The Virtualization Practice

Size: px
Start display at page:

Download "The Virtualization Practice"

Transcription

1 The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice Sponsored by Trend Micro Version 1.0 January The Virtualization Practice, LLC. All Rights Reserved. All other marks are property of their respective owners. Abstract Trend Micro was one of the first VMware security ecosystem partners to implement the VMware introspective API from that came the very first version of Trend Micro Deep Security TM. Deep Security has grown to include much more than just a firewall allowed by the very first introspective API to a product that includes agentless offload of many important security tasks. Trend has expanded this functionality to cover not only a virtual environment, but also physical and cloud environments. Trend Micro SecureCloud TM has grown to use Deep Security policy to further refine who or what can gain access to encrypted data. Given these new changes, how Trend Micro Deep Security and SecureCloud products provide a solution that fits into the over all hybrid cloud security architecture comes to the forefront, as these products are no longer just a virtualization tool. 1

2 Table of Contents I. Introduction... 3 II. III. IV. Why a Spectrum of Security... 5 Trend Micro within the Spectrum... 6 Protect the Data: Physical, Virtual, and Cloud... 8 V. About The Virtualization Practice... 8 VI. VII. About Trend Micro... 8 References

3 I. Introduction At the start of any reference architecture is the requirements, and the requirements for this particular architecture is to look at the entire hybrid cloud. We want to see where specific Trend Micro products fit into a spectrum that covers the entire hybrid cloud, and not just one aspect such as virtualization. While previous versions of Deep Security were virtualization specific, Trend Micro Deep Security has strengthened their cloud offerings over the last several years. Trend Micro has added in support not only for cloud infrastructures but also provides a centralized management interface for physical, cloud, and virtual end point security tools while integrating the policies for end point security into their SecureCloud offering. By combining these products at the policy level it is possible to allow SecureCloud to know whether or not specific end point security policy is met before allowing access. So the question becomes, where does Trend Micro Deep Security, SecureCloud, and other products fit into the overall hybrid cloud architecture. This architecture was presented within The Virtualizaiton Practice s Secure Hybrid Cloud Reference Architecture ( What follows is a synopsis of this architecture in a more general form. We present a security spectrum of the hybrid cloud built upon logical boundaries as shown in Figure 1 (which resides on page 4). Figure 1 shows this spectrum spanning end user computing (EUC) through the typical data center bastion, into the data center and then the application layer. At this point there is a change of control to the virtualization layers, which make more efficient use of the underlying hardware (below the spectrum) and storage (far right). Any part of this spectrum could communicate with a cloud service (above the spectrum). In addition to defining each spectrum as a different color and by name, we also present a typical flow chart of functionality for a Tier 1 application: . is rather unique today as we have many decisions to make as to how our mail moves through out a hybrid cloud. At the EUC layer of our spectrum, we have to decide do we go direct to the cloud service, through a security service residing in the cloud first or into our data center through our bastion that would often contain a DMZ where VPN end points may terminate. Once we are within the bastion we may then decide to either redirect to a cloud service via some gateway service or go deeper into our datacenter. The datacenter layer in our spectrum is a set of switches and decision logic that tells us where we go from here. We could hook into a cloud gateway service at this layer, or we could go direct to our Tier 1 App, in this case our Server. An server running as a virtual machine would either choose to go to a cloud gateway service to access in the cloud or run locally, in either case the tier 1 App changes its control to the virtualization layers and the hypervisor which then may or may not implement an introspection layer that is a part of the hypervisor. Eventually the request could be written locally to disk and also be replicated to some cloud service. Perhaps this is a combination of using Google Mail for personal data and a corporate Exchange server as your Tier 1 App as well as integrating in Microsoft Forefront capabilities as well as data protection via VMware SRM Replication to a cloud service. 3

4 4

5 II. Why a Spectrum of Security With hybrid clouds there is are a wide range of application interactions and directions you can take within the application when you start to look at how the application is accessed and then how the data within the application is secured. We are therefore looking at Data Access Security as well as Data Security (in motion and at rest) as well as Data Protection techniques to maintain availability. All three of these are looked at within this spectrum of security depicted on page 4. We start with End User Computing Devices (EUC) (Data Access) and quickly either head northbound to the Cloud (still Data Access) or Eastbound towards our Bastions hosts and DMZ. Which if consider this bastion as also the beginning of your cloud, you are really ahead of the game. What is East of our EUC devices is also what is north of them. Once you are in the Bastion and DMZ aspects of your hybrid cloud (north or eastbound) there is also choice to head further east or once more north into the cloud. Once you head east you will enter the real data center. The datacenter ends up being one big switching environment that sends data either south into the virtual environments, west with results, or even further south to the physical hardware. It could also send data north to a cloud environment. In either case, data is being sent in almost all directions with one exception. When we mover further east we are changing control from the data center layer to the virtualization layers, that change of control is where virtual machines interact with hypervisors in a many to one configuration (many VMs to one hyperviros) and hypervisors interact with physical hardware (south bound) in a one to one configuration (one hypervisor to one set of hardware). There is a subset of the hypervisor layer that is the introspective layer. The introspective layer allows security tools to gain access to what is happening within each virtual machine within the hypervisor. While all hypervisors have the capability, only a few aspects of introspection are being used outside of the VMware vsphere environment (which allows access to all resources: memory, network, CPU, and storage). Specifically, we see more third parties tying into storage introspection specifically on Hyper-V than any other resource. Introspection gives use a wonderful place to extend our security deep into the virtual environment. The last layer of our spectrum is the storage layer. We cannot escape the physical nature of storage, but storage these days is more than just a disk, we include in this layer all things related to data protection, replication, tiering, encryption, etc. In essence, whatever the storage hardware can do, while it seems pretty simplistic to treat all storage the same but from a security spectrum that covers the interactions between layers, storage is one major layer overlooked from a security perspective today. Security within storage is very simplistic, and while this is very good from a security management perspective it does require more physical security than other areas of the spectrum. We have a spectrum that goes west <-> east and north <-> south. We can enter the cloud at nearly every point in this spectrum. Each boundary of this spectrum will require some form of security. We need to extend our security measures to cover all colors of our spectrum. 5

6 III. Trend Micro within the Spectrum Trend Micro has many tools that provide coverage through our spectrum of security; in addition, Trend Micro has teamed up with VMware to provide further coverage of our spectrum of security. There are a number of tools that Trend Micro provides to cover the spectrum of security, specifically: Trend Micro Deep Security (DS) Trend Micro SecureCloud Trend Micro Mobile Security While VMware provides vcloud Network and Security (vcns) Edge vcloud Network and Security APIs VMware Horizon Mobile VMware Horizon Application Manager (HAM) Within the page 4 diagram, you can see where each of these tools fit with their respective Trend Micro and VMware icons. As we move through our spectrum the following tools have been placed. Spectrum Element Trend Micro VMware Notes End User Computing (EUC) Mobile Security Horizon Mobile Securing the EUC device is not only about encrypting the device but ensuring data access security. Bastion Deep Security vcns Edge All items within a DMZ 6 should have active end point security Data Center vcns Edge, HAM The data center can be viewed as a switching fabric. Once in the data center we must control access to any cloud or enterprise applications. Applications Deep Security vcns Edge All tier one applications and cloud gateways should have end point security and virtualization management layers need to be segregated.

7 Virtual Machines VMware provides lowlevel protection via built-in hypervisor security including use of Intel TXT. Hypervisor Deep Security vcns APIs VMware provides all APIs to access introspective and other security mechanisms. While Deep Security provides a mechanism to set the TPM/TXT registers. Introspection Deep Security Deep Security hooks into the vcns network and storage (DS versions < v8) APIs to perform its introspective security. DS on vsphere provides per VM firewalls as well as end point security. Storage SecureCloud SecureCloud provides an encrypted share that virtual machines can use as storage for application data. Cloud Hardware Deep Security, SecureCloud DS can run within a cloud service provider to provide integrated management of all DS end point security countermeasures. In addition, SecureCloud can be used within various clouds as well. The hardware vendor provides hardware security. As can be seen from this table and the page 4 diagram, Trend Micro fits within nearly all aspects of hybrid cloud security. Deep Security covers not only virtual but also physical or even cloud aspects of end point security all centrally managed from your own datacenter. This is a big win when trying to manage policy. Tie Deep Security with SecureCloud you have a mechanism to not 7

8 only provide end point security, but ways to provide a policy store for access to your data. Even so, we are looking at a solution to the problem of hybrid cloud security, not point products. The solution includes point solutions from VMware as well as Trend Micro. IV. Protect the Data: Physical, Virtual, and Cloud When you look at protecting your data within all aspects of the hybrid cloud: physical, virtual, and cloud locations, we need to start considering solutions that span products instead of specific products. No one product can cover the entire spectrum of security. At best they can be used in many different bands of the spectrum, but there needs to be some glue that holds them together, we need to consider how the data is accessed, how to secure the data, while providing data protection in the form of disaster recovery, business continuity, and high availability. No man is an island, and no single security product will currently cover all aspects of the hybrid cloud. While we looked only at VMware vsphere based clouds, the Trend Micro security solution can be applied as well to non-vsphere based clouds and datacenters. All we loose is the ability to make use of the introspective layers of the hypervisor. Trend Micro Deep Security works just as well in agent-full mode as it does in agent-less mode while the Trend Micro Mobile Security and SecureCloud products and VMware Mobile Horizon and HAM work as part of this solution regardless of hypervisor framework. The one change when not using VMware vsphere products is to find another Edge firewall capability. V. About The Virtualization Practice The Virtualization Practice is the leading online resource of objective and educational analysis focusing upon the virtualization and cloud computing industries. Edward L. Haletky is the author of VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2 nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. VI. About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our 8

9 customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network global threat intelligence data mining framework, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at and as part of an RSS feed at Or follow our news on Twitter SOURCE Trend Micro Incorporated VII. References Edward L. Haletky. VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment, Prentice Hall PTR; 1 edition (June, 2009) Edward L. Haletky. Secure Hybrid Cloud Reference Architecture, The Virtualization Practice, LLC ( Version 1.1 (September 2012) 9

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Security Requirements of Hybrid Clouds: A Product Comparison! Edward L. Haletky Analyst Virtualization and Cloud Security! The Virtualization Practice Sponsored

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Protect your Virtual and Cloud Environment with Symantec Critical System Protection Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization

More information

Measuring Hypervisor Footprints: Assessing Risk

Measuring Hypervisor Footprints: Assessing Risk Measuring Hypervisor Footprints: Assessing Risk Edward L. Haletky The Virtualization Practice, LLC Author of: VMware vsphere TM and Virtual Infrastructure Security: Securing the Virtual Environment Assessing,

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

The Challenge of Workload Portability in a Multi-Provider Cloud

The Challenge of Workload Portability in a Multi-Provider Cloud Cloud Expo 2015 Software Defined Data Centre and Networks Theatre The Challenge of Workload Portability in a Multi-Provider Cloud Kevin Linsell Director, Strategy & Architecture, Adapt Steve Bianciardi

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««; Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization

More information

How To Compare The Cost Of A Microsoft Private Cloud To A Vcloud With Vsphere And Vspheon

How To Compare The Cost Of A Microsoft Private Cloud To A Vcloud With Vsphere And Vspheon A Comparative Look at Functionality, Benefits, and Economics November 2012 1 1 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC Virtualization as a key enabler for Cloud OS vision Vasily Malanin Datacenter Product Management Lead Microsoft APAC Can I enable employees to work from anywhere? How can I evolve my business apps to

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: A Look at Trend Micro Deep Security 7.5 Edward L. Haletky Analyst March 2011 2011 The Virtualization Practice. All Rights Reserved. Abstract Trend Micro Deep Security

More information

Total Cloud Protection

Total Cloud Protection Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5 Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity White Paper White Paper Managing Public Cloud Computing in the Enterprise Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity A Quick Start Guide By Edward Haletky Principal

More information

VMware for SMB environments(min. 505 1 st year)

VMware for SMB environments(min. 505 1 st year) VMware offers dozens of products, but at its core is vsphere, its virtualization platform, and vcenter Server, its management family. Understanding VMware's vsphere, vcenter and vcloud licensing is critical

More information

Ben Prusinski Session 3: 11/15/2012 14:30 to 15:30 Location: Diablo

Ben Prusinski Session 3: 11/15/2012 14:30 to 15:30 Location: Diablo Ben Prusinski Session 3: 11/15/2012 14:30 to 15:30 Location: Diablo About the Speaker- Ben Prusinski Oracle ACE Director, OCP, Beta tester, Author, Underwater Photographer Avid scuba diver and student

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Which is Better: Virtualization or Cloud IaaS?

Which is Better: Virtualization or Cloud IaaS? A White Paper Which is Better: Virtualization or Cloud IaaS? Which is Better: Virtualization or Cloud IaaS? Why should I consider Virtualization or Cloud IaaS at all? Simply put, they can save you money.

More information

Evolving Datacenter Architectures

Evolving Datacenter Architectures Technology Insight Paper Evolving Datacenter Architectures HP technologies for Cloud ready IT By Russ Fellows January, 2013 Enabling you to make the best technology decisions Evolving Datacenter Architectures

More information

Agentless Security for VMware Virtual Data Centers and Cloud

Agentless Security for VMware Virtual Data Centers and Cloud Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying

More information

vcloud Air Disaster Recovery Technical Presentation

vcloud Air Disaster Recovery Technical Presentation vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air

More information

1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer

1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer 1 2 3 1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer generations) believe that VMware invented virtualization.

More information

Trend Micro Deep Security

Trend Micro Deep Security Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental

More information

Course Title: Virtualization Security, 1st Edition

Course Title: Virtualization Security, 1st Edition Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

CloudCore. cloudcore infrastructure 4 100% SOLID STATE STORAGE 4 TRUE SCALE-OUT ARCHITECTURE 5 RAID-LESS DATA PROTECTION 5

CloudCore. cloudcore infrastructure 4 100% SOLID STATE STORAGE 4 TRUE SCALE-OUT ARCHITECTURE 5 RAID-LESS DATA PROTECTION 5 OVERVIEW CloudCore Supports the Most Demanding Workloads ISO 27001:2013 Security with 100% Data Encryption VMware s vcloud Air Network Service Compatible Choice of Multiple Offshore Jurisdictions calligo

More information

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware

More information

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix

More information

Virtualizing Exchange

Virtualizing Exchange Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention

More information

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone 雲 端 發 展 與 安 全 趨 勢 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Agenda 1 雲 端 發 展 概 況 2 私 有 雲 演 進 過 程 及 未 來 3 雲 端 虛 擬 化 的 安 全 疑

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

VMware for your hosting services

VMware for your hosting services VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware

More information

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics Microsoft Private Cloud A comparative look at Functionality, Benefits, and Economics Published: July 2012 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided

More information

Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments

Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments BUYER CASE STUDY Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments Iris Feng Eric Sheppard IDC OPINION Today's datacenter is dominated by virtualized workloads

More information

Managing Application Performance and Availability in a Virtual Environment

Managing Application Performance and Availability in a Virtual Environment The recognized leader in proven and affordable load balancing and application delivery solutions White Paper Managing Application Performance and Availability in a Virtual Environment by James Puchbauer

More information

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration Course Details Level: 1 Course: V6PCRE Duration: 5 Days Language: English Delivery Methods Instructor Led Training Instructor Led Online Training Participants: Virtualization and Cloud Administrators,

More information

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies

More information

Evaluation of Enterprise Data Protection using SEP Software

Evaluation of Enterprise Data Protection using SEP Software Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &

More information

Security in the Software Defined Data Center

Security in the Software Defined Data Center Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined

More information

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael

More information

Backup and recovery as agile as the virtual machines being protected

Backup and recovery as agile as the virtual machines being protected hosted by Mario Blandini @ Drobo Backup and recovery as agile as the virtual machines being protected Approaches and architectures for protecting VMware virtual machines using image-based backup Special

More information

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public

More information

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1) Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management

More information

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5

More information

Vmware VSphere 6.0 Private Cloud Administration

Vmware VSphere 6.0 Private Cloud Administration To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com Vmware VSphere 6.0 Private Cloud Administration Class Duration 5 Days Introduction This fast paced,

More information

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical

More information

DOUBLE VIRTUALIZATION BENEFITS WITH STORAGE FOR VIRTUALIZED ENVIRONMENTS

DOUBLE VIRTUALIZATION BENEFITS WITH STORAGE FOR VIRTUALIZED ENVIRONMENTS DOUBLE BENEFITS WITH STORAGE FOR VIRTUALIZED ENVIRONMENTS As IT has increasingly implemented server virtualization, it has neglected storage virtualization. Storage represents a rapidly growing investment

More information

Cisco Intercloud Fabric for Business

Cisco Intercloud Fabric for Business Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

VMware vsphere Design. 2nd Edition

VMware vsphere Design. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330623/ VMware vsphere Design. 2nd Edition Description: Achieve the performance, scalability, and ROI your business needs What

More information

WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10

WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10 Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Introduction... 3 Backup Approaches for Virtual Machines (VMs)...

More information

Managing Physical and Virtual Machines in Paragon Protect & Restore

Managing Physical and Virtual Machines in Paragon Protect & Restore Managing Physical and Virtual Machines in Paragon Protect & Restore Best Practices last updated: August 2013 Overview Paragon Software s Protect & Restore (PPR) offers a unified system and data protection

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products

MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Infrastructure Virtualization for Hybrid Cloud

Infrastructure Virtualization for Hybrid Cloud Infrastructure Virtualization for Hybrid Cloud Technology Transformation Public cloud has delivered elastic computing to enterprises by offering on-demand resources to accommodate the burst computing needs.

More information

Disaster Recovery As A Service Storage by CloudGrid and Zerto Virtual Replication Disaster Recovery and Business Continuity Platform

Disaster Recovery As A Service Storage by CloudGrid and Zerto Virtual Replication Disaster Recovery and Business Continuity Platform Disaster Recovery As A Service Storage by CloudGrid and Zerto Virtual Replication Disaster Recovery and Business Continuity Platform Cloud Grid Virtual Replication Cloud Grid provides an enterprise-class

More information

Expert Reference Series of White Papers. Five Reasons VMware vsphere 6.0 is a Game Changer. 0118 912 3456 www.globalknowledge.co.

Expert Reference Series of White Papers. Five Reasons VMware vsphere 6.0 is a Game Changer. 0118 912 3456 www.globalknowledge.co. Expert Reference Series of White Papers Five Reasons VMware vsphere 6.0 is a Game Changer 0118 912 3456 www.globalknowledge.co.uk Five Reasons VMware vsphere 6.0 is a Game Changer Bill Ferguson, MCT Alumni,

More information

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested

More information

RSA Security Solutions for Virtualization

RSA Security Solutions for Virtualization RSA Security Solutions for Virtualization Grzegorz Mucha grzegorz.mucha@rsa.com Securing the Journey to the Cloud The RSA Solution for Virtualized Datacenters The RSA Solution for VMware View The RSA Solution

More information

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype Tim Hall Oracle ACE Director Oracle ACE of the Year 2006 OakTable Network OCP DBA (7, 8, 8i, 9i, 10g, 11g)

More information

What s New in VMware Site Recovery Manager 6.1

What s New in VMware Site Recovery Manager 6.1 What s New in VMware Site Recovery Manager 6.1 Technical Overview AUGUST 2015 Table of Contents Introduction... 2 Storage profile based protection... 2 Stretched Storage and Orchestrated vmotion... 5 Enhanced

More information

2013 ovh.com. All rights reserved

2013 ovh.com. All rights reserved Abstract During this session, the user will learn how to optimize security, rights, network layers to build Private, Hybrid & Public Cloud range of services based on a same infrastructure using VMware

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

TODAY S CLOUD MEETS TODAY S STORAGE

TODAY S CLOUD MEETS TODAY S STORAGE SOLUTIONBRIEF TODAY S CLOUD MEETS TODAY S STORAGE Today s businesses are looking for ways to grow revenues while reducing costs. Cloud computing delivers new revenue generating services and reduces costs

More information

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R Pricing, Packaging and Licensing Overview W H I T E P A P E R Table of Contents Introduction to VMware vsphere 4..................................... 3 Pricing, Packaging and Licensing Overview..............................

More information

Agile Cloud Architecture for TDM and Architects

Agile Cloud Architecture for TDM and Architects Agile Cloud Architecture for TDM and Architects Lawrence Tse lawrencetse@falcon-solutions.com Director, Professional Services Chief Architect Falcon Consulting (HK) Limited Hybrid Cloud Architecture Ecology

More information

Acronis Backup Product Line

Acronis Backup Product Line New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote

More information

PROTECTING DATA IN MULTI-TENANT CLOUDS

PROTECTING DATA IN MULTI-TENANT CLOUDS 1 Introduction Today's business environment requires organizations of all types to reduce costs and create flexible business processes to compete effectively in an ever-changing marketplace. The pace of

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Extending the Power of Your Datacenter

Extending the Power of Your Datacenter Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Solution Architect Enterprise Group Taiwan Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

PLUMgrid Open Networking Suite Service Insertion Architecture

PLUMgrid Open Networking Suite Service Insertion Architecture White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid

More information

HBC1533 - How to build your cloud - Steps to Extend your Datacenter

HBC1533 - How to build your cloud - Steps to Extend your Datacenter VMworld 2014 Page 1 HBC1533 - How to build your cloud - Steps to Extend your Datacenter Tuesday, 14 October 2014 14:00 Dave Hill, VMware 5 key steps to Hybrid DC A thing made by combining two different

More information

VirtualclientTechnology 2011 July

VirtualclientTechnology 2011 July WHAT S NEW IN VSPHERE VirtualclientTechnology 2011 July Agenda vsphere Platform Recap vsphere 5 Overview Infrastructure Services Compute, Storage, Network Applications Services Availability, Security,

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Technology Insight Series

Technology Insight Series Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics Microsoft Private Cloud A comparative look at Functionality, Benefits, and Economics Published: January 2012 Table of Contents Executive Summary... 4 What is a Private Cloud?... 4 Microsoft Private Cloud

More information

SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS

SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends INTRODUCTION Enterprise Windows demands enterprise-class

More information

Monitoring Best Practices. Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software

Monitoring Best Practices. Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software Monitoring Best Practices Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software 1 Choosing the Right Approach to Get the Best Results Technical Track 1

More information

Virtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3

Virtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3 Service Description Virtualized Disaster Recovery (VDR) Terremark's Virtualized Disaster Recovery (VDR) service is a fully managed replication and Disaster Recovery (DR) service, where Terremark provides

More information

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Optimization, Business Continuity & Disaster Recovery in Virtual Environments Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Agenda Business Continuity and Disaster Recovery Challenges How

More information

INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs

INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs White Paper INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs Provisioning storage using EMC Symmetrix VMAX Cloud Edition Using REST APIs for integration with VMware vcloud

More information

Private Cloud for the Enterprise: Platform ISF

Private Cloud for the Enterprise: Platform ISF Private Cloud for the Enterprise: Platform ISF A Neovise Vendor Perspective Report 2009 Neovise, LLC. All Rights Reserved. Background Cloud computing is a model for enabling convenient, on-demand network

More information

SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies

SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT Julian Chesterfield, Director of Emerging Technologies DEFINING SOFTWARE DEFINED! FLEXIBILITY IN SOFTWARE Leveraging commodity CPU cycles to provide traditional

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on

More information

Going Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager!

Going Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager! Going Hybrid The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager! About Aruba! Few figures! About Aruba! Few figures! 2 million customers! About Aruba! Few figures! 600 people!

More information

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform

More information