1 Network Segmentation in Virtualized Environments B E S T P R A C T I C E S
2 ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed with Separate Physical Trust Zones... 4 Partially Collapsed with Virtual Separation of Trust Zones... 5 Fully Collapsed Trust Zones... 6 Best Practices for Achieving a Secure Virtualized Trust Zone Deployment... 7 Harden and Isolate the Service Console and Network... 7 Enforce Consistency of Network Configuration Across All Hosts... 7 Set Layer 2 Security Options on Virtual Switches... 8 Enforce Separation of Duties... 8 Use ESX Resource Capabilities... 8 Regularly Audit the Virtualized Configuration... 8 Conclusion... 8 References
3 ware BEST PRAC TICES Network Segmentation in Virtualized Environments Introduction As virtualization becomes the standard infrastructure for server deployments, a growing number of organizations want to consolidate servers that belong to different trust zones. A trust zone is loosely defined as a segment within which data flows relatively freely, whereas data flowing in and out of the trust zone is subject to stronger restrictions. Examples of trust zones include: Demilitarized zones (DMZs) Payment card industry (PCI) cardholder data environment Site-specific zones, such as segmentation according to department or function Application-defined zones, such as the three tiers of a Web application The introduction of virtual technology does not have to significantly change the topology. As with other parts of the, virtual technology merely enables server consolidation by replacing physical servers with virtual servers that function exactly the same way and need to be configured in much the same way as their physical equivalents. You can consolidate servers using virtual technology without mixing trust zones and continue to rely on your existing security infrastructure. However, replicating a purely physical topology with virtual machines can greatly limit the benefits that virtualization can provide. If you do not run virtual machines of different trust zones together on one host, the degree of consolidation you achieve can remain low. In addition, you might not realize operational benefits from more advanced virtualization capabilities, such as live migration and high availability. ware customer experience and independent analyst research demonstrate that a virtualized trust zone configuration option can be secured. However, some security professionals are concerned that trust zone virtualization might decrease security. This is understandable, because virtualization involves new terminology and technology. Fortunately, as a security professional, you already have the critical knowledge necessary to ensure the proper configuration of virtual s with a segmented infrastructure. Enforcement policies on a virtual are the same as those on a physical. The difference is that the way in which these policies are enforced can be different in a virtual environment. Gartner research supports this view by suggesting that security risks primarily emanate from administrative misconfiguration and not from the virtual infrastructure. (See the Resources section for information on this Gartner report.) This paper provides information that will enable you to configure virtualized trust zones correctly and deploy them seamlessly. It provides detailed descriptions of three different virtualized trust zone configurations and identifies best practice approaches that enable secure deployment. It is very important to understand that the biggest risk to the virtual environment is misconfiguration, not the technology. Thus you need strong audit controls to ensure that you avoid misconfiguration, either accidental or malicious. Production IDS/IPS Web zone Figure 1 Example of trust zones in a physical environment Application zone Database zone 3
4 ware BEST PRAC TICES Three Typical Virtualized Trust Zone Configurations A virtualized can fully support and enforce a wide range of configurations to separate trust zones. The three options described in this section are typical. Partially Collapsed with Separate Physical Trust Zones Organizations that want to keep trust zones physically separated tend to choose this method, shown in figure 2. In this configuration, each zone uses separate ware ESX hosts or clusters. Zone isolation is achieved with air-gap separation of servers and physical security devices. The physical does not require any change. The only difference between this configuration and a purely physical datacenter is that the servers within the trust zone are virtualized. This configuration limits the benefits you can achieve from virtualization because it does not maximize consolidation ratios, but this approach is a good way to introduce virtual technology into a. Because it has minimal impact on an existing physical, this configuration avoids certain risks. For instance, it minimizes the impact of the potential loss of separation of duties. This, in turn, greatly reduces the chance that an unqualified individual might be in a position to introduce a vulnerability through misconfiguration. In this configuration, you do not need to configure dedicated virtual switches or use 802.1q Vs within the virtual infrastructure. You perform all ing isolation on the physical, not within the virtual infrastructure. Advantages Simpler, less complex configuration Less change to physical environment, and thus less change to separation of duties and less change in staff knowledge requirements Less chance for misconfiguration because of lower complexity Disadvantages Lower consolidation and utilization of resources Higher costs because of need for more ESX hosts and additional cooling and power Incomplete utilization of the operational efficiencies virtualization can provide ware vcenter server Production IDS/IPS kernel kernel kernel ware ESX ware ESX ware ESX Web zone Figure 2 Partially collapsed with separate physical trust zones Application zone Database zone 4
5 ware BEST PRAC TICES Partially Collapsed with Virtual Separation of Trust Zones In this configuration, shown in Figure 3, you use virtual technology to enforce trust zone separation. As a result, you can locate virtual servers with different trust levels on the same ESX host. Although physical security devices are part of the configuration, this approach consolidates all virtual machines on the same hosts, thus requiring substantially fewer physical servers. By achieving full server consolidation, you generate significant cost savings for your IT organization. Enforcement of the security zones at the level takes place in both virtual and physical realms. You use virtual switches to enforce which virtual servers are connected to which zone, but you use physical hardware to enforce the security between the zones. For this reason, virtual servers must use the physical and pass through physical security devices to communicate between trust zones. The impact of the potential loss of separation of duties and the associated risk that an unqualified individual might be in a position to introduce vulnerabilities through misconfiguration is greater in this case than when you have separate physical trust zones, but the potential impact is minimized by the fact that security is still physically enforced. In this configuration, you should create and enforce access controls that allow only privileged administrators to assign virtual machines to highly sensitive trust zones, and restrict less privileged administrators to less sensitive zones. Because the trust zones in this configuration are enforced in the virtualization layer, you should audit virtual switches regularly for consistent policy and settings to mitigate the potential for a virtual machine to be placed on the wrong. Although Figure 3 shows separate virtual switches for each zone, you can accomplish the same goal by using 802.1q Vs. The most important factor in determining which configuration option to choose is typically the number of physical s present in the hardware. You should always dedicate at least one physical to the virtualization management. If possible, use two physical s for the virtualization management to provide redundancy. Advantages Full utilization of resources Full utilization of the advantages of virtualization Lower cost Disadvantages More complexity Greater chance of misconfiguration requires explicit configuration of separation of duties to help mitigate risk of misconfiguration; also requires regular audits of configurations ware vcenter server Production Web servers Application servers Database servers IDS/IPS kernel Web zone Application zone Database zone ware ESX Web zone Application zone Database zone Figure 3 Partially collapsed with virtual separation of trust zones 5
6 ware BEST PRAC TICES Fully Collapsed Trust Zones Taking full advantage of ware technology, this approach, shown in Figure 5, virtualizes the entire datacenter including all and security devices. For DMZs, this is sometimes described as a DMZ in a box. This configuration enables you to maximize server consolidation and realize significant cost reductions. This configuration fully leverages consolidation benefits. All servers and security devices are virtualized in this configuration, enabling you to isolate the virtual servers and the s while managing communications between the zones with virtual security appliances. This completely virtual infrastructure can fully enforce the isolation and security between zones. You can collocate virtual machines of different security levels on the same physical server or servers and bring security devices into the virtual infrastructure. You can choose from an increasing number of virtual security devices to manage and secure the communication between virtual trust zones. For example, you can use ware vshield Zones to bridge trust zones and allow only selective communication between them, while monitoring both allowed and disallowed traffic. If trust zones reside on different segments, Layer 3 routing between trust zones still takes place in the physical part of the, unless you use a virtual routing device. However, you do not need to use a virtual router to enjoy the consolidation and operational benefits of a fully collapsed trust zone. This is the most complex configuration of the three. Therefore, risks associated with misconfiguration are higher and you need to take care when planning this configuration. Enforcing separation of duties through the use of roles and permissions is very important. Also, when you plan and deploy your virtual s, you must make sure that the isolation of those s is enforced and that any communications between virtual machines on separate s are properly routed through the virtual firewalls as well as any other in-line security devices you are using. It is especially important in this configuration to audit the configurations of virtual firewalls and virtual switches for consistent policy and settings, because all of the zone enforcement is performed in the virtual environment. If the policy is different on any of the virtual firewalls or virtual switches, you can encounter such issues as dropped connections for example, when a virtual machine is moved to a new host using otion You can use 802.1q Vs in this configuration, but Vs are not required as they are in the configuration using partially collapsed trust zones with virtual separation. With a fully collapsed trust zone, you need a minimum of three s per ESX host one to connect to the, a second to connect to Firewall IDS/IPS virtual appliance(s) Web servers Application servers Database servers Kernel Intranet Web Application Database ware ESX Production Figure 4 Fully collapsed trust zones ware vcenter server 6
7 ware BEST PRAC TICES the internal, and a third for the management. ware strongly encourages ing for redundancy, so you should consider using enough physical s to allow for redundancy of all s. Advantages Full utilization of resources, replacing physical security devices with virtual Lowest-cost option of entire from a single management workstation Disadvantages Greatest complexity, which in turn creates highest chance of misconfiguration Requirement for explicit configuration of separation of duties to help mitigate risk of misconfiguration; also requires regular audits of configurations Loss of certain functionality, such as otion, if current virtual security appliances are not properly configured and audited Best Practices for Achieving a Secure Virtualized Mixed Trust Zone Deployment Most security issues do not arise from the virtualization infrastructure itself but from administrative and operational challenges. The primary risks are caused by a loss of separation of duties. When this occurs, individuals who lack the necessary experience and capabilities are given an opportunity to introduce vulnerabilities through misconfiguration. For instance, they can accidentally place the virtual of a virtual machine in the wrong trust zone. This risk which also can also occur in purely physical environments can breach the isolation between s and virtual machines of different trust levels. Although best practice security policies and procedures for introducing virtualization into mixed trust zone environments are not overly complex, you should be aware of the critical challenges and best practice methods in order to mitigate risk. At every stage, you must remember that virtual machines need the same type of protections as their physical counterparts including antivirus software, host intrusion protection, configuration management, and patching in a timely manner. In short, virtual machines need to be secured in the same manner as physical machines. After you decide to either partially or completely collapse trust zones, your first step should be to map out which virtual servers will reside on which physical servers and to establish the level of trust that is required for each system. Afterwards, you should follow the guidelines in this section. Virtualized Trust Zone Security Checklist Harden and isolate the service console and management Enforce consistency of configuration across all hosts Set Layer 2 security options on virtual switches Enforce separation of duties Use ESX resource management capabilities Regularly audit virtualized configuration Harden and Isolate the Service Console and Network This step is especially important because access to the service console of an ESX host gives a user with root privileges full control over the virtual machines on that host. Although access to the service console is secured through authentication, you can provide additional security against unauthorized access by creating additional layers of security. In addition, you should isolate the service console. To do so, make sure that the to which the service console is isolated is firewalled and accessible only to authorized administrators. You can use a VPN or other access control methods to restrict access to the management. Although ware ESXi does not have a service console, you should nonetheless isolate the management, which provides access to the ESXi APIs, and you should harden the server. For details on how to harden both ESX and ESXi, read ware Infrastructure 3 Security Hardening (see Resources for a link). Enforce Consistency of Network Configuration Across All Hosts Ensuring that the virtual is configured in a consistent manner across all hosts is particularly critical because accidentally connecting virtual servers to the wrong s can undermine all other security efforts. By clearly labeling the s, you make it less likely that a virtual machine can be connected to an unauthorized accidentally. 7
8 ware BEST PRAC TICES You can use automated tools, such as ware Host Profiles or other third-party tools, to enforce and monitor configuration consistency. Another approach is to use distributed switch technology, such as the ware vnetwork Distributed Switch, or a third-party switch such as the Nexus 1000V. This enables you to manage and configure virtual ing on a cluster of ESX or ESXi hosts in a single place, thus avoiding the possibility of configuration inconsistency altogether. Set Layer 2 Security Options on Virtual Switches Protect against attacks such as data snooping, sniffing, and MAC spoofing by disabling the promiscuous mode, MAC address changes, and forged transmissions capabilities on the virtual s. These capabilities are very rarely needed and create opportunities for exploitation. Fortunately, in the ware virtual layer you have full control over these options, something that is not the case in purely physical environments. Enforce Separation of Duties Mitigate configuration mistakes by using vcenter to define roles and responsibilities for each administrator of the vsphere infrastructure. By distributing rights based on skills and responsibilities, you can significantly reduce the chance of misconfiguration. As an added benefit, this method also limits the amount of authority any one administrator has over the system as a whole. In particular, you should restrict privileges for performing the following actions: Reconfiguring virtual s Assigning virtual machines to sensitive s Changing firewall or other security policies Best practice also dictates that you use administrator or root access only in emergency situations. This practice mitigates the potential for accidental or malicious misconfiguration by an administrator. It also helps further limit the number of people who know the password for this type of account, which provides full control. Regularly Audit the Virtualized Configuration Regular audit of configurations is essential in both physical and virtual environments. When virtualizing any part of your infrastructure, it is important to audit the configurations of all of the components including vcenter, es, virtual and physical firewalls, and any other security devices regularly. You must conduct these audits to make sure that changes to configurations can be controlled and that the changes do not cause a security hole in the configuration. The use of configuration management and compliance tools can greatly assist with the audit process. Audits are especially important for the second and third options discussed in this paper because the risk of misconfiguration is much higher in those topologies. Conclusion You can take advantage of the benefits of virtualization in setting up mixed trust zones, and you can do so securely, maintaining compliance with your organization s policies. There are a number of configurations you can use to achieve this goal. As part of continuing efforts to keep customers informed of best practice approaches to security, ware has generated a number of technology briefs that enable you to further harden ESX hosts and vcenter and to ensure the overall security of your vsphere Infrastructure. For a list of technical documents that fully detail insights gained from deploying virtual technology at over 20,000 IT organizations worldwide, go to the ware Security Center on the Web (see References for a link). Resources Server Virtualization Can Break DMZ Security, by Neil MacDonald and Greg Young, Gartner Research ware Infrastructure 3 Security Hardening ware Security Center Use ESX Resource Capabilities Denial of service within a virtual environment can occur if an individual virtual machine is allowed to use a disproportionate share of ESX host resources. In so doing, it starves other virtual machines running on the same ESX host. Such denial of service can occur as the result of malicious intent or accidentally, but you can guard against this possibility by setting resource reservations and limits for virtual machines using vcenter. You should use the same resource controls to ensure that sufficient resources are available to virtual security devices. 8
9 Revision: Item: BP-059-INF ware, Inc Hillview Ave. Palo Alto CA USA Tel Fax ware, Inc. All rights reserved. Protected by one or more of U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,961,941, 6,961,806, 6,944,699, 7,069,413; 7,082,598, 7,089,377, 7,111,086, 7,111,145, 7,117,481, 7,149, 843, 7,155,558, 7,222,221, 7,260,815, 7,260,820, 7,269,683, 7,275,136, 7,277,998, 7,277,999, 7,278,030, 7,281,102, and 7,356,679; patents pending. ware, the ware boxes logo and design, Virtual SMP and otion are registered trademarks or trademarks of ware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
End Your Data Center Logging Chaos with VMware vcenter Log Insight By David Davis, vexpert WHITE PAPER Table of Contents Deploying vcenter Log Insight... 4 vcenter Log Insight Usage Model.... 5 How vcenter
Virtual Networking Features of the vnetwork Distributed Switch and Cisco Nexus 1000V Series Switches What You Will Learn With the introduction of ESX, many virtualization administrators are managing virtual
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
WHITE PAPER VMware vsphere 4 Pricing, Packaging and Licensing Overview Introduction to VMware vsphere 4... 3 Pricing, Packaging and Licensing Overview... 3 What s New in VMware vsphere.... 4 VMware vsphere
Expert Reference Series of White Papers What s New in ware vsphere 4: Virtual Networking 1-800-COURSES www.globalknowledge.com What s New in ware vsphere 4: Virtual Networking Introduction ware vsphere
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
Pricing, Packaging and Licensing Overview W H I T E P A P E R Table of Contents Introduction to VMware vsphere 4..................................... 3 Pricing, Packaging and Licensing Overview..............................
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. email@example.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
The growing importance of a secure Cloud environment Jan Tiri firstname.lastname@example.org System Engineer, VMware BeLux 2009 VMware Inc. All rights reserved Cloud components Enterprises Cloud Service Providers Private
Misconceptions surrounding security in a virtualized environment Clavister White Paper ization is a boom technology, and it is imperative that this environment is secure as any other part of the network.
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations Reduced Cost of Infrastructure Management, Higher Application Availability, Visibility Across
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service
W H I T E P A P E R Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar Contents Introduction...1 VMware Infrastructure Overview...1 VMware Consolidated Backup...2 EMC Avamar Overview...3
A comprehensive framework for securing virtualized data centers Business white paper Contents Experiencing the virtualization wave...3 Addressing virtualization security challenges...3 Understanding security
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
Top 10 Reasons to Virtualize VMware Zimbra Collaboration Server with VMware vsphere white PAPER Email outages disrupt a company s ability to conduct business. Issues as diverse as scheduled downtime, human
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
VMware vsphere 4.1 Pricing, Packaging and Licensing Overview E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R Table of Contents Executive Summary...................................................
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case
W H I T E P A P E R Contents Introduction...1 What is VMware Consolidated Backup?...1 Detailed Architecture...3 VMware Consolidated Backup Operation...6 Configuring VMware Consolidated Backup...6 Backing
Update 1 ESXi 5.1 vcenter Server 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
W H I T E P A P E R Securing the Cloud A Review of Cloud Computing, Security Implications and Best Practices VMware, Inc. 314 Porter Drive Palo Alto CA 94304 USA Tel 60-47-000 Fax 60-47-001 www.vmware.com
RSA Security Brief Security Compliance in a Virtual World Best Practices to Build a Solid Foundation Authors Bret Hartman, Chief Technology Officer, RSA, the Security Division of EMC Dr. Stephen Herrod,
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
SOLUTION BRIEF VMware Solutions for Small and Midsize Business Protect Your Business, Simplify and Save on IT, and Empower Your Employees AT A GLANCE VMware is a leader in virtualization and cloud infrastructure
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View Mobile Secure Desktop solution is a powerful architecture intended
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
ESXi 5.1 vcenter Server 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges
Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER Challenges of Using Traditional High-Availability Solutions Business-critical applications and the systems they
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
Securing Hybrid Clouds with VMware vshield Edge VPNs A Guide for Providers of vcloud Powered Services Technical WHITE PAPER Securing Hybrid Clouds with VMware vshield Edge VPNs Table of Contents Introduction....
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
CASE STUD QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud The technology and expertise provided by HyTrust dramatically simplified the process of preparing for our FedRAMP certification. HyTrust
The Impact of Virtualization on Network Security Discover. Determine. Defend. EXECUTIVE SUMMARY Virtualization is a concept that has become highly visible in the last few years because of its perceived
Service Definition for a Public Cloud Version 1.6 Technical WHITE PAPER 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
VMware vsphere with Operations Management and VMware vsphere Licensing, Pricing and Packaging WHITE PAPER Table of Contents Executive Summary.... 3 VMware vsphere with Operations Management Overview....
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
VMware Auto Deploy Gui 5.0 Practical guide Introduction The scope of this document is to demonstrate how to configure and use the Auto Deploy GUI to manage stateless ESXi environments. 2012 VMware, Inc.
Maximum Scalability, Security, and Availability for VMware View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View solution is a powerful architecture intended to serve the needs of non-mobile
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
vshield Manager 5.0 vshield App 5.0 vshield Edge 5.0 vshield Endpoint 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Understanding Oracle Certification, Support and Licensing for VMware Environments March 2015 W H I T E P A P E R VMware* Table of Contents 1. Oracle Certification and Support for VMware Environments....
Your consent to our cookies if you continue to use this website.