Threats to virtual environments
|
|
|
- Ashlynn Dickerson
- 10 years ago
- Views:
Transcription
1 SECURITY RESPONSE Threats to virtual environments Candid Wueest Version 1.0 August 12, 2014, 16:00 GMT According to Forrester Research, over 70 percent of organizations are planning to use server virtualization by the end of 2015.
2 CONTENTS OVERVIEW... 3 Introduction... 5 Security challenges with virtual machines... 5 Up-to-date snapshots... 5 Virtual networks... 5 Mixed data sets... 6 Covering dynamic systems... 6 Input/output (I/O) hits... 6 Managed access control... 6 Security threats to virtual systems... 8 Infecting virtual machines the Crisis malware 8 Escaping virtual environments... 9 Challenges in using a VME for security analysis Evading analysis Evading automated systems Best practice Conclusion References... 17
3 OVERVIEW Virtualization in enterprises has been a growing trend for years, offering attractive opportunities for scaling, efficiency, and flexibility. According to Forrester Research 1, over 70 percent of organizations are planning to use server virtualization by the end of Often, companies delay implementing virtualization due to security concerns or adopt virtualization before deploying advanced security measures. However, virtual machines and their hosting servers are not immune to attack. Introducing virtualization technology to a business creates new attack vectors that need to be addressed, such as monitoring the virtual networks between virtual machines. We have seen malware specifically designed to compromise virtual machines and have observed attackers directly targeting hosting servers. Around 18 percent of malware detects virtual machines and stops executing if it arrives on one. Virtual systems are increasingly being used to automatically analyze and detect malware. Symantec has noticed that attackers are creating new methods to avoid this analysis. For example, some Trojans will wait for multiple left mouse clicks to occur before they decrypt themselves and start their payload. This can make it difficult or impossible for an automated system to come to an accurate conclusion about the malware in a short timeframe. Attackers are clearly not ignoring virtual environments in their plans, so these systems need to be protected as well. 1. Strategic Benchmarks 2014: Server Virtualization, Forrester Research, Inc., March 2014.
4 INTRODUCTION Virtual machine hosting servers are not any less secure than any other type of server - they are just as vulnerable to malware or targeted attacks.
5 Introduction Virtualization presents organizations with many opportunities, as well as some new challenges. The concept lets companies abstract, pool, and automate all of their computing resources, such as operating systems and storage, within a data center. Businesses can access virtual environments as a service through a softwaredefined data center (SDDC). By letting companies access their resources from an SDDC, they can scale more efficiently and deploy new services quicker. Virtual environments are often combined with cloud solutions and other services. SDDCs even influence the whole datacenter architecture, so some of these aspects need to be considered as a complete package. Rolling out virtualization in the data center involves a lot of planning. Virtual machine hosting servers are not any less secure than any other type of server they are just as vulnerable to malware or targeted attacks. In addition to this, attackers are introducing new attack vectors to target virtual machines and their hosting servers. Unfortunately, not every company applies well-known security principles to virtual machines, despite the fact that most virtual servers are open to the same risks as physical servers are, along with a few new ones. Virtual machines need to be patched and protected just like traditional physical computers. Enterprises need to ensure that their virtual machines are included in their security strategy. In this paper, we will highlight a few security concerns with virtualized machine environments (VME), focusing on malware targeting VMEs. Most of these concerns apply both to hosted hypervisors as well as bare-metal hypervisors which do not have a host operating system. Security challenges with virtual machines There are a few extra security challenges that come into play when VMEs are used. The most common issues are as follows. Up-to-date snapshots Companies can create snapshots of their virtual machines at a certain point in time, which can be accessed again at a later date. Often, the installed software in these snapshots is not kept up-to-date. This means that when an older image is provisioned, such as during a disaster recovery, the image is outdated. This could allow attackers to exploit old vulnerabilities until the next patch cycle detects and upgrades this virtual machine. Companies should ensure that their virtual machines software is updated regularly, security patches are applied, and that security software is up and running. Missing or outdated licenses of virtual machines software can also be a problem that leads to security holes. Most virtual environment management tools allow a periodical launch of the images in order to patch them. This life-cycle management is important to any security strategy. Newer SDDCs lets security reside outside of the virtual machine, allowing for an additional up-to-date security barrier. Another option to keep the software up-to-date is the use of Virtual Desktop Infrastructure (VDI) and application virtualization. Virtual networks Depending on the setup, multiple virtual machines may be connected over a virtual switch in order to provide a virtual network. This can mean that any traditional network security service, such as an intrusion detection system (IDS) or data loss prevention (DLP) agent, will not detect if one virtual machine attacks another on the same physical server, as the traffic never passes through the physical network. To overcome this layer of complexity, virtual machine vendors allow virtual firewalls and similar devices to be deployed. Companies need to ensure that they have accounted for this in their network diagrams. Page 5
6 Mixed data sets Since multiple virtual machines are hosted on the same physical hardware, compliance issues might arise. If a virtual machine with sensitive information is mixed with non-sensitive virtual machines on the same physical server, auditors might complain, depending on the regulations surrounding that specific data. These circumstances can make it harder to manage data. Dynamic trust zones covering workloads that share common security and compliance policies can be used to cover this. Companies should treat snapshots of these virtual machines as sensitive too and should protect them accordingly. Covering dynamic systems Virtual machines may be moved around quickly from one host server to another and new systems can be provisioned rapidly and may be deleted afterwards. In cases of load balancing, the server may transparently switch from one virtual machine to another. This can lead to an issue if traditional security barriers like firewalls are configured very narrowly. Virtual machines that are moved, either manually or automatically due to a failover feature, may end up at a different cluster with a different physical network address. Since workloads are not tied to specific physical devices, logical security policies are required. This activity needs to be addressed in the security information and event management system (SIEM) in order to have consistent logging and tracking of events. Some virtualization solutions allow for dependencies on different levels to be defined, which ensure that the correct security postures are applied at the destination. New virtual systems that are provisioned temporarily may never show up in inventory snapshots and could be left out of some security audits. Input/output (I/O) hits Simultaneous disk operations, such as updating software or rebooting multiple virtual machines after patching, may generate a huge I/O access spike on the physical server, which can reduce the server s performance capabilities. Because of this, many software tools allow companies to roll out changes in small batch groups or add a randomized time element for when the operations should start. Unfortunately, this can mean that virtual machines can remain unpatched for longer periods of time, opening them up to attack. For example, an attacker could deliberately use up scarce resources to carry out a denial-of-service (DoS) attack against a local server. If enough resources are bound, then this attack may reduce the performance of any other virtual machine on the same host server. Most virtualization software includes options to throttle the Input/Output Operations Per Second (IOPS) per machine. Managed access control Management tools for virtual environments let IT administrators make significant changes to their virtual environments. With the combination of multiple virtual systems on a single hosting server, this could increase the risk of insider threats. Virtual environments need to be protected from mistakes or malicious actions by administrators with high privileges. Setting up role-based access control across a large virtual environment can be a complex challenge. Page 6
7 SECURITY THREATS TO VIRTUAL SYSTEMS One of the most feared scenarios among administrators is if malware from a virtual machine breaks out and infects the host server.
8 Security threats to virtual systems There are two main scenarios which lay out how malware could specifically attack virtual systems. Either the malware exists on the host server and attacks the virtual machine or the threat is on the virtual machine and attacks the host server. All other attack vectors can be reduced to classic scenarios where a computer attacks another computer, which we already know about from the traditional IT world. Infecting virtual machines the Crisis malware It is possible that an attacker who successfully breaches a host server will infiltrate virtual machines on that server or create their own malicious virtual machine and launch it. We have seen malware that has actually automated this behavior. One example of such malware is W32.Crisis. This specific threat targets multiple operating systems, including Windows, Mac OS X, and Microsoft s previous mobile operating system Windows Mobile. The malware is dropped as a Java file through social engineering and performs various information-stealing activities. The malware also tries to spread to virtual machines that are stored on the local server, a host-to-guest infection. It does not exploit any vulnerability in the VMware software itself to achieve this. Rather, it takes advantage of the fact that all virtual systems are simply a series of files on the disk of the host server. These files can usually be directly manipulated or mounted with freely available tools. In the case of W32.Crisis, the malware parses the preferences.ini file in the VMware installation directory and searches for.vmx file paths in it. The threat then searches for VMware Virtual Machine Disk files (VMDK) inside the.vmx settings file. Figure 1. W32.Crisis virtual machine spreading routine Page 8
9 The malware then uses the available mount service tool, vixdiskmountserver.exe, to mount the image file as a drive and start modifying it. The threat modifies the image file by copying itself to the startup folder of the virtual Windows computers in order to execute itself and infect the virtual machine the next time the virtual machine starts. The analyzed version of W32.Crisis did not attempt to infect any other OS inside virtual machines and did not target VMware ESX servers, but an attacker could theoretically do this. For more information about the W32.Crisis malware, we have published a whitepaper detailing this threat. Escaping virtual environments One of the most feared scenarios among administrators is if malware from a virtual machine breaks out and infects the host server. This guest-to-host infection or virtual machine breakout could lead to widespread malware infections across many computers. This would be bad for an environment where one hosting server runs many guest virtual machines, but could also impact security professionals who are using virtual machines to securely analyze malware. It is possible for malware to escape from a virtual machine system to the host server, depending on the presence of local vulnerabilities. It is rare, but there have been some cases where vulnerabilities in virtualization software allowed guest-to-host infection. For example, in 2009, there was the Cloudburst Attack, which allowed attackers to execute code on the host server. This attack used some invalid instructions to generate exceptions that could be hijacked. This trigger could then be cached by the emulator, establishing communications between the virtual machine and the host server. There has been a lot of research on guest-to-host infections carried out over the years, for example by invisiblethings lab and Peter Ferrie. Administrators should keep host servers up-to-date and should patch any known vulnerabilities. Further lockdown and hardening of the host server can limit any potential damage. There are some other circumstances where malware might be able to spread from the virtual machine to the host computer. When shared folders between virtual machines and host servers are enabled, worms can spread from one system to the other. This requires some user interaction and should be treated like any other network sharing permission that could lead to malware spreading. Worms could also spread by exploiting vulnerabilities of exposed operating system services. Here, the host server and virtual machine act like two separate systems on the network. Just keep in mind that, depending on the setup, the network traffic might only occur on the virtual network. Page 9
10 CHALLENGES IN USING A VME FOR SECURITY ANALYSIS There are many freely available code snippets that will help malware detect the most common virtual machines.
11 Challenges in using a VME for security analysis Security researchers and security solutions have been using virtual machines for many years in order to run and analyze suspicious files in a controlled environment. Snapshot technologies deploy quickly and can be configured for many different requirements. For example, researchers can replicate the user s computing environment, with different versions of software and third-party tools, in order to verify if exploits could successfully breach defenses. Such sandbox-like technology can be used to log artifacts that are generated during code execution as well as any system changes that have occurred. Different security systems use different approaches. Some use system emulation while others use virtualization or sandboxes. In the case of virtualization, the code runs on the actual underlying hardware, as opposed to emulation, which can run programs that are written for different CPU architectures as well. Furthermore, simple virtualization systems take snapshots before and after code execution and compare them. More advanced virtualization systems log all system changes made by the code or can even trace the complete code. Depending on the methods used, the results may be more or less granular, providing different benefits or drawbacks. For example, a snapshot delta analysis will not see memory changes, so any memory-only threat might be unnoticed. Also, it is difficult to say if the threat has performed all of its action during the snapshot window. Many attackers use different methods to make it harder for security researchers to analyze these threats on virtual machines. Evading analysis One of the most basic analysis evasion method encountered in the wild is to detect if code is running in a virtual machine. There are many freely available code snippets that will help malware detect the most common virtual machines. If a VM is detected, the malicious code can act accordingly, which in general means stopping code execution and exiting the system. This might lead a lesser skilled observert to believe that the suspicious sample does not perform any malicious activities and classify it as a benign application. The following evasion techniques worked on certain virtual machines at some point in time. The vendors of virtualization technologies are constantly upgrading their software to make them more robust. As a result, not all of these techniques still work. In addition, extra tools and scripts are available to let researchers modify static attributes of virtual machines in order to keep malware from detecting that it is running in a virtual machine. Techniques for checking the presence of a virtual environment: Check the MAC address of the virtual network adaptor to try and reveal the virtual machine vendor. Check the BIOS brand and version to reveal the virtual machine vendor. Check certain registry keys that are unique to virtual machines. Often, the virtual machines leave traces in different registry keys. For example the existence of HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX reveals the presence of VirtualBox. Check if helper tools, such as VMware tools, are installed. Check for the presence of certain process and service names. Check for the presence of specific files, like drivers specific to virtualization. Check for communication ports for guest-to-host communication. Execute special assembler code and compare the results. Some commands are not implemented or can behave differently than on physical computers. Other commands take longer to execute and can show a timing difference. Check the location of system structures, such as the interrupt descriptor table (IDT). Virtual systems typically store the IDT at a higher register than a physical computer does. Check for static OS licenses. Check dmesg or dmidecode log for entries from virtual devices. Page 11
12 These checks are frequently integrated into runtime packer applications, which can be used to encapsulate the malware code. These sometimes legitimate packer tools can offer many options for checking for the presence of virtual systems. In some rare cases, we have encountered malware that does not stop code execution in a virtual machine, but instead sends false data. These red herrings might ping command-and-control (C&C) servers that do not exist or check for random registry entries. These tactics are meant to confuse security researchers or trick the automation process into believing that the malware is a benign application. We conducted an analysis in order to see if malware authors are frequently using techniques to detect virtual machines. We randomly selected 200,000 customer submissions since 2012 and ran them on both a real computer and on a VMware virtual machine. We then compared the results. Some samples had to be filtered out due to unrelated crashes before leaving traces. We also tried to remove any sample that generated fake red herring traces. The result is that for the last two years, the percentage of malware that detects VMware hovered around 18 percent, with a short spike at the beginning of 2014 where it reached 28 percent. On average, one in five malware samples detect virtual machines and stop Figure 2. Packer tool virtual machine detection options Figure 3. The percentage of malware samples that detect VMware virtual machines per month Page 12
13 executing completely if they arrive on one. This means the majority of malware will happily continue to run in virtual machines. For security researchers who are concerned that they might miss 18 percent of the threats with their security analysis, we advise them to use real physical hardware in a controlled network for security analysis. Once the analysis is complete, the computer can be reimaged with a clean image. Of course, this might not always be feasible, but it will provide reliable results. Evading automated systems Virtual systems or sandboxes are also commonly used to automatically execute suspicious samples, in order to produce a verdict about the sample. Malware has one huge advantage when executed on an automated virtual machine analysis system time is on its side. The automated analysis system needs to make a decision in a reasonable timeframe, because the user is waiting for their connection. If the sample does not behave maliciously within the first five to ten minutes the analysis system will most likely deem the file as harmless. This has caused attackers to develop other methods to detect a virtual machine or rather, evade automated analysis on virtual machines, such as focusing more on the user s interaction. The following examples show that the attackers have found ways to evade automated analysis and are still capable of executing sophisticated spear-phishing attacks without getting detected at the gateway. System delays Malware can wait for the virtual machine to restart twice before the software starts acting maliciously. On normal client virtual machines, this will happen in a reasonable timeframe, so it is not too much of a burden for the malware to wait until this occurs. Some analysis systems monitor autostart hooks, like the registry run key or the startup folder. If a sample registers itself so that it will execute if the client virtual machine restarts, the analysis system will notice. In order to speed things up, the automated system can execute the registered payload straight away and continue its analysis. Unfortunately, this opens the virtual machine up to attack, as the malware can use other means to verify whether the virtual machine has really restarted or not. The same applies to sleeping loops and delays. Whereas a simple two-hour sleeping loop might have worked for older analysis systems, newer implementations will simply speed up the analysis system in order to skip over such loops. This is basically the old problem of detecting garbage loops and ignoring them. But attackers have come up with techniques to hide the malicious activity from the automated scanner. Some of the delays are outside the control of the virtual analysis system itself. For example, a downloader threat can deliberately have a slow responding C&C script, that uses a small TCP window size of five bytes. This stalls the download of the configuration file so that it takes ten minutes to complete. This length of time cannot be reduced by the virtual machine and as a result, it might generate a timeout issue on the automated analysis. Essentially, this will lead the automated analysis system to misclassify the threat as a non-malicious file. User interaction Another evasion method that we have seen used in the wild is the monitoring of user interaction. For example, any normal client virtual machine would commonly experience mouse movements and mouse clicks. A malicious sample can, for example, wait for three left mouse clicks to occur before any payload is decrypted and executed. Of course, such a threat would not work on a normal server which has no user logged on, so attackers will only be able to attack an end user system. Any kind of user interaction can work in the attacker s favor. Even a dialog box with a CAPTCHA could be deployed before the payload is executed. Such checks are harder to patch on virtual machines and require some background monitoring to generate the necessary interaction triggers. Page 13
14 Hide from hooks In order to detect any malicious modification of the virtual machine, most analysis systems install their own tools and create some system hooks. Clever malware can try to bypass these hooks by executing its own low-level function calls or unregistering itself from certain calls. For example, it could unregister from the CreateProcess notification in order to create a new process that is not monitored by the analysis system. The malware may also fool snapshot-based tools by executing code straight from memory without writing any files to disk. Environmental checks Since analysis systems are custom built and modified, they may contain additional artefacts which can give the malware a clue as to whether the system is a client virtual machine or an analysis tool. For example, if the analysis tool is using predefined file names for the suspicious files that get analyzed, then the malware can simply look at the file names and determine whether it is running in a VM or not. Page 14
15 BEST PRACTICE
16 Best practice Virtual environments need security solutions that go beyond traditional protections in order to cover the different requirements of its dynamic and application-centric approach. This holds true for standalone virtualized servers as well as for modern SDDCs. Of course, different setups and architectures might require different implementation approaches. In any case, virtual machines need to be integrated into the security strategy of the IT. Here are some best practice guidelines that should be considered when securing virtual environments. Hardening: The host server needs to be well protected as it provides access to multiple virtual machines. Besides updating and patching, the server can be protected against attacks with the help of lockdown solutions and host IDS. Administrators can adjust policies and whitelisting to only allow trusted system applications to run. Advanced malware protection: The host server, as well as any virtual machine running on it, needs to be protected against malware. To achieve this, advanced malware protection with proactive components that go beyond classical static antivirus scanner, needs to be in place. Depending on the setup, threat protection can be deployed on each virtual machine separately or agentless from the hosting server in order to maintain a high level of performance. Access control: Administrators need to apply proper access control management to virtual machine hosting servers in order to ensure that only eligible users can perform changes. These are crucial servers that should use strong login processes, like two-factor authentication. These processes should include a proper logging of successful and failed logins for accountability. Disaster recovery: Virtual machines need to be integrated into the disaster recovery and business continuity plan. Administrators should apply high availability and backup strategies for the data. Virtual network protection: Administrators should ensure that network security tools like IPS/IDS have access to traffic in the virtual network between multiple virtual machines on the same host server. Most vendors provide access to hooks that can be used. Updating: Snapshots and images of virtual machines need to be included in the patch and upgrade cycle, so that they are up-to-date when deployed. Logging: Virtual machines need to be integrated into the security logging and SIEM visualization systems just like any other IT device. Since virtual machines can dynamically be provisioned and moved around the network, these activities need to be consistently logged as well. Some security solutions combine multiple protection features, such as Symantec s Data Center Security (DCS) for virtual environments, which provides hypervisor-based security controls. This includes agentless or light agent protection for guest virtual machines, hardening of the host server and protection against exploits. Page 16
17 Conclusion Most companies have already implemented virtualization or have it on their roadmap for the future. The use of virtualized systems in a corporate environment can provide a lot of benefits, but these systems need some special attention paid to security. This is why virtualization needs to be included in the security strategy and strong security measures need to be adapted for these resources. Along with applying traditional security practices, administrators need to pay particular attention to virtual connections between guest virtual machines themselves. These connections might be invisible to traditional network security devices as they are not aware of them. Virtual machine host servers should particularly be hardened and protected. If an attacker manages to gain control of these servers, they will have access to all the hosted virtual machines. This also applies to insider threats who might leverage their privileged access rights. In the past, we have observed attackers targeting virtual machine host servers as well as malware specifically designed to compromise virtual machines. Attackers are able to infect guest virtual machines starting from the host server. There are also vulnerabilities that can allow malware to escape from the virtual machine and compromise the host server. Newer malware frequently use detection techniques to determine if the threat is run in a virtualized environment. We have discovered that around 18 percent of all the malware samples detect VMware and will stop executing on it. The converse argument shows that four out of five malware samples will run on virtual machines, meaning that these systems need regular protection from malware as well. With the move of virtual systems to the field of automated analysis and the detection of unknown malware, we noticed that attackers have created new checks to evade such analysis. For example, some Trojans will wait for multiple mouse left clicks before they decrypt themselves and run the payload. This can make it difficult or even impossible for an automated analysis system to come to an accurate conclusion in a short timeframe, leaving a window open for attackers. The groups behind targeted attacks are well aware of this and create sophisticated threats that will evade automated detection systems. References Strategic Benchmarks 2014: Server Virtualization, Forrester Research, Inc., March malware.pdf Page 17
18 Author Candid Wueest About Symantec Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company s more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. July 16th 2014, v. 2.01
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
Backup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
Backup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
Asset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
Symantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
The Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
Backup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Backup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
Simplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Achieving Business Agility Through An Agile Data Center
Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
ArCycle vmbackup. for VMware/Hyper-V. User Guide
ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Veritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
Insight. Security Response. Deployment Best Practices
Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Symantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Cyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
Endpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
Veritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
Direct virtual machine creation from backup with BMR
NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Instant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
PROSPHERE: DEPLOYMENT IN A VITUALIZED ENVIRONMENT
White Paper PROSPHERE: DEPLOYMENT IN A VITUALIZED ENVIRONMENT Abstract This white paper examines the deployment considerations for ProSphere, the next generation of Storage Resource Management (SRM) from
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper
Enterprise Deployment: Laserfiche 8 in a Virtual Environment White Paper August 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
White Paper. PCI Guidance: Microsoft Windows Logging
PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation
1518 Best Practices in Virtualization & Cloud Security with Symantec
1518 Best Practices in Virtualization & Cloud Security with Symantec Tues May 6, 11:00 Kevin Stultz Symantec Product Management Chip Epps Symantec Product Marketing 1 Agenda 1 2 Trends in Virtualization
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
