Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE
|
|
|
- Mervyn Lucas
- 10 years ago
- Views:
Transcription
1 Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE
2 Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware Virtualization Virtualization Specific Security Issues and Advantages Security Concepts in Virtualization Architecture Operational Security Issues with Virtualization Other Concerns Security Advantages of Virtualization Security Best Practices Secure Design Secure Deployment Secure Operations Common Virtualization Security Concerns and Misconceptions Are there any Hypervisor Attack Vectors? Virtualizing the DMZ Common Misconceptions about Virtualization Security 2
3 Virtualization Concepts Hardware Virtualization Makes an OS think it is running on it own hardware Abstracts the hardware from the OS ware, MS Virtual PC, Xen are forms of hardware virtualization Application Virtualization Makes an application thinks it is running in its own OS Abstracts the services and kernel from an application Thinstall and Softgrid are forms of application virtualization 3
4 Bare Metal (Hypervisor) Virtualization Engine Installs Directly on Hardware No reliance on an underlying OS ware ESX Server, XEN, MS Hyper-V Bare Metal Hardware Virtualization 4
5 Hosted Relies on an underlying OS More security implications because of the reliance on the underlying OS ware Workstation, ware Server, ware Player, MS Virtual PC and Server Hosted Hardware Virtualization ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 5
6 Extended computing stack Security Concepts in Architecture New privileged layers (Hypervisor) exist underneath the operating system that need to be considered Guest isolation One guest cannot be allowed to access or even address the hardware resources of another guest or the host/hypervisor Host Visibility from the Guest Can the guest OS detect that it is virtualized and if so can it see anything on the host. Virtualized interfaces Physical connectivity between guests is recreated, e.g. IP network, file shares, may be more or less like true physical counterparts Management interfaces The protection of management interfaces (Console OS, VirtualCenter, etc ) very important. Root or Administrator Access to these interfaces provides keys to the kingdom. Greater co-location of data and assets on one box Concept of mixing of Trust/Security Zones on a single physical box 6
7 Operational Security Issues Most security issues arise not from the virtualization infrastructure itself but from operational issues Adapting existing security processes and solutions to work in the virtualized environment Most security solutions don t care whether a machine is physical or virtual The datacenter and its workloads just became a much more dynamic and flexible place The risk of misconfiguration requires use of best practices specific to virtualization 7
8 Security Advantages of Virtualization Better Forensics and Faster Recovery After an Attack A compromised machine can be cloned in it current compromised state for forensic analysis Once cloned the can be immediately restored to a known good snapshot which is much faster than a physical server, reducing the impact of a security-related event Patching is Safer and More Effective You can quickly revert to a previous state if a patch is unsuccessful, making you more likely to install security patches sooner You can create a clone of a production server easily, making you more likely to test security patches and more likely to install security patches ware Update Manager does patch scanning and compliance reporting, along with patch remediation for both online and offline s again, making it more likely that security patches will be installed More Cost Effective Security Devices You can put in place cost effective intrusion detection, vulnerability scanning, and other security related appliances, because you can put them in a instead of a physical server Future: Leveraging Virtualization to Provide Better Security Better Context Provide protection from outside the OS, from a trusted context New Capabilities view all interactions and contexts CPU Memory Network Storage 8
9 Security Best Practices
10 Secure Design Separate and Isolate Management Networks Service Console Vmkernel: Vmotion and NFS & iscsi datastores Plan for mobility: 3 options Partition trust zones Security Best Practices Combine trust zones using virtual network segmentation and virtual network management best practices Combine trust zones using portable protection with 3rd-party tools (Blue Lane, etc) 10
11 Secure Deployment Harden ware Infrastructure 3 according to guidelines ware-provided Security Best Practices 3rd-party: STIG, CIS, Xtravirt Security Risk Assessment template, etc. Always secure virtual machines like you would physical servers Anti-virus Patching Host-based intrusion detection/prevention Use Templates and Cloning to enforce conformity of virtual machines ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 11
12 Secure Operations Strictly control administrative access Security Best Practices Favor controlled management interfaces (VI Client, Web Access) over unstructured interfaces (Service Console) Avoid VI Console access except when absolutely necessary; favor OSbased access to (RDP, ssh, etc). Use roles-based access control to limit administrative capabilities and enforce separation of duties, and never use anonymous accounts (e.g. Administrator ) Allow powerful access only to small, privileged group; implement breakglass policy for top level administrative account 12
13 Secure Networking Restrict access to privileged networks Security Best Practices Closely restrict administrative access on any host with privileged network For less privileged users, only allow template-based provisioning on those hosts Guard against misconfiguration Clearly label sensitive virtual networks Generate audit reports that flag suspicious configurations Routinely inspect event and task logs ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 13
14 Detailed Prescriptive Guidance Security Design of the ware Infrastructure 3 Architecture ( ware Infrastructure 3 Security Hardening ( Managing ware VirtualCenter Roles and Permissions ( STIG (Secure Technology Implementation Guide) draft ( CIS (Center for Internet Security) Benchmark ( Best Practices References Xtravirt Virtualization Security Risk Assessment ( &id=15) 14
15 Common Virtualization Security Concerns
16 Are there any Hypervisor Attack Vectors? There are currently no known hypervisor attack vectors to date The ESX Server Hypervisor has not been known to be compromised to date. Concern is the potential for Escape Potential Vectors? Architectural Vulnerability Small Code Footprint of Hypervisor is Big Advantage Must be Designed specifically with Isolation in Mind Software Vulnerability Possible like with any code written by humans If a software vulnerability is found, exploit difficulty will be very high Depends on Vendor s Security Response and Patch Release Speed Configuration Risk Biggest Risk to Virtual Infrastructure Follow Best Practices to Avoid 16
17 Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. 17
18 Partial Collapse of DMZ Virtual Center Server Internet Production LAN Managem ent LAN Service Console Interface Service Console Interface Service Console Interface ID S/IPS vmkernel Service Console vmkernel Service Console vmkernel Service Console ESX Server(s) NIC Team ESX Server(s) NIC Team ESX Server(s) NIC Team Web Zone App Zone Datab ase Zone ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 18
19 Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. Collapsing all servers in multiple trust zones to a single cluster of ESX Servers using virtual networking and physical security devices to enforce isolation Takes full advantage of virtualization benefits so it is more cost effective. Bigger risk of misconfiguration creating a security hole. Not an option if an organization doesn t or can t trust our isolation ability 19
20 Hybrid of Partial and Full Collapse Virtual Center Server Internet Production LAN Management LAN Web Servers Application Servers Database Servers Service Console Interface IDS/IPS vmkernel Web Zone App Zone Database Zone Service Console NIC Team NIC Team ESX Server(s) NIC Team Web Zone App Zone Database Zone ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 20
21 Concern: Virtualizing the DMZ Multiple different configurations can be used depending on environment Collapsing of servers in each trust zone into their own cluster of ESX Servers Safer for those that won t or can t fully trust our isolation ability Small risk of misconfiguration creating a security hole Does not take full advantage of consolidation benefits. Collapsing all servers in multiple trust zones to a single cluster of ESX Servers using virtual networking and physical security devices to enforce isolation Takes full advantage of virtualization benefits so it is more cost effective. Bigger risk of misconfiguration creating a security hole. Not an option if an organization doesn t or can t trust our isolation ability Fully collapsing all servers and security devices into a Virtual Infrastructure Takes even more advantage of consolidation by virtualizing security devices, Lose some capabilities due to current limitations of those virtual security devices Future developments in virtual security devices will remove those limitations 21
22 Full Collapse Firewall/IDS/IPS Virtual Appliance(s) Web Servers Application Servers Database Servers vmkernel Internet Intranet Web App Database Service Console NIC Team NIC Team ESX Server(s) Virtual Center Server Internet Production LAN Management LAN ware Confidential/Proprietary Copyright 2006 ware, Inc. All rights reserved. 22
23 Common Misconceptions about ware Security Commonly cited: Blue Pill, SubVirt These are NOT hypervisor vulnerabilities, but use the concept of a hypervisor to embed themselves underneath an OS by leveraging hardware enabled virtualization (AMD Pacifica Chipset) These can only affect non-virtualized operating systems Therefore, you are safer running in a Various Claims of Guest Escape Don t affect Bare-Metal Platforms only hosted platforms Not exactly escape nor a hypervisor vulnerability Uses documented communication interface for hosted features such as drag-n-drop, cut n-paste, and shared folders. This communication interface can be disabled (on by default) 23
24 Other Concerns Restricted view into inter- traffic for inspection by intrusion detection/prevention systems (IDS/IPS). This is possible currently with the use of a helper or forcing traffic out to physical network Vendors need to address this and provide this capability Interesting issue to be brought up though because few organizations monitor traffic that deep in the network. Limited visibility into the host OS and virtual network to find vulnerabilities and assess correct configuration. ware is working closely with leading security vendors to help create virtualization specific security tools and give the needed visibility for these tools. Safe will provide APIs for Security Vendors for unparalleled visibility and security capabilities Patching, signature updates, and protection from tampering for offline images. Virtualization Vendor should provide capability for the patching of both online and offline s Patching s is safer than patching physical systems with the use of snapshot feature for testing and deployment of patches Some major security vendors are near release for the ability to update AV and HIPS signatures for offline s 24
25 Questions? Rob Randell, CISSP Senior Systems Engineer - Security Specialist
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
BEST PRACTICES. DMZ Virtualization with VMware Infrastructure
BEST PRACTICES DMZ Virtualization with ware Infrastructure ware BEST PRACTICES Table of Contents Virtualized DMZ Networks... 3 Three Typical Virtualized DMZ Configurations... 4 Partially Collapsed DMZ
Network Segmentation in Virtualized Environments B E S T P R A C T I C E S
Network Segmentation in Virtualized Environments B E S T P R A C T I C E S ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
managing the risks of virtualization
managing the risks of virtualization Chris Wraight CA Technologies 28 February 2011 Session Number 8951 abstract Virtualization opens the door to a world of opportunities and well managed virtualization
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
PICO Compliance Audit - A Quick Guide to Virtualization
WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
The growing importance of a secure Cloud environment
The growing importance of a secure Cloud environment Jan Tiri [email protected] System Engineer, VMware BeLux 2009 VMware Inc. All rights reserved Cloud components Enterprises Cloud Service Providers Private
VMware ESXi 3.5 update 2
VMware ESXi 3.5 update 2 VMware ESXi 3.5 Exec Summary What is it? What does it do? What is unique? Who can use it? How do you use it? Next generation, thin hypervisor for FREE Partitions servers to create
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
[email protected] 2009 STREAM FRBC
Virtualization ti Dave Balka [email protected] Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
VMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
What s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing
TGL VMware Presentation Guangzhou Macau Hong Kong Shanghai Beijing The Path To IT As A Service Existing Apps Future Apps Private Cloud Lots of Hardware and Plumbing Today IT TODAY Internal Cloud Federation
Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
VMware Virtual Infrastucture From the Virtualized to the Automated Data Center
VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. [email protected] Agenda Vision VMware Enables Datacenter Automation VMware Solutions
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Auditing Virtualized Environments
Auditing Virtualized Environments 11 CHAPTER Innovations in operating system virtualization and server hardware permanently changed the footprint, architecture, and operations of data centers. This chapter
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!
Table of Contents Introduction 1 About the VMware VCP Program 1 About the VCP Exam 2 Exam Topics 3 The Ideal VCP Candidate 7 How to Prepare for the Exam 9 How to Use This Book and CD 10 Chapter Format
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)
Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server
1. Mục tiêu khóa học. Khóa học sẽ tập trung vào việc cài đặt, cấu hình và quản trị VMware vsphere 5.1. Khóa học xây dựng trên nền VMware ESXi 5.1 và VMware vcenter Server 5.1. 2. Đối tượng. Khóa học dành
VMware vsphere: Install, Configure, Manage [V5.0]
VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
The Top 8 Questions to ask about Virtualization in a PCI Environment
A COALFIRE WHITE PAPER The Top 8 Questions to ask about Virtualization in a PCI Environment DALLAS DENVER LOS ANGELES NEW YORK SEATTLE 877.224.8077 [email protected] www.coalfire.com This paper provides
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Securing the Cloud. A Review of Cloud Computing, Security Implications and Best Practices W H I T E P A P E R
W H I T E P A P E R Securing the Cloud A Review of Cloud Computing, Security Implications and Best Practices VMware, Inc. 314 Porter Drive Palo Alto CA 94304 USA Tel 60-47-000 Fax 60-47-001 www.vmware.com
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware
Virtualisation A newsletter for IT Professionals Issue 2 UEducation Sector Updates I. Background of Virtualisation Virtualisation is the separation of resource or request for a service from the underlying
CA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
VMware vsphere 4.1 with ESXi and vcenter
VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization
E-SPIN's Virtualization Management, System Administration Technical Training with VMware vsphere Enterprise (7 Day)
Class Schedule E-SPIN's Virtualization Management, System Administration Technical Training with VMware vsphere Enterprise (7 Day) Date: Specific Pre-Agreed Upon Date Time: 9.00am - 5.00pm Venue: Pre-Agreed
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
How Does Virtualization Change Your Approach to Enterprise Security and Compliance?
HowDoesVirtualizationChangeYour ApproachtoEnterpriseSecurityand Compliance? SevenStepstoaVirtual awaresecuritystrategy. MichaelBaum Co founder ChiefCorporate&Business DevelopmentOfficer ScottShepard CISSP,CISM
What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant
What is Virtualization and How Do I Audit It? Rick Schnierer and Chris Tennant Nationwide Insurance Learning Objectives Understand the fundamentals of virtualization and supporting architecture Develop
Agentless Security for VMware Virtual Data Centers and Cloud
Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying
Trend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
VMware vsphere-6.0 Administration Training
VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast
Securing the private cloud
Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
VMware vsphere: Fast Track [V5.0]
VMware vsphere: Fast Track [V5.0] Experience the ultimate in vsphere 5 skills-building and VCP exam-preparation training. In this intensive, extended-hours course, you will focus on installing, configuring,
Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
Virtualization Security Checklist
Virtualization Security Checklist This virtualization security checklist is intended for use with enterprise full virtualization environments (as opposed to paravirtualization, application or operating
Virtualization Overview
VMWARE W HWHITE I T E PPAPER A P E R Virtualization Overview 1 Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation
Solution Guide Parallels Virtualization for Linux
Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Solving the Desktop Dilemma
Solving the Desktop Dilemma Enterprise Desktop Solutions Raymond Sleiman DL Groupe GMG [email protected] Mobile :079 200 81 03 Agenda What is VMware View 3 What s new with VMware View 3 Architecture RTO
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
VMware: Advanced Security
VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
Virtualization Security
Virtualization Security Edward Ray, CISSP NetSec Design & Consulting, Inc. 826 North Red Robin Street Orange, CA 92869 001 714 381 6508 [email protected] Eugene Schultz, Ph.D., CISSP Emagined Security
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Addressing the Most Common Security Risks in Data Center Virtualization Projects
Research Publication Date: 25 January 2010 ID Number: G00173434 Addressing the Most Common Security Risks in Data Center Virtualization Projects Neil MacDonald In 2007, we addressed the security considerations
SQL Server Virtualization 101. David Klee, Group Principal and Practice Lead. SQL PASS Virtualization VC, 2014.01.08
SQL Server Virtualization 101 David Klee, Group Principal and Practice Lead SQL PASS Virtualization VC, 2014.01.08 www.linchpinpeople.com 1 David Klee Group Principal and Practice Lead @kleegeek davidklee.net
W H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar
W H I T E P A P E R Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar Contents Introduction...1 VMware Infrastructure Overview...1 VMware Consolidated Backup...2 EMC Avamar Overview...3
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
IT Security Trends. A strategic overview featuring Gartner content. In this issue
In this issue 1. Introduction: Virtualization Security Strategies for Today s Businesses 2. Strategies for Protecting Virtual Servers and Desktops: Balancing Protection with Performance 7. A Practical
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Product Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
How Virtualization Affects PCI DSS
How Virtualization Affects PCI DSS Part 2: A Review of the Top 5 Issues Authors: William Hau Vice President Professional Services Foundstone Professional Services Rudolph Araujo Director Foundstone Professional
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
