Securing the Virtual Data Center

Size: px
Start display at page:

Download "Securing the Virtual Data Center"

Transcription

1 WHITE PAPER: VIRTUALIZATION SECURITY A Symantec and VMware Joint White Paper Securing the Virtual Data Center Who should read this paper Chief information security officers, directors of IT operations, and virtualization teams can use this document to identify security risks they may encounter when virtualizing critical or sensitive applications so that they can implement technologies and practices to safeguard their organizations IT and information assets.

2

3 Content Executive Summary Growth and challenges in virtual and cloud environments A new standard Shared risks New challenges Current solutions are inadequate Solutions designed for physical infrastructure Point solutions for virtual environments Outline of a general solution Benefits Symantec Server Security Solutions Use cases in virtual environments PCI compliance in a stand-alone secure server environment HIPAA compliance for secure Virtual Desktop Infrastructure Why Symantec? Conclusion

4 Executive Summary The compelling economies and efficiencies of virtualization and cloud computing are transforming enterprise IT. But the virtual transformation introduces new security risks, and complicates security and compliance management beyond the capabilities of either solutions designed for slow-moving physical environments or point solutions focused on individual vulnerabilities in the virtual world. Virtual environments need protection from top to bottom spanning hypervisors, management consoles, and physical hosts, not just endpoints and end to end, across these sprawling, dynamic new infrastructures. This paper outlines the challenges of securing virtual environments, and introduces a comprehensive approach to meet them, including: Virtualization-aware technologies to secure virtual and physical infrastructure and endpoints without compromising performance Hardening of virtual servers and their physical hosts against external and internal threats Security-management technologies and processes to achieve and document compliance with the most demanding regulatory requirements Tight integration with leading virtualization platforms, including compliance and incident response templates for efficient, confident implementation Building on its advanced endpoint and server security technologies, Symantec has introduced a comprehensive solution for safeguarding dynamic virtual and physical infrastructures from single data centers out to the most complex mixed private-public cloud environments. Field-proven with multinational enterprises in sensitive industries, Symantec Critical System Protection and Symantec Endpoint Protection merit careful consideration by any organization that must safeguard critical applications in growing virtual and cloud environments. 1

5 Growth and challenges in virtual and cloud environments A new standard Organizations virtualize IT workloads to consolidate them on reduced or outsourced physical infrastructure, so they can: Reduce equipment costs and expenses for power, cooling, and facilities Streamline IT operations and simplify management Arrange for effective disaster recovery of critical workloads The economics and efficiencies are compelling, and it s no surprise that x86-based virtual and cloud infrastructure is becoming the default platform for utility, highly volatile, and even mission-critical IT workloads. By mid-2011, 68% of IT workloads had already been virtualized. 1 With virtualization the number-one enterprise and small- and midsize-business spending priority 2, this trend is likely to continue. But virtualization adds complexity to security and compliance processes that evolved in less-dynamic physical environments. Left unaddressed, this complexity exposes organizations to security and compliance risks, and may even undercut the economy and efficiency of virtualization itself. Shared risks Of course, many security risks are shared across physical and virtual workloads: vulnerabilities in OS instances and applications, for example, can be exploited and must be patched. Malware and hacker attacks demand vigilance and vigorous defenses. And regulations and standards such as the Payment-Card Industry Data Security Standards (PCI-DSS), Health Insurance Portability and Accountability Act of 1996 (HIPAA), and European Union Data Protection Directive (EU Directive 95/46/EC) demand compliance in any computing environment, physical or virtual. New challenges But virtual and cloud environments present challenges for security and compliance above and beyond those found in physical environments. First, virtual environments add new elements. These include hypervisors, management servers, and utilities that need to be patched and protected to avoid exposing the entire virtual infrastructure to risks. As virtualization solution providers lock down hypervisor kernels and move service consoles and management functions outside the hypervisor, securing the management infrastructure, including all clients that access management application programming interfaces (APIs) becomes even more important. And because virtual machines (VMs) are dynamic by design, workloads with high compliance requirements may be moved in an instant to physical infrastructure shared with workloads that require much lower trust levels or compliance standards. Second, training and compliance issues lurk behind these technical challenges. IT staff, solution resellers, and consultants trained on physical infrastructure may not stay current with the tools and practices needed to secure fast-changing virtual and cloud environments. And the separation of management responsibilities typical in complex virtual environments Information Security from Configuration Management, for example may deprive the virtual infrastructure planning and deployment team of security expertise it badly needs. 1-John Burke, Principal Research Analyst, Nemertes Research. Cited in Joan Goodchild, Virtualized environments painfully insecure, CSO online. (Framingham, MA: IDG Communications CXO Media, June 7, 2011). 2-Enterprise Strategy Group. Cited in Todd Zambrovitz, 2012 in virtualization fixing the breaking points, VMblog.com. (Palo Alto, CA: VMware, Inc. December 8, 2011). 2

6 Finally, workload consolidation raises the value of IT targets even as it complicates their security. It is true that hypervisor platforms and management servers offer hackers and malware writers a much smaller body of code to exploit, making direct attacks more difficult than exploits of vulnerabilities in the millions of lines of OS and application code they run or supervise. But payoffs for successful attacks on virtual infrastructure are much higher, since they can expose every OS instance and applications running on or under the compromised platform. Throughout the history of IT, bad actors have followed the money and today s money is riding on virtual and cloud infrastructure see sidebar, Evolving patterns of attack. Current solutions are inadequate Neither security solutions designed for physical environments nor patchwork point solutions for virtual environments can deliver the comprehensive, deep protection organizations need when critical workloads run in virtual and cloud environments. Solutions designed for physical infrastructure Solutions designed to protect critical servers in physical environments include both commercial solutions adapted from physical into virtual domains, and an array of customized scripts and ad hoc tools designed for and often by security administrators trying to provide some degree of protection for applications and data in fast-changing virtual environments. But these solutions are seldom virtualization-aware. Based on assumptions that are reasonable for physical environments, they fall short in virtual and cloud environments, for example: Scope Virtualization adds a hypervisor layer, management server, and other virtualizationspecific elements to the server-os-middleware-application stacks typical of physical environments. This can introduce vulnerabilities in drivers, plug-ins, third-party switch code, or even the hypervisors themselves. Range Even solutions that protect VM infrastructure as well as endpoints and applications may leave management, backup, and other servers unprotected, especially from attacks by informed insiders. Agility All environments, physical and virtual, need constant patch management to protect applications running in them. But tools and processes designed for physical environments can t keep up with virtual environments where inter-vm communications may be difficult to monitor and in no time at all a running workload may be moved to a soft, unprotected physical server, or a Guest OS rolled back to an unpatched, insecure state. Point solutions for virtual environments Solutions designed to fill these gaps in security coverage, even when designed specifically for virtual environments, introduce their own problems. Adding a new class of solutions inevitably Evolving patterns of attack For years, the Symantec Internet Security Threat Report 3 has documented the rise of financiallyand politically-motivated attacks targeting specific companies and other organizations. The most recent report shows no relief in sight: High-profile attacks use sophisticated malware and hacking protocols to compromise and expose data at selected organizations Social networking information online helps hackers create spearphishing attacks that fool even experienced users at securityconscious firms Hide-and-seek techniques use zeroday vulnerabilities and rootkits that open back doors to stay hidden for weeks or months after an initial breach Attack kits put advanced capabilities in the hands of lesscapable hackers Today s malware coders and hackers include organized criminals, hactivists, state actors, and insiders who target enterprises, small businesses, end users, and governments for money, proprietary information, and to satisfy grievances, real or imagined. And although outsiders launch the most attacks, it s the insiders do the most financial and reputational damage 4. 3-Internet Security Threat Report, Volume 16: Trends for (Mountain View, CA: Symantec Corporation. April, 2011). 4-Bill Brenner, Senior Editor. Report: Insider attacks expensive, but there s a silver lining, CSO online. (Framingham, MA: IDG Communications CXO Media, February 3, 2011). 3

7 adds complexity, and may spread responsibility for security management across multiple teams. And because these point solutions are engineered independently from legacy security offerings, coverage by management consoles, for example may be misaligned, creating gaps that persistent hackers may exploit, or areas of overlap that will need to be coordinated across solutions or teams. Complexity and coverage issues are particularly risky when the environment changes, requiring realignment of multiple tools and teams to accommodate new or changed security requirements. Because virtual environments are so dynamic, a patchwork of security solutions quickly grows into a management headache and source of IT risk. Outline of a general solution A solution for protecting critical workloads in virtual and cloud environments first needs to cover all layers of the virtual ecosystem, without gaps, overlapping responsibilities, or blind spots. Coverage must include: Endpoint protection for OS instances and applications running on VMs Safeguards for hypervisors running Guest VMs on physical hosts Protection for management consoles and availability, backup, and other tools that support operations in the virtual environment Hardening and access controls for the physical infrastructure that supports the virtual environment Figure 1. Security risks are present at every level of dynamic virtual environments. Security and regulatory compliance require enterprise-grade protection for servers that handle critical applications and sensitive data. This includes protecting fixed and mobile network endpoints, which hackers can exploit for access. But endpoint protection alone is not enough: mission-critical applications and data sets require higher standards for: Protection for systems based on the value of the intellectual property, financial, and sensitive consumer information they contain Integrity, with server access and configuration changes recorded to provide a clear audit trail, for documented compliance with relevant standards and regulations Availability and operational efficiency, so that business-critical applications and data are not only protected, but continuously and easily available for authorized business use 4

8 Figure 2. Effective security requires protection of management solutions and host servers as well as Guest VMs. Signature-based technology IT security s "backstop" provides only incomplete protection. First, it is backward-looking and therefore ineffective against zero-day malware and advanced persistent threats that target individual organizations. Second, network, storage, and processor requirements of signature-based defenses multiplied across endpoints, servers, and consoles consume exactly the resources most needed for performance and service quality. In these demanding environments, efficient protection is as important as effective protection and both require applying multiple security technologies while avoiding resource-wasting duplication. In addition to efficient, comprehensive security technologies, a protection solution should support, organize, and accelerate proven security practices, overcoming the new challenges created when separate teams manage different aspects of complex virtual environments. This means early involvement of security teams in virtualization projects, using virtualization-aware compliance frameworks to keep security planning up to speed with deployment schedules. And security processes should be formalized and documented, to avoid cutting corners even when projects are moving fast, using workflow support that operates effectively across multiple teams, and produces clear records with an audit trail to document compliance. Benefits The most important advantage of this kind of protection is a comprehensive security posture aligned to the requirements of individual server workloads at every layer of the environments: endpoints, critical systems, specialized servers, and physical infrastructure. End-to-end coverage secures hypervisor and management layers of virtual environments as well as the OS and application on every VM, working seamlessly across physical, virtual, and cloud infrastructure, and avoiding patchwork solutions prone to gaps and duplication. The approach enforces tight controls on mission-critical or sensitive workloads without compromising the accessibility, availability, or performance of servers or endpoints. It hardens IT assets as required by policies and regulations, and logs, reports, and documents compliance across both physical and virtual environments for worry-free audits. Finally, since the point of virtualization is to achieve economies by pooling processor, I/O, and storage resources while maintaining quality of service, any security solution that adds heavy loads to virtual machines is a move in the wrong direction. An effective solution minimizes system overheads such as time-consuming signature updates and processor-intensive scans, especially on user-facing Guest VMs where I/O congestion and processor loads compromise the end-user experience. 5

9 Symantec Server Security Solutions Symantec server security solutions are designed and tightly integrated to help organizations maintain the highest levels of security and compliance as they rapidly expand their virtual and cloud environments. The solutions combine: Comprehensive coverage using signature-based anti-virus and anti-spyware, non-signature-based reputation and behavior protection technologies, plus firewall, application, and device controls Intrusion detection providing protection against custom crafted malware and sophisticated penetration techniques Host intrusion prevention applying policy-based non-signature protection to manage user activity, access to system resources, and restrict application behavior using Least-Priviledge Application Control (LPAC) Granular File Integrity Monitoring identifies changes to files that reside on compliance controlled assets Configuration Monitoring tracks files and registry settings of host systems to flag changes and vulnerabilities in real time Centralized Management simplifies administration of heterogeneous systems, providing a single-console, real-time view of events and graphical reports Symantec Server Security Solutions Symantec Critical System Protection Completely protect VMware environments without impacting performance: Analyze virtual system configurations to identify vulnerabilities Detect changes to files of virtualized compliance-controlled assets Identify malicious attacks to Windows and non-windows based guests, ESX/ESXi hypervisors and vcenter without using signatures Limit the behavior of VM workloads and use of removable media Harden critical systems against zero-day, known and unknown threats Protect against web-based threats, restricting port access and network communications Restrict the behavior of supported Guest OS Reduce the spread of malware by hardening VMware vcenter Symantec Endpoint Protection MaximizeVM density and performance without sacrificing security: Manage security of VMware virtual machines and physical machines from the same console Create a standard, safe, white-list VMware image Deduplicate scanning of identical files across multiple VMware machines Check that offline VMware machines are safe before bringing online Ensure that multiple VMware machines do not all perform security processing at the same time The combined Symantec solution has been thoroughly tested and optimized for virtual environments. Systematic elimination of duplicate and resource-intensive operations minimizes performance-reducing network, storage, and processor constraints, so service levels can be maintained at higher VM-to-host density. Use cases in virtual environments These two use cases, based on Symantec customer implementations, demonstrate the value of Symantec Server Security Solutions in mission-critical applications, and the added value of integrating these solutions for top-to-bottom security in highly virtualized environments. 6

10 PCI compliance in a stand-alone secure server environment A financial-services firm needed to demonstrate compliance with PCI DSS in a large stand-alone virtual server environment running SAP applications. They used Symantec Critical System Protection to secure the OS host layer, restrict inbound and outbound traffic to compliance control servers, and monitor file integrity. The solution also provided intrusion detection and prevention, protection against malicious file execution, and monitoring of user access to system components, with blocking of unauthorized access. HIPAA A compliance for secure Virtual Desktop Infrastructure A healthcare provider needed to secure its new VMware Virtual Desktop Infrastructure (VDI) to comply with HIPAA protections for confidential patient information. They used Symantec Critical System Protection to secure the OS host, ensuring that execution was limited to approved processes, and Symantec Endpoint Protection to secure each VDI image. High performance was maintained through the Shared Insight Cache, which eliminates scanning of duplicate files on multiple VMs, reducing the performance impact of the security solution up to 70%. Why Symantec? Symantec s history, experience, and investment program reflect the company s intent focus on security, from individual endpoints through physical servers running mission-critical workloads, to the most extensive and complex virtual and public and private cloud environments. Symantec s deep resources in threat prevention and analysis keep the company at the forefront of the IT security industry, alert to the latest developments in malicious software and attack methodologies and prepared to offer its customers up-to-date, effective protection. Conclusion Virtual environments are growing in size and complexity, and taking on mission-critical tasks that provide attractive targets for thieves, hackers, and malicious insiders. Responsible organizations are not just securing the endpoints of their growing virtual infrastructures, but taking care to protect the physical and virtual servers on which these infrastructures rest, along with the management and other utilities that support them. Solutions designed to meet the demands of slow-moving physical infrastructures lack awareness of the unique security requirements of these new virtual environments, protect them incompletely, and compromise their productivity for business uses. Patchworks of point solutions introduce gaps, duplication of responsibilities, and can add new risks. Symantec security solutions offer end-to-end and top-to-bottom security that is comprehensive, proven effective in demanding scenarios, and designed to operate with minimum performance impact on the systems and networks it protects. For an analysis of how Symantec Critical System Protection and Symantec Endpoint Protection can help meet your organization s security and compliance requirements, please contact Symantec at +1 (650) in the US, or by visiting our website at virtualization-security. 7

11

12 A Symantec and VMware Joint White Paper About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at About VMware VMware delivers virtualization and cloud infrastructure solutions that enable IT organizations to energize businesses of all sizes. With the industry-leading virtualization platform VMware vsphere customers rely on VMware to reduce capital and operating expenses, improve agility, ensure business continuity, strengthen security, and go green. With 2010 revenues of $2.9 billion, more than 250,000 customers, and 25,000 partners, VMware is the leader in virtualization, which consistently ranks as a top priority among CIOs. VMware, headquartered in Silicon Valley with offices throughout the world, can be found online at Symantec Corporation World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) VMware, Inc. World Headquarters 3401 Hillview Ave. Palo Alto, CA USA Tel: +1 (877) Fax: +1 (650) Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VMware and vsphere are registered trademarks or trademarks of VMware, Inc., in the United States and/or other jurisdictions. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. Other names may be trademarks of their respective owners /2012

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Taking the Leap to Virtualization

Taking the Leap to Virtualization WHITE PAPER: TAKING THE LEAP TO VIRTUALIZATION........................................ Taking the Leap to Virtualization Who should read this paper Midsized Business IT Directors, IT Managers and IT Administration

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

Securing OS Legacy Systems Alexander Rau

Securing OS Legacy Systems Alexander Rau Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Total Cloud Protection

Total Cloud Protection Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Secure Virtualization in the Federal Government

Secure Virtualization in the Federal Government White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in

More information

When Desktops Go Virtual

When Desktops Go Virtual When Desktops Go Virtual Virtualization Security. Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper February 2011 I. VIRTUAL DESKTOP INFRASTRUCTURE Server

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

VMware Solutions for Small and Midsize Business

VMware Solutions for Small and Midsize Business SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

End of Support Should Not End Your Business. Challenge of Legacy Systems

End of Support Should Not End Your Business. Challenge of Legacy Systems End of Support Should Not End Your Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

Reducing the Cost and Complexity of Web Vulnerability Management

Reducing the Cost and Complexity of Web Vulnerability Management WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements

More information

Trend Micro Deep Security

Trend Micro Deep Security Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Avoiding the Top 5 Vulnerability Management Mistakes

Avoiding the Top 5 Vulnerability Management Mistakes WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations

Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations Reduced Cost of Infrastructure Management, Higher Application Availability, Visibility Across

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

IBM Software Choosing the right virtualization security solution

IBM Software Choosing the right virtualization security solution IBM Software Choosing the right virtualization security solution Meet the unique security challenges of virtualized environments 2 Choosing the right virtualization security solution Having the right tool

More information

VMware Hybrid Cloud. Accelerate Your Time to Value

VMware Hybrid Cloud. Accelerate Your Time to Value VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

PCI DSS 3.0 Compliance

PCI DSS 3.0 Compliance A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

Agentless Security for VMware Virtual Data Centers and Cloud

Agentless Security for VMware Virtual Data Centers and Cloud Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying

More information

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case

More information

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they

More information

Optimizing the Data Center for Today s Federal Government

Optimizing the Data Center for Today s Federal Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

The Clock is Ticking on Windows Server 2003 Support

The Clock is Ticking on Windows Server 2003 Support A Trend Micro White Paper April 2015 The Clock is Ticking on Windows Server 2003 Support >> How Trend Micro can secure your end of life servers while enabling a safe transition Contents Introduction...3

More information

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Protecting Point-of-Sale Environments Against Multi-Stage Attacks SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting Point-of-Sale Environments Against Multi-Stage Attacks Who should read this paper Point-of-Sale

More information

The management imperative

The management imperative Pillars of Enterprise Protection: IT Management Technical Brief: IT Management Pillars of Enterprise Protection: IT Management Contents The management challenge...............................................................................

More information

Windows XP End-of-Life Handbook for Upgrade Latecomers

Windows XP End-of-Life Handbook for Upgrade Latecomers s Why Windows XP End-of-Life Handbook for Upgrade Latecomers s Why Introduction Windows XP end of life is April 8, 2014. Do you have Windows XP systems but can t upgrade to Windows 7 or Windows 8, or can

More information

HIPAA/HITECH Compliance Using VMware vcloud Air

HIPAA/HITECH Compliance Using VMware vcloud Air Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Comprehensive security platform for physical, virtual, and cloud servers

Comprehensive security platform for physical, virtual, and cloud servers datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

Symantec NetBackup 7.5 for VMware

Symantec NetBackup 7.5 for VMware V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

More information

PICO Compliance Audit - A Quick Guide to Virtualization

PICO Compliance Audit - A Quick Guide to Virtualization WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Safeguarding the cloud with IBM Security solutions

Safeguarding the cloud with IBM Security solutions Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions

More information

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments #1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information