalls VLAN 1002 VLAN 1001 VLAN 1000 Legend : PG-X PG-Y PG-Z Port group Company X n/w Port group Company Y n/w Port group Company Z n/w VLAN 1000 VLAN 1001 VLAN 1002 vds/vss Port group to VM Links PG-X (vlan1000) PG-Y (vlan 1001) PG-Z (vlan 1002) Virtual to Ext. Switch Links VMware vsphere + vshield Company X Company Y Company Z 17
18 Multi-tenancy Virtualization Aware Internet Access- Aggregation L2-L3 Switch Infrastructure VLAN (VLAN 1000) Legend : Provider VLAN (VLAN 100) PG-X PG-Y PG-Z PG-C Port group Company X n/w Port group Company Y n/w Port group Company Z n/w External uplink Port group VLAN1000 VLAN1000 VLAN1000 Internal Company Links External Up Link vds vds to Ext. Switch Links PG-X(vlan1000) PG-C(vlan100) PG-Y(vlan1000) PG-Z(vlan1000) VMware vsphere + vshield vshield Edge VM Traffic flow not allowed Company X Company Y Company Z 18
19 Enforce Microsegmentation Inside the vdc Protect applications against Network Based Threats Application-Aware Full Stateful Packet Inspection FW Control on per-vm/per vnic level Web Virtual Datacenter 1 App See VM-VM traffic within the same host Security groups enforced with VM movement Database DISA & PCI Virtual Datacenter 2 CIS & PCI VMware vsphere + vcenter ESX Hardening Cluster B Cluster A 19
20 Offload Endpoint Based Security Functions with VM Introspection Techniques Improves performance and effectiveness of existing endpoint security solutions Offload Functions AV File Integrity Monitoring Application Whitelisting 20
21 Virtualized Security and Edge Services Cloud Aware Security Elastic Logical Efficient Automated Programmable Security as a Service Edge/Perimeter Protection Secure the edge of the virtual datacenter Security and Edge networking services gateway Internal Security and Compliance Micro-segmentation Discover and report regulated data in the Datacenter and Cloud Endpoint Security Efficient offload of endpoint based security into the cloud infrastructure i.e.- anti-virus and file integrity monitoring 21
22 Continuous and Automated Compliance Ongoing Change and Compliance Management Understand Pervasive Change Capture in-band and out-of-band changes Are you still Compliant? Remediate Exceptions Fit within current enterprise change mgmt workflow process Protect against vulnerabilities Hypervisor-based anti-virus provides superior protection Patch Management guards against known attacks Software provisioning tied to compliance Day to day vulnerability checks Remediate (RFC Optional) Compliant State Deployed from Gold Standard Compliant State Noncompliant State Planned Change Unplanned Change Mark as Exception 22
23 Conclusion The Cloud Had Great Benefits and like any Technology its Associated Risks These Risks Can Be Mitigated With Proper Controls The Classic Principles of Information Security Should be Applied Key Architecture Decisions must be made for Security Tools Designed for the Cloud Must Be Utilized 23 Confidential
24 Questions? Rob Randell, CISSP Senior Security and Compliance Specialist
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
More informationSecurely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationVisions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Visions of Clouds and Cloud Security Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Visions of Clouds and Cloud Security What is the Cloud? PAAS SAAS IAAS Chris Hoff s Model
More informationThe growing importance of a secure Cloud environment
The growing importance of a secure Cloud environment Jan Tiri jtiri@vmware.com System Engineer, VMware BeLux 2009 VMware Inc. All rights reserved Cloud components Enterprises Cloud Service Providers Private
More informationSecuring the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC
Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service
More informationSecurity in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined
More informationvshield Quick Start Guide
vshield Manager 5.0 vshield App 5.0 vshield Edge 5.0 vshield Endpoint 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationShifting Roles for Security in the Virtualized Data Center: Who Owns What?
Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director
More informationBusiness Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationVMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationDMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
More informationPotecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.
Potecting your business assets in The Cloud, with Secure Multitency Environment from CloudHPT. Whitepaper 1 Introduction Goal of This Document To provide a guide to the security features of CloudHPT. CloudHPT
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationVMware Solution Guide for. Payment Card Industry (PCI) September 2012. v1.3
VMware Solution Guide for Payment Card Industry (PCI) September 2012 v1.3 VALIDATION DO CU MENT Table of Contents INTRODUCTION... 3 OVERVIEW OF PCI AS IT APPLIES TO CLOUD/VIRTUAL ENVIRONMENTS... 5 GUIDANCE
More informationVMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
More informationvshield Quick Start Guide
vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationVMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationvshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0
vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationVMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
More informationLearn how to build Enterprise Hybrid Clouds for your customers using VMware vcloud
Learn how to build Enterprise Hybrid Clouds for your customers using VMware vcloud 1 The business has strict demands of IT As the CIO, I provide Through Cloud I am able business with the to cost effectively
More informationCloud and VM Based Security
Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]
More informationSichere Virtualisierung mit VMware
Sichere Virtualisierung mit VMware Stefan Bohnengel, VMware Harald Speckbrock, RSA Neuss, 12.11.2009 Building The Private Cloud private cloud Flexibility Control Choice your applications your information
More informationVMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
More informationSecuring the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
More informationSecurity Solution Architecture for VDI
Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationBla Bla Bla Cloud. Massimo Re Ferre VMware Staff Systems Engineer vcloud Architect. 2009 VMware Inc. All rights reserved
Bla Bla Bla Cloud Massimo Re Ferre VMware Staff Systems Engineer vcloud Architect 2009 VMware Inc. All rights reserved Uh? 2 Virtualization explained in one picture (note reaction) 3 Cloud explained in
More informationJourney to the Private Cloud. Key Enabling Technologies
Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion
More informationVirtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE
Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware
More informationExpert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
More informationENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0
ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS Version 2.0 July 20, 2012 Table of Contents 1 Foreword... 1 2 Introduction... 1 2.1 Classification... 1 3 Scope... 1
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationVirtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
More informationSECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
More information雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone
雲 端 發 展 與 安 全 趨 勢 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Agenda 1 雲 端 發 展 概 況 2 私 有 雲 演 進 過 程 及 未 來 3 雲 端 虛 擬 化 的 安 全 疑
More informationThe Top 8 Questions to ask about Virtualization in a PCI Environment
A COALFIRE WHITE PAPER The Top 8 Questions to ask about Virtualization in a PCI Environment DALLAS DENVER LOS ANGELES NEW YORK SEATTLE 877.224.8077 info@coalfire.com www.coalfire.com This paper provides
More informationBarnaby Jeans Sr. Solution Architect Business Critical Applications
Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationVirtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
More informationEnd to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
More informationProduct Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Security Requirements of Hybrid Clouds: A Product Comparison! Edward L. Haletky Analyst Virtualization and Cloud Security! The Virtualization Practice Sponsored
More informationSecure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
More informationSecurity. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
More informationSoftware Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
More informationHardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security
Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware
More informationSecuring the Physical, Virtual, Cloud Continuum
Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud
More informationUnderstanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed
More informationHow To Protect A Data Center From A Hacker Attack
CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect mboland@checkpoint.com 2015 Check Point Software Technologies
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationHow To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
More informationIntel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
More informationBuilding an Enterprise Hybrid Cloud with the VMware vcloud Solution
Building an Enterprise Hybrid Cloud with the VMware vcloud Solution Glenn Grabowski, Staff Systems Engineer, Senior Cloud Specialist, VMware May 4, 2011 Customer Presentation 2009 VMware Inc. All rights
More informationItex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
More informationvshield Installation and Upgrade Guide
vshield Manager 5.5 vshield Edge 5.5 vshield Endpoint 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationUnleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012 2 Who? Viktor van den Berg Consultant @ PQR Former Dutch VMUG Leader Blogger at www.viktorious.nl Twitter @viktoriousss
More informationVMware vcloud Director for Service Providers
Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud
More informationImplementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**
Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part
More informationJUNIPER NETWORKS CLOUD SECURITY
White Paper JUNIPER NETWORKS CLOUD SECURITY Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction Cloud Computing Overview...3 Private Cloud... 4 Public Cloud...
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationNetwork Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
More informationHow To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationLarry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationVirtualization with VMware and IBM: Enjoy the Ride, but Don t Forget to Buckle Up!
Virtualization with VMware and IBM: Enjoy the Ride, but Don t Forget to Buckle Up! Ravi Kumar, Group Product Marketing Manager - Security, VMware Bob Kalka, Director, IBM Security Solutions, IBM The Rise
More informationOVERVIEW OF VIRTUAL FIREWALLS ON VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com OVERVIEW OF VIRTUAL FIREWALLS ON VBLOCK INFRASTRUCTURE PLATFORMS June 2012 1 Contents Introduction... 3 Purpose... 3 Scope... 3 Audience... 3 Feedback...
More informationVMUG - vcloud Air Deep Dive. 2014 VMware Inc. All rights reserved.
VMUG - vcloud Air Deep Dive 2014 VMware Inc. All rights reserved. Agenda 1 Overview of vcloud Air 2 Advanced Networking Capabilities 3 Use Cases 4 Overview of Disaster Recovery Service 5 Questions 2 VMware
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationNetwork Segmentation in Virtualized Environments B E S T P R A C T I C E S
Network Segmentation in Virtualized Environments B E S T P R A C T I C E S ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed
More informationRE Cloud from Richardson Eyres
RE Cloud from Richardson Eyres Frequently asked Questions What is RE Cloud? RE Cloud is Richardson Eyres cloud computing service delivering virtualised, on demand multi tenant elastic computing resource.
More informationInfor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationBuilding YOURcloud: The Federal Government s first Secure Hybrid Community Cloud
Building YOURcloud: The Federal Government s first Secure Hybrid Community Cloud Anil Karmel, Deputy Chief Technology Officer National Nuclear Security Administration A Partnership between the Office of
More informationNEC SigmaSystemCenter 3.0 highlights
NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011 NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource
More informationVMware vsphere: Fast Track [V5.0]
VMware vsphere: Fast Track [V5.0] Experience the ultimate in vsphere 5 skills-building and VCP exam-preparation training. In this intensive, extended-hours course, you will focus on installing, configuring,
More informationRSA Security Solutions for Virtualization
RSA Security Solutions for Virtualization Grzegorz Mucha grzegorz.mucha@rsa.com Securing the Journey to the Cloud The RSA Solution for Virtualized Datacenters The RSA Solution for VMware View The RSA Solution
More informationSecuring the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R
W H I T E P A P E R Securing the Cloud A Review of Cloud Computing, Security Implications and Best Practices VMware, Inc. 314 Porter Drive Palo Alto CA 94304 USA Tel 60-47-000 Fax 60-47-001 www.vmware.com
More informationHealthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation
Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application
More informationSecure Virtualization in the Federal Government
White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in
More informationCloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum 2012-04-05 HUAWEI TECHNOLOGIES CO., LTD.
2012-04-05 Cloud Security Securing what you can t touch www.huawei.com www.huawei.com Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD. Why worry about cloud security?
More informationAdvancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd
Advancing Security with Software Defined Datacenter Karen Law Senior Systems Consultant VMware Hong Kong Ltd AGENDA Why Micro-segmentation? Understanding SDDC Network Virtualization Why Network Hypervisor?
More informationH Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
More informationPresentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012
Presentation for ISACA Chapter NL Auditing Virtual Servers VMware: Security and Operations Gert-Jan Timmer 3. September, 2012 Auditing Virtual Servers: Vmware: Security and Operations Presentation today:
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationSecurity & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
More informationVMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Advanced Networking Features TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage....
More informationvcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationVMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000
VMware NSX Network Virtualization Design Guide Deploying VMware NSX with Cisco UCS and Nexus 7000 Table of Contents Intended Audience... 3 Executive Summary... 3 Why deploy VMware NSX on Cisco UCS and
More information