Tech Throwdown: Invincea FreeSpace vs. Micro-Virtualization

Size: px
Start display at page:

Download "Tech Throwdown: Invincea FreeSpace vs. Micro-Virtualization"

Transcription

1 Tech Throwdown: Invincea FreeSpace vs. Micro-Virtualization May 2014

2 Table of Contents Summary... 3 A Hot Market Advanced Threat Protection for the Endpoint... 3 Hype Meets Real World Let s do a Throwdown... 4 Architectural Comparison... 5 Invincea FreeSpace Virtual Container Architecture... 5 Micro-Virtualization Virtual Container Architecture... 6 Hardware Dependencies... 7 Virtual Desktop Infrastructure (VDI) Limitations... 7 Microsoft Volume Licensing Required can double desktop license costs... 8 No Malware Detection Capability... 8 Host OS Kernel and System Drivers not fully isolated... 8 Vendor Claims Marketing Hype and the Realities of Deployable Defenses... 9 Throwdown Comparison... 9 Throwdown Comparison Checklist Conclusion and more information Invincea, Inc University Drive, Suite 460 Fairfax, VA USA Tel: info@invincea.com , Invincea, Inc. All rights reserved. Invincea, the Invincea Logo, Invincea FreeSpace, Invincea Management Service are trademarks of Invincea, Inc. All other product or company names may be trademarks of their respective owners. All specifications are subject to change without notice. Invincea assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. INV_WP_microvirtualization_ Page 2 of 12

3 Summary It seems every week there is a new flash-bang technology or vendor that purports to be the latest silver bullet solution to advanced threats. The result from all these market claims is buyer confusion and a healthy dose of skepticism for vendors silver bullet claims. This paper is the first in a series of Tech Throwdowns where we compare another vendor s micro-virtualization approach against Invincea FreeSpace. In it, we describe the technical differences between the two different types of virtual container architectures, then present the side-by-side Throwdown against best for business criteria. We conclude with a Throwdown form for you to take the Throwdown challenge for yourself. A Hot Market Advanced Threat Protection for the Endpoint Each day, users are successfully targeted by a variety of adversaries with the goal of getting a beachhead on corporate networks to subsequently compromise the network for data breach, including customer data, intellectual property, mergers and acquisition deals, and future plans. Traditional security solutions have used signatures of threats to try and find these adversaries on the network. However, the nature of a targeted attack means techniques that rely on signatures will not detect these attacks. As a result, enterprises are looking for non-signature-based techniques to counter advanced threats and targeted attacks. Page 3 of 12

4 As attacks have become more targeted and persistent, and malware more sophisticated and specialized, a market for solutions to defend against these threats has emerged. John Grady IDC Research, Security Products, August 2013 It seems every week there is a new flash-bang technology or vendor that purports to be the latest silver bullet solution to advanced threats. The result from all these market claims is buyer confusion and a healthy dose of skepticism for vendors silver bullet claims like The World s Most Secure Endpoint Solution (see exhibit below from tradeshow). Is it really? Let s explore the claim. Hype Meets Real World Let s do a Throwdown To help cut through all the marketing hype of various vendors, we are putting on a Tech Throwdown (Bobby Flay style) series with key criteria to compare alternative solutions when looking at advanced threat protection solutions. For a more comprehensive comparison of alternative architectures and technologies, please see Buyer s Guide for Advanced Threat Protection Solutions 1. The Throwdown is intended for the reader to perform his or her own comparison of alternative technologies, architectures, and products to determine what is best for his or her business. To aid in evaluation, we provide background on the different approach architectures, then provide a Throwdown comparison for the reader to take and decide what approach is best for business given the various deciding criteria when it comes to protecting your enterprise from advanced threats: deployability, scalability, performance, usability, security, and cost. Instead of focusing on just one of these criterion, we address them all because we know that s how evaluators and buyers conclude what s best for their business and ultimately what it takes to protect your business from the threats you face while going online. 1 Page 4 of 12

5 In this Throwdown, we compare Invincea FreeSpace to a micro-virtualization product. We use micro-virtualization in quotes only because it is a term invented by a vendor, not an actual recognized architecture. Architectural Comparison Both Invincea FreeSpace and the micro-virtualization approach use a virtual container architecture (as defined by Gartner Research) to address threats, both conventional and targeted. In the following we describe the virtual container architectures. Invincea FreeSpace Virtual Container Architecture The virtual container based architecture breaks from the traditional detection-based approaches that have long dominated endpoint security. Figure 1 shows the virtual container architecture employed by Invincea FreeSpace. The fundamental difference between a virtual container architecture and a traditional detection-only architecture is the virtual container implements a protect first design. Figure 1: Invincea FreeSpace Virtual Container Architecture The container-based architecture is flexible enough to determine which applications get containerized, though some configuration of the container is often necessary to ensure correct interoperability with the system. The applications shown in Figure 1 reflect the attack surface from threats your users face: and Web. In particular, Invincea supports browsers, document editors, Adobe reader, Java, and other plug-ins these applications support. When evaluating a virtualization container architecture, be sure to understand which browsers and applications are supported out of the box. Coverage of Internet Explorer (older and current versions you run), Firefox, and Chrome are important to ensure that users are protected with the browser they use. The virtual container architecture is just that virtual. Users do not interact with containers they interact with applications as expected, but are protected from Page 5 of 12

6 compromising their system and network in case the content inside the container is malicious. A virtual container is like a transparent detonation chamber with one exception: rather than testing content for maliciousness and making a decision, the application with its content always runs inside the container so your users are always protected. If any malware detonates inside the container (a malicious document, executable, or web page), it is isolated from infecting the host and network. Detection and capture of forensics is a key differentiating feature of different virtual container solutions. Some containers only contain malicious threats. Invincea FreeSpace will also detect when a detonation event has occurred inside the container, indicating malware is running. Once observed, Invincea FreeSpace collects artifacts from the malware while killing the malicious processes that spawn, preventing further exploitation of the network. The key attributes of Invincea s virtual container architecture are: Scalable with number of applications, windows, and tabs that run inside the container Low performance overhead in memory, on disk, and CPU that is constant No additional latency Hardware (CPU vendor and generation) independent and agnostic Interoperable with other endpoint software Seamless UX Detection of 0day exploits, unknown malware, targeted attacks Reporting of forensics to cloud-managed server Proven to scale to hundreds of thousands of machines Easy deployability and maintenance Out of the box support for standard browsers and document editors/viewers No special licensing required for Microsoft OS and products Extensible to other software applications as desired by users Cost efficient Micro-Virtualization Virtual Container Architecture Recently, the term micro-virtualization has been introduced to describe a form of Type II virtualization that virtualizes single processes running within an operating system. While few technical details 2 about micro-virtualization have been published, what little has been released indicates that, the Xen hypervisor has been forked to create a microvisor to virtualize tasks rather than virtualizing the full operating system, where a task is defined to be an untrusted process and the OS libraries it calls. 2 Microvirtualization for the Security Architect_0.pdf Page 6 of 12

7 Figure 2 shows a micro-virtualization architecture on a Windows7 system. As shown, the u-visor is hosted on the Windows7-64 bit operating system. Xen is classically a Type I hypervisor that runs bare metal and virtualizes the entire operating system, rather than single processes or tasks. Thus, this fork of Xen represents a form of Type 2 virtualization. Figure 2: A micro-virtualization architecture The microvisor has some important design distinctions from other virtual container approaches that drive some system trade-offs we describe here. One key difference is that the microvisor is hardware limited to the Intel VT-x processor instruction set extensions in order to virtualize the supervised process. Hardware Dependencies Using the VT-x ensures that the micro-vm can VM Exit (the equivalent of a hardware interrupt on conditions such as a page fault) on a pre-defined set of VM fault conditions. The ability to VM Exit on a pre-defined set of VM fault conditions has been marketed by the vendor as hardware-enforced isolation caveat emptor. The hardware dependency to the Intel chipset means it will only run on certain CPUs Intel i3, i5, i7 CPUs and requires additional BIOS level configuration of each machine to enable VT extensions at boot time. Virtual Desktop Infrastructure (VDI) Limitations One trade-off with employing VT-x instructions with a virtual container is you cannot run other hypervisors at the same time at least not for current generation deployed desktop CPU architectures that do not support nested virtualization. For instance, you cannot run this microvisor on a virtualized desktop (VDI) because the virtual desktop runs on a Type I hypervisor, nor can you run another Type II VM such as a virtual machine (VMware, VirtualBox, or Parallels) on a machine running the microvisor. Another trade-off is if other security solutions using VT-x, such as McAfee DeepSafe/DeepDefender, cannot run concurrently with the microvisor because of the VT-x conflict. Page 7 of 12

8 Microsoft Volume Licensing Required can double desktop license costs The microvisor provides each virtualized process a reference gold image copy of the host operating system. The micro-visor then employs copy-on-write semantics to any changes to the gold image to gain performance efficiencies for each u-vm. This means each virtualized process references a gold copy of the host OS in memory for the set of system libraries (imported DLLs) and operating system services it needs. The requirement to run a gold copy of the host OS image creates a huge memory, system management, and configuration requirement for this architecture. It will typically take over 1 GB of memory to run the gold copy image, which in turn is a major contributing factor for machine specs to be 8GB of memory. In addition, the approach creates major licensing challenges in working with Microsoft software, including requiring special enterprise licensing of MS Office. Patch management, traditionally difficult for many organizations, must now be coordinated with the gold image to stay in synch with the host OS image. No Malware Detection Capability While malicious changes to the gold image of the system will not persist after the target process is terminated, the exploit code can run for the lifetime of the micro-vm. Without detection capability, this approach means the user and her data is put at risk for the lifetime of the uvm if and when the user encounters malware. Host OS Kernel and System Drivers not fully isolated While certain OS libraries and services are virtualized from the gold image, many devices such as the printer, file system, and network that the virtualized process (e.g., browser, MS Office) needs access to, are not virtualized themselves. Instead, these devices are managed by the host OS itself, as long as the microvisor provides access to the device. These exceptions are coded as policies to allow virtualized programs to connect directly to the host OS devices including to printer services, host and network file systems, and other core kernel drivers. Since network, printer, file system, and other I/O devices are managed by the host OS, the device drivers in the host OS kernel can be exploited to compromise the host OS exactly what microvisor was purported to prevent, but now must allow by exception. In summary, the core attributes of the micro-virtualization architecture are: Hardware limited to certain CPUs with BIOS modification required Memory intensive requiring machines with 8GB of physical memory Overhead created with each new task browser tab, window, or application for each additional micro-vm making it unscalable as number of tabs and windows opened grows Special licensing required for Microsoft OS and Microsoft Office to support type 2 virtualization Interoperability with other software and devices requires creation of policies per application that creates policy infrastructure overhead while simultaneously creating holes in micro-vm Page 8 of 12

9 Lack of detection makes malware infections invisible to enterprise when infections occur on users machines. Unproven after 2 years in market. Largest deployment measured in 10s, not 10 thousands. Best suited for traditional sandbox style analysis of malware in Security Operations Centers by malware analysts rather than enterprise deployment to users. Vendor Claims Marketing Hype and the Realities of Deployable Defenses On the vendor claim from the beginning of this paper that a micro-virtualization product is the world s most secure endpoint solution, we point to an old axiom in security: the world s most secure computer is one you never turn on, nor can be turned on. In the case of this vendor claim, if the endpoint protected by micro-virtualization can t be put into production because of all of its limitations, then perhaps it is the world s most secure endpoint solution. On the other hand, if you would like to be able to use your machines and deploy a solution to protect your network from targeted attacks, then Invincea is the clear winner in this Tech Throwdown. Throwdown Comparison The following table presents a side-by-side comparison of two products implementing alternative virtual container architectures based on best for business criteria. We invite you to do your own side-by-side comparison with the form at the end. Invincea Product(s) FreeSpace Enterprise v3.3 Invincea Management Service 2.0 Micro-Virtualization Bromium vsentry 2.0 Approach and Use Cases Implementation Approach Secure Virtual Container (hardware agnostic) Hardware-dependent micro-vm fork of Xen hypervisor Use Cases Requirements and Supported Applications Anti-malware Anti-Phishing Document + PDF Protection Java Isolation Auto-remediation Application Isolation Windows XP EOL Protection Adversarial Threat Attribution Incident Response Analysis Windows OS support Windows XP 32 Windows 7 32-bit Windows 7 64-bit Windows 8 32-bit (v4) Windows 8 64-bit (v4) Anti-malware Anti-Phishing PDF Protection Java Isolation Auto-remediation Incident Response Analysis Windows 7 32-bit Windows 7 64-bit Page 9 of 12

10 Hardware Support Minimum Host Physical RAM Required No dependencies (Any x86/64 chipset) Intel VT-x, VT-d, + EPT only 512 MB+ 4 GB documented 8 GB real-world Required RAM allocation MB constant 1 GB+ CPU usage Number of processes (initial launch) Number of processes (subsequent) Browser Support Application Support Restore time after browser patch applied < 5% at launch < 1% sustained Not disclosed s+ (plus a copy of Windows OS) s+ (plus a copy of Windows OS) Internet Explorer Chrome Firefox Adobe Acrobat Adobe Reader (PDF) Adobe Flash Apple QuickTime Microsoft Excel 2010/2013 Microsoft PowerPoint 2010/2013 Microsoft Word 2010/2013 Microsoft Outlook helper apps Microsoft Silverlight Java s Internet Explorer Firefox Adobe Reader (PDF) Java MS Office limited support 15 minutes Microsoft LMS Server + Enterprise Licensing for MS Office Compatibility with other hypervisor software Remote Desktop Services Deployment and Management Not required Supported VMWare View Citrix XenDesktop Microsoft Remote Desktop Required Not supported VMWare View Citrix XenDesktop Microsoft Remote Desktop Number of organizations protected Largest number of hosts protected (single org) Hardware OEM partnerships On-premise Management Service Nearly 15,000 10s 70, s Dell Latitude laptops, OptiPlex desktops, Precision workstations, Dell Venue Windows8 tablets (v4) Yes None Yes Page 10 of 12

11 Cloud-hosted Management Service (option) Security Event Information Management and Threat Intelligence Partnerships Yes Not Supported Pre-built Integrations Open API for 3 rd party integration Threat Intelligence / Adversarial Attribution integration Cost Intel (McAfee) epo HP ArcSight RSA Security Analytics (NetWitness) IBM Security (Q1 Labs) QRadar Splunk ForeScout CounterACT Yes ThreatGRID ThreatStream ReversingLabs isight Partners VirusTotal Palo Alto Networks Wildfire None Yes Palo Alto Networks Endpoint license pricing $39.99/device annual subscription $150/endpoint lifetime Page 11 of 12

12 Throwdown Comparison Checklist Conclusion and more information This paper presents the business and security realities of user-targeted threats across an organization. Legacy technologies are not adequate in addressing the modern issues with user threats, and organizations should seriously evaluate if repurposing pointsolutions can meet their current and future needs specific to advanced malware threats. For more information on the Invincea platform and protecting against user-targeted exploits and other forms of security threats, please contact: Website: Phone: or Page 12 of 12

Invincea Advanced Endpoint Protection

Invincea Advanced Endpoint Protection SOLUTION OVERVIEW Invincea Advanced Endpoint Protection A next-generation endpoint security solution to defend against advanced threats combining breach prevention, detection, and response The battle to

More information

Trends in Zero-Day Kernel Exploits and Protection 2015

Trends in Zero-Day Kernel Exploits and Protection 2015 Trends in Zero-Day Kernel Exploits and Protection 2015 Overview of Key Protection Technologies and Their Limitations in Dealing With Zero-Day Kernel Attacks Executive Summary Legacy security solutions

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions

More information

Buyers Guide to Advanced Threat Protection for EndPoint Solutions. January 2014

Buyers Guide to Advanced Threat Protection for EndPoint Solutions. January 2014 Buyers Guide to Advanced Threat Protection for EndPoint Solutions January 2014 1 Table of Contents Advanced Threat Protection for the Endpoint... 2 Architecture... 4 Performance... 8 Enterprise Ready...

More information

Making Windows Secure by Design

Making Windows Secure by Design Making Windows Secure by Design Bromium and Microsoft Partner to Advance Security With Micro-Virtualization Introduction Bromium has reinvented endpoint security by using a new approach to defeating breaches

More information

Advanced Endpoint Protection

Advanced Endpoint Protection Advanced Endpoint Protection CONTAIN IDENTIFY CONTROL Nick Keller Director Federal Civilian Sales Duncker Candle Problem Solution Creativity, Change the Paradigm Why listen to me? Connect these 3 Companies

More information

Desktops in the Cloud

Desktops in the Cloud Desktops in the Cloud Your Silver Bullet for Windows XP End of Life WHITE PAPER Table of Contents Executive Summary...3 Incremental Desktop Migration...3 Use Cases for DaaS...3 Desktop Migration Options:

More information

Technical Specifications

Technical Specifications Technical Specifications Deployment and Integration The zero footprint web architecture ensures no intrusion on your users computers. Use ZAP CubeXpress to bring in Microsoft Dynamics customizations and

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

McAfee MOVE / VMware Collaboration Best Practices

McAfee MOVE / VMware Collaboration Best Practices McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Making Client-side Java Secure with Bromium vsentry

Making Client-side Java Secure with Bromium vsentry Making Client-side Java Secure with Bromium vsentry Making Client-side Java Secure Client-side Java has become somewhat of an IT pariah, primarily as a result of the growing list of Java vulnerabilities

More information

Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES

Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Table of Contents About this Document.... 3 Introduction... 4 Baseline Existing Desktop Environment... 4 Estimate VDI Hardware Needed.... 5

More information

Trusteer Rapport Virtual Implementation Scenarios

Trusteer Rapport Virtual Implementation Scenarios Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments

More information

The impact of virtualization security on your VDI environment

The impact of virtualization security on your VDI environment ENTERPRISE TE The impact of virtualization security on your VDI environment ST ED WITH LO G I N VS I Contents Introduction... 3 What is VDI?... 3 Virtualization security challenges... 3 Choosing the right

More information

AT&T Connect Participant Application & VDI Platform Support

AT&T Connect Participant Application & VDI Platform Support AT&T Connect Participant Application & Platform Support AT&T Connect Participant Application & Vdi Platform Support 2014 AT&T Intellectual Property Published by: AT&T Intellectual Property Product: AT&T

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

AlphaTrust PRONTO - Hardware Requirements

AlphaTrust PRONTO - Hardware Requirements AlphaTrust PRONTO - Hardware Requirements 1 / 9 Table of contents Server System and Hardware Requirements... 3 System Requirements for PRONTO Enterprise Platform Software... 5 System Requirements for Web

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information

Server-centric client virtualization model reduces costs while improving security and flexibility.

Server-centric client virtualization model reduces costs while improving security and flexibility. BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating

More information

KVM KERNEL BASED VIRTUAL MACHINE

KVM KERNEL BASED VIRTUAL MACHINE KVM KERNEL BASED VIRTUAL MACHINE BACKGROUND Virtualization has begun to transform the way that enterprises are deploying and managing their infrastructure, providing the foundation for a truly agile enterprise,

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Version 9.4.1.0 302-002-262 REV 01 Abstract Smarts 9.4.1 Suite can be installed in a typical or a fully distributed, multi-machine production

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

RED HAT ENTERPRISE VIRTUALIZATION

RED HAT ENTERPRISE VIRTUALIZATION Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Support Matrix

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Support Matrix EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Version 9.4.0.0 302-001-488 REV 01 Abstract Smarts 9.4 Suite can be installed in a typical or a fully distributed, multi-machine production

More information

Three Ways to Secure Virtual Applications

Three Ways to Secure Virtual Applications WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

2009 AAMGA Automation Conference

2009 AAMGA Automation Conference 2009 AAMGA Automation Conference Kenny Morris, MCSE Manager of Network Services CRC Insurance Services, Inc. kmorris@crcins.com Server Infrastructure 170 servers 70% in Central Datacenter 25% of server

More information

How To Get The Most Out Of Redhat.Com

How To Get The Most Out Of Redhat.Com RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT

More information

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the

More information

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC

Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

Frontiers in Cyber Security: Beyond the OS

Frontiers in Cyber Security: Beyond the OS 2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges

More information

CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu

CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

VIRTUALIZATION SECURITY IN THE REAL WORLD

VIRTUALIZATION SECURITY IN THE REAL WORLD VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View

VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View Page 1 of 16 Introduction A Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end user experience and

More information

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization... Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the

More information

IT Security Cost Reduction

IT Security Cost Reduction Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint In the constant drive for increased productivity and cost effectiveness, enterprises are continuously

More information

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes

More information

Server Virtualization A Game-Changer For SMB Customers

Server Virtualization A Game-Changer For SMB Customers Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Security and Data Protection with Intelligent Desktop Virtualization Bernd Harzog Analyst Virtualization Management January 2012 2012 The Virtualization Practice.

More information

Grant Management. System Requirements

Grant Management. System Requirements January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

Comparing Virtualization Technologies

Comparing Virtualization Technologies CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational

More information

EMA Product Brief: Desktop Virtualization with Quest

EMA Product Brief: Desktop Virtualization with Quest EMA Product Brief: Desktop Virtualization with Quest HIGHLIGHTS Vendor name: Quest Software Product name: vworkspace Production function: Desktop Virtualization Host Operating Systems Support: Windows

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring

More information

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012 McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management

More information

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7 MYOB EXO System Requirement Guidelines 30 April 2014 Version 2.7 Contents 1 System Requirements 4 1.1 Overview 4 1.2 Server Requirements 4 1.2.1 Server Requirements (excluding terminal server) 4 1.2.2

More information

Enterprise Desktop Solutions: VMware View 4.5

Enterprise Desktop Solutions: VMware View 4.5 C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

Cloud Computing Security: Public vs. Private Cloud Computing

Cloud Computing Security: Public vs. Private Cloud Computing Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple

More information

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in

This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration

More information

AP ENPS ANYWHERE. Hardware and software requirements

AP ENPS ANYWHERE. Hardware and software requirements AP ENPS ANYWHERE Hardware and software requirements Contents Server requirements 3 Hard drives 5 Virtual machines 6 AP ENPS mobile server 6 Client requirements 7 AP ENPS client on a Mac-based computer

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Enterprise Printing Solutions. Secure, on-premise mobile printing platform. enterprise education public printing locations print simply anywhere

Enterprise Printing Solutions. Secure, on-premise mobile printing platform. enterprise education public printing locations print simply anywhere Enterprise Printing Solutions Secure, on-premise mobile printing platform enterprise education public printing locations print simply anywhere PrinterOn Enterprise provides a secure mobile printing platform

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept. Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

The Importance of Patching Non-Microsoft Applications

The Importance of Patching Non-Microsoft Applications The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT

MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT Frequently Asked Questions Abstract This Enrollment provides Duval County Public Schools a license for certain specified Microsoft Products

More information

Personal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design.

Personal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design. Document Control Document Title Personal Computer Standard Version 1.0 Owner National Infrastructure Group Author Paul McLaren, paul.mclaren@scotland.gsi.gov.uk, 0131 244 2258 Creation date 13 th November

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Parallels VDI Solution

Parallels VDI Solution Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...

More information

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Accelerate Patching Progress Title of in Presentation the Enterprise the Enterprise Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Insert presenter logo here on

More information

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni, Pongsin Poosankam, y Matei Zaharia, Jun Han, y Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig,

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Adonis Technical Requirements

Adonis Technical Requirements Information Sheet Adonis Technical Requirements CONTENTS Contents... 1 Adonis Project Implementation... 1 Host Installation / Onboard Installation Full replication (LARGER Vessels):... 1 Onboard installation

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

Sage CRM Technical Specification

Sage CRM Technical Specification Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage

More information