Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure
|
|
- April Sutton
- 8 years ago
- Views:
Transcription
1 Protecting the Irreplacable November Athens Ian Whiteside, F-Secure
2 PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the consumers Tablets and Smart devices on a rise Enterprise deployment cycles budgetary constraints Desktop virtualization and cloud client computing deployments accelerate
3 The PC market today
4 What is Virtualization Virtualization is really a whole family of technologies and not just one thing Server virtualization Application virtualization Desktop virtualization Presentation virtualization Profile virtualization A virtual machine (VM) is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. In computing, a hypervisor, also called virtual machine monitor (VMM), allows multiple operating systems to run concurrently on a host computer a feature called hardware virtualization. The hypervisor presents the guest operating systems with a virtual platform and monitors the execution of the guest operating systems. Virtual desktop Infrastructure (VDI) is a desktop-centric service that hosts users desktop environments on remote servers and/or blade PCs, which are accessed over a network using a remote display protocol.
5 What issues are looking to be solved Virtual solutions help solving Critical BYOD and CYOD questions Hardware utilization and cost reductions Elasticity 5
6 Industry analysts Gartner in general predicts steady VDI growth for the next 3-5 years 6
7 VDI/Client virtualization market 7
8 Most important IT priorities over the next months, by company size 8
9 Problem: Manage and secure mixed environments? VDI VDI VDI VDI VM VM VM VM VDI VDI VDI VDI VM VM Physical server Physical server Desktop Desktop Desktop Desktop Desktop TS TS TS vsphere vsphere XenApp XenApp XenApp KVM Hyper-V Hyper-V Physical server Physical server Desktop Desktop Desktop Desktop AWS AWS
10 The Security Manager with a Headache 10
11 How does this all relate to F-Secure A virtual desktop is no more secure than a standard desktop A virtual desktop also needs to be up to date with the latest patches for all your applications A virtual desktop needs to be treated as a standard desktop but does need special consideration and specialized security solutions in most cases 11
12 Performance vs Protection Performance Protection 12
13 Our credentials.. We are impressed with the roadmap and strategy vision the company has laid out for the next 2 years Performance Strongest strategy Best Protection Award 2011 and 2012 March real world Protection Tests 100% Out of all corporate endpoint protection products we've reviewed, F-Secure Client Security offered by far the best protection 13
14 Security challenges with VDI In addition to security threats known in physical environments, virtualized environments pose specific risks: Hypervisor is software and thus vulnerable to attacks based on (un)known exploits VMware ESX source code 'leaked online Using unpatched or outdated templates for creating new VMs Uncontrolled generation, usage and movement VMs (so called VM creeping ) VM-to-VM, VM-to-hypervisor network eavesdropping Information disclosure (when VM is in storage or transit) CPU and I/O congestion 14
15 The security Challenges 15 F-Secure Confidential
16 Limitations of agent-less solutions Complex malware (like Zeus) run solely in memory and don t create malicious files on the file system, which makes it difficult to detect using standard file-based interception. Signature-based scanning is ineffective against modern day malware Blocking exploits and sophisticated attacks requires multi-layer protection, thus technologies like HIPS and behaviour based scanning can be difficult (if not impossible) to implement without an agent running on a virtual machine. End-point security is not just anti-malware. For both physical and virtual environment it is highly recommended to have patch management, device control, application firewall, password management and identity protection in place. 16
17 Aim for best protection and better performance (*) see notes SVCE must provide 100% detection against real-world attacks like we do with our existing end-point protection products SVCE performance must be on par or better than competition (**) see notes 17 F-Secure Confidential
18 The problem. Current solutions do not offer enough protection. 18
19 Introducing SVCE
20 F-Secure vision As companies will use mixed environments based on different VI/VDI platforms and running different guest operating systems, F-Secure will commit into the hypervisor agnostic, virtualization friendly security solution providing the best protection possible for virtual desktops and servers. 20 F-Secure Confidential
21 How it works F-Secure Policy Manager provides centralized management installed on physical and virtual machines. F-Secure Policy Manager Console is the administration console to define policies, deploy F- Secure software and monitor status of security. F-Secure Client Security and F-Secure Server Security endpoint security protection installed on physical or virtual desktops and servers respectively. F-Secure Management Agent communicates with F-Secure Policy Manager, applies defined policies and sends status information and alerts to the Policy Manager Server. F-Secure Automatic Update Agent responsible for downloading and installing software and database updates. F-Secure Offload Scanning Agent offloads malware scanning and content reputation checking to minimize the performance impact. F-Secure Scanning and Reputation Server the virtual appliance based on hardened Linux platform. It provides malware scanning and content reputation services. 21 F-Secure Confidential
22 Technical details F-Secure Security for Virtual and Cloud Environments is comprised of: F-Secure Client Security F-Secure Server Security F-Secure Scanning and Reputation Server This Beta release of the SVCE solution supports the following virtualization platforms: VMware vsphere 5.0, 5.1 with VMware vcenter Server 5.0, 5.1 Citrix VDI-in-a-Box 5.x for VMware ESXi F-Secure Security for Virtual and Cloud Environments solution can protect virtualized servers and desktops running the following operating systems: Microsoft Windows XP with Service Pack 3 Microsoft Windows Vista with Service Pack 2 or newer Microsoft Windows 7 with Service Pack 1 or newer Microsoft Windows 8 Microsoft Windows Server 2003 with the latest service pack Microsoft Windows Server 2003 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Small Business Server 2003 Microsoft Small Business Server 2003 R2 Microsoft Small Business Server 2008 Microsoft Small Business Server 2011, Standard edition Microsoft Small Business Server 2011, Essentials Microsoft Windows Server 2012 Microsoft Windows Server 2012 Essentials 22 F-Secure Confidential
23
24
25 younited for Business File backup, sync and sharing Jukka Puputti, Regional Director
26 Your information is more valuable than the device
27 You manage the security of your PCs, laptops, servers and mobile devices from one place. Why not your content cloud solution? Protection Service for Business
28 F-SECURE PROTECTION SERVICE FOR BUSINESS COMBINING CONTENT AND SECURITY UNIFIED MANAGEMENT PORTAL younited for Business Protection Service for Business Servers Workstations Mobile & Tablet & Spam Software Updater 28 F-Secure Partner Confidential
29 THE MARKET IS THERE
30 MULTI-DEVICE WORLD SOCIAL NETWORKS/CLOUDS GROWTH OF STORED DATA STORE, SEARCH, STREAM, SHARE BYOD (Bring Your Own Device) FROM INTERNAL IT TO CLOUD CONSUMERIZATION OF IT FROM TO COLLABORATION
31 INDUSTRY ANALYSTS AGREE ON THE IMPORTANCE OF FILE SYNC AND SHARE SERVICES IN BUSINESS 31 F-Secure Partner Confidential
32 ADOPTION DRIVEN BY EMPLOYEES USING THE SERVICES ON THEIR OWN CAUSING HEADACHE FOR IT MANAGERS Source: Spice Works, Catching Up to the Cloud: Steady migration into cloud-based file sharing, , and productivity services. July 32 F-Secure Partner Confidential
33 WHY COMPANIES LOOK FOR FILE SHARING Source: Spice Works, Catching Up to the Cloud: Steady migration into cloud-based file sharing, , and productivity services. July 33 F-Secure Partner Confidential
34 TOP CONSIDERATIONS FOR SOLUTION SELECTION Source: Spice Works, Catching Up to the Cloud: Steady migration into cloud-based file sharing, , and productivity services. July 34 F-Secure Partner Confidential
35 OUR SOLUTION
36 younited for Business File backup, sync and sharing * Central Management PSB Portal 36 F-Secure Partner Confidential
37 CENTRALIZED BUSINESS ACCOUNT MANAGEMENT RETAIN IT CONTROL, WITHOUT SACRIFICING USER BENEFITS Web-based management portal Different views for service partners and customers Manage subscriptions, younited accounts for your employees, security of the computers/ mobile devices / servers As Managed Service Service Provider manages security for their customers As Self-Service End customer manages their own security As an admin you can see how much quota user has and how much has been used You can also see which devices he has connected to his account 37 F-Secure Partner Confidential
38 How is younited for Business different from the consumer version Feature Younited (for consumers) younited for Business Common Features Store, Sync, Share Access anywhere, any device Cloud aggregation Collaboration (coming) Centralized Account Management and Monitoring Users, quota, subscriptions, dashboard Flexible multi-user licensing and centralized company billing Local support and services (from reseller partners)
39 ACCESS ALL YOUR FILES AND INFORMATION FROM ANYWHERE, WITH ANY DEVICE And there is a lot more you can do with younited Enhance teamwork productivity Don t spam everyone's mail boxes with huge attachments The easiest way to share those flipboard drawings from a brainstorming session Have always the latest version of the documents with you, even offline Automatically have a copy of all your files in the cloud in case something happens Manage files even from your other clouds and do it safely
40 THE COMPETITION
41 WE TARGET THE SMB SECTOR EASY IS THE KEYWORD the way employees like it Enterprise focus SMB focus the way IT departments want to have it 51 F-Secure Partner Confidential
42 KEY COMPETITIVE ADVANTAGES Overall security not just the product, also company heritage and culture, European location Thanks to our partners, being close to the customers And the key unique product level features Safest cloud in world, e.g. automatic malware scanning built with award winning technology of F-Secure Cloud aggregation is a unique value proposition for users who already use other cloud services We support both backup and sync functionalities, not just one or the other We provide the best content centric user experience optimized for both PC and key mobile platforms 52 F-Secure Partner Confidential
43 THE BUSINESS OPPORTUNITY
44 BUSINESSES ARE MORE LIKELY TO PAY FOR CLOUD SERVICES THAN CONSUMERS 54 F-Secure Partner Confidential
45 HOW TO MONETIZE A CLOUD SERVICE OFFERING Customer Loyalty RETENTION, LIFETIME VALUE Indirect Revenue SERVICES, CROSS-/UPSELL Direct Revenue MARGIN FROM LICENSE SALE 55 F-Secure Partner Confidential
46 F-SECURE UNIQUELY FOCUSING IN SALES AND SERVICE OPPORTUNITY FOR THE PARTNERS Solution Provider Service Partner Service Partner Company Company Company Company Solution Provider Full Systems ownership Distribution & Ordering Billing & Provisioning Sales & marketing support SMB Local Ownership Smooth Experience Automatic Updates Branded Services Customer Ownership Sales & Marketing Billing 1 st Line Support
47 OUR REFERENCES
48 F-SECURE IS THE LEADING EUROPEAN CONTENT CLOUD PROVIDER, SERVING MILLIONS OF USERS
49 Protecting the irreplaceable f-secure.com
50
PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM
PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE
More informationHOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
More informationOUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationIntelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring
More informationTaking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD)
Taking Virtualization to the Next Level: Private Cloud and Bring Your Own Device (BYOD) Presented by: Barb Goldworm Founder, President & Chief Analyst, FOCUS Taking Virtualization to the Next Level Key
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationVirtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
More informationVIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
More informationEnd to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationBitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
More informationAcronis Backup Product Line
New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote
More informationServer-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
More informationCutting Costs with Red Hat Enterprise Virtualization. Chuck Dubuque Product Marketing Manager, Red Hat June 24, 2010
Cutting Costs with Red Hat Enterprise Virtualization Chuck Dubuque Product Marketing Manager, Red Hat June 24, 2010 AGENDA RED HAT ENTERPRISE VIRTUALIZATION OVERVIEW BENEFITS OF VIRTUALIZATION RED HAT
More informationGRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback,
More informationWhen Desktops Go Virtual
When Desktops Go Virtual Virtualization Security. Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper February 2011 I. VIRTUAL DESKTOP INFRASTRUCTURE Server
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationDupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it
Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it 21 st November 2012, Voorthuizen Knut Vatnestrøm, Technical Service Manager Michael Dahl, Director
More informationHow To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
More informationImplementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
More informationVIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
More informationIBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
More informationSecurity and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior
More informationVirtualization Technologies. Embrace the new world of healthcare
Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationSymantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationSimplify VDI and RDS Private Clouds for SMBs
PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,
More informationINTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT
INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM CENTRALIZED HW MANAGEMENT STABILITY DATA
More informationUsing SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationStaying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
More information6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationComprehensive security platform for physical, virtual, and cloud servers
datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations
More informationEnterprise Desktop Solutions: VMware View 4.5
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
More informationCourse 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager
Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Microsoft System Center Virtual
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More informationOutline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models
1 2 Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 3 Introduction What is Virtualization Station? Allows users to create and operate
More informationVirtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
More informationUNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS. Security for Virtual and Cloud Environments
UNCOMPROMISED SECURITY FOR ALL VIRTUAL ENVIRONMENTS Security for Virtual and Cloud Environments PROTECTION OR PERFORMANCE? The number of virtual machines exceeded that of the physical ones back in 2009.
More informationTrend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
More informationMeet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization Barb Goldworm Founder, president & chief analyst, FOCUS, LLC Barbgoldworm@focusonsystems.com The
More informationFrequently Asked Questions: Desktone s Offerings and Market
Frequently Asked Questions: Desktone s Offerings and Market General Virtualization Q: What is desktop virtualization? A: Desktop virtualization is the separation of a client operating system/environment
More informationTenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Installation Guide Applies to the following editions: Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation
More informationSCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationThe Clock is Ticking on Windows Server 2003 Support
A Trend Micro White Paper April 2015 The Clock is Ticking on Windows Server 2003 Support >> How Trend Micro can secure your end of life servers while enabling a safe transition Contents Introduction...3
More informationVMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
More informationJUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE
White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case
More informationKaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
More informationWhite paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
More informationAPS Connect Denver, CO
New Generation Data Protection Powered by the Acronis AnyData Engine APS Connect Denver, CO Jon Farmer February 26, 2015 2015 Acronis Industry Leader in Data Protection Market Leading Solutions & Technology
More informationOnboarding VMs to Cisco OpenStack Private Cloud
White Paper Onboarding VMs to Cisco OpenStack Private Cloud This white paper will explain the process for exporting existing virtual machines from either VMware vsphere or AWS EC2 into Cisco OpenStack
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationORACLE VIRTUAL DESKTOP INFRASTRUCTURE
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationOutline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
More informationProtecting Virtual Endpoints with McAfee Server Security Suite Essentials
Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security
More informationTrusteer Rapport Virtual Implementation Scenarios
Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationServer Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
More informationComprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
More informationTrend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
More informationCourse Outline: Course 6331: Deploying and Managing Microsoft System Center Virtual Machine Manager Learning Method: Instructor-led Classroom Learning
Course Outline: Course 6331: Deploying and Managing Microsoft System Center Virtual Machine Manager Learning Method: Instructor-led Classroom Learning Duration: 3.00 Day(s)/ 24 hrs Overview: This three-day
More informationTrend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
More informationSecurity. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationParagon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon
More informationGRAVITYZONE UNIFIED SECURITY MANAGEMENT
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Quick Start Guide GravityZone Unified Security Management Quick Start Guide Publication date 2013.02.22 Copyright 2013 Bitdefender Legal Notice All rights reserved.
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationJOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing
More informationTECH TIPS. Integer eleif end conse quat molestie morbi ac eros sagittis. ebook
//ebook 2012 Integer eleifend consequat molestie morbi ac eros sagittis diam ferm entum congue sed laoreet tincidunt libero TECH vitae tincidunt, nulla vestib ulum justo at leo pulvinar nec vene natis
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationWhy Migrate from Citrix to Parallels?
Why Migrate from Citrix to Parallels? On 3 March 2015, Citrix reviewed the lifecycle of XenApp and Presentation Server, confirming that the end of extended support for Windows Server 2003 will be on 24
More informationDeploying and Managing Microsoft System Center Virtual Machine Manager
Deploying and Managing Microsoft System Center Virtual Machine Manager Overview About this Course This three-day instructor-led course teaches students how to implement a Microsoft System Center Virtual
More informationSymantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
More information#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
More informationESET Security Solutions for Your Business
ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep
More informationMicrosoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation
More informationExpert Reference Series of White Papers. Microsoft Assessment and Planning (MAP) Toolkit Version 9.x
Expert Reference Series of White Papers Microsoft Assessment and Planning (MAP) Toolkit Version 9.x 1-800-COURSES www.globalknowledge.com Microsoft Assessment and Planning (MAP) Toolkit Version 9.x Mark
More informationYOUR STRATEGIC VIRTUALIZATION ALTERNATIVE. Greg Lissy Director, Red Hat Virtualization Business. James Rankin Senior Solutions Architect
YOUR STRATEGIC VIRTUALIZATION ALTERNATIVE Greg Lissy Director, Red Hat Virtualization Business James Rankin Senior Solutions Architect 1 THE VIRTUALIZATION MARKET HAS CHANGED The release of Red Hat Enterprise
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationVMware End User Computing
VMware End User Computing Overview 2014 VMware Inc. All rights reserved. Architecture for IT Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern,
More informationBusiness Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
More informationSYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationTechTarget Virtualization Media. E-Guide
TechTarget Virtualization Media E-Guide Desktop Virtualization: Expert Guide to VDI, Hypervisors, and More Many businesses fail to understand that the desktop virtualization space extends far beyond just
More informationAgentless Security for VMware Virtual Data Centers and Cloud
Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying
More informationCitrix XenDesktop 5.6 Providing best TCO and TVO at once. Fabian Kienle Regional Sales Manager, Baltics @ Citrix Systems
Citrix XenDesktop 5.6 Providing best TCO and TVO at once Fabian Kienle Regional Sales Manager, Baltics @ Citrix Systems Ususally IT vendors keep telling you about the how.. but did anyone ever told you
More informationSECURITY FOR VIRTUALIZATION: FINDING THE RIGHT BALANCE
SECURITY FOR VIRTUALIZATION: FINDING THE RIGHT BALANCE Combining protection and performance in your virtualized environment kaspersky.com/beready Introduction In the end, they re all servers and someone
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationCYBERSECURITY - STRATEGIES. What any company or enterprise must have in mind regarding cybersecurity.
CYBERSECURITY - STRATEGIES What any company or enterprise must have in mind regarding cybersecurity. Million SOME NUMBERS 45 40 35 30 25 20 15 10 5 0 SECURITY INCIDENTS GROWTH 42.8 28.9 24.9 22.7 9.4 3.4
More informationIn addition to their professional experience, students who attend this training should have technical knowledge in the following areas.
6422A - Implementing and Managing Windows Server 2008 Hyper-V Course Number: 6422A Course Length: 3 Days Course Overview This three-day instructor-led course teaches students how to implement and manage
More information