Erik Johansson, , Virtualization in Control Systems Possibilities and Challenges
|
|
|
- Maurice Mathews
- 10 years ago
- Views:
Transcription
1 Erik Johansson, , Virtualization in Control Systems Possibilities and Challenges ABB Group October 19, 2009 Slide 1
2 Possibilities and Challenges The open debate of virtualization in control systems This presentation kick-starts the discussion by walking through pros and cons of virtualization in control systems as collected from various IT and SCADA related blogs and articles. It is a relatively new and hot topic, which is openly debated on the Internet. Some attention is paid to cyber security issues before diving into the reality of today, finishing off with a quick look in the magic crystal ball about the future. Possibilities what are the good things Challenges why it may be a bad thing Cyber Security more or less secure with VM What about reality where are we now What about the future where are we going
3 Why Virtualization? In a control system environment Lower number of physical servers Reduction of hardware maintenance and operational costs, significant for high-end SCADA/EMS environments with servers. Fast recovery from disasters Snapshots and clones shrink-wraps operational systems for fast and easy recovery from any kind of software induced failure Simplified system deployment Virtual server templates facilitates system deployment by reduction of engineering efforts Excellent development and quality assurance Again, snapshots and clones greatly enhance productivity and quality assurance in in release and production life cycles Allows safe testing of security architectures Existing open source and show case VMs of security products and appliances ready for testing in you virtualized QA system What else?
4 Why Not Virtualization? In a control system environment Difficulties in finding origin of problem Vendors may be unwilling to support virtualized environments because of the fear of reported problems being related to the hypervisor of infrastructure rather than their applications. E.g. time synchronization Resilience (Availability) The risk of losing 4 online systems by losing one server is evident. Increased attack surface Although the surface of each guest remain the same, the hypervisor and infrastructure as such adds to the total. Potential problem with physical interfaces USB, RS-232 etc may pose problems. Such problems can often be solved by additional, external hardware. Performance Will a virtualized environment have the capacity to withstand a major disturbance in the process? What else?
5 Cyber Security Issues In a virtualized environment Shared resources may act as an attack platform ( "graphics cards and network cards today are really miniature computers that see everything in all the VMs. Mitigations are developed on chip-level High Assurance Platform ( NSA are looking at using virtualization to solve the air-gap problem for personnel with multiple security clearances. Today, such personnel need to use separate workstations to access the information for each clearance level. The HAP is developed with security in focus Relaxed posture regarding security in VM infrastructures ( Almost 70% of all companies that have or are moving to virtualization do not plan to do anything regarding security in their virtualization infrastructures. All security is focused on the guests Real-life incidents may be needed to change this posture
6 Cyber Security Issues In a virtualized environment Hypervisor kernel less vulnerable ( Optimized hypervisor kernels are less susceptible to malware than regular general purpose operating systems. However, they are still not impervious to attacks Single hypervisor vulnerability If mission critical production systems are virtualized, redundancy and thereby availability may be inhibited if there is a single vulnerability in the hypervisor of choice that can be remotely exploited. Conclusion Similar to the pros and cons regarding virtualization, the technology is yet to new to understand if the introduction of virtualization actually help provide better security for control systems, or if it introduce serious security vulnerabilities There is a strong trend in securing control systems on host (guest) level at the moment. Introducing virtualization requires the same focus on hypervisor and infrastructure level! Perhaps even on chip-level as anticipated by NSA and AMD.
7 Reality of Yesterday Example of SCADA/EMS of 2000 Years Model (excl. process comm.) SCADA/EMS production connected to office network SCADA/EMS consist of dual SCADA/EMS, dual Historian, dual data acquisition front-ends, one engineering station and multiple workstations Single solution for backup/recovery Total number of hosts often less than 20 servers for three sites and workstations
8 Reality of Today Example of SCADA/EMS of 2009 Years Model (excl. process comm.) New additions Security Zones Replicas Quality Assurance Configuration Mgt Security Mgt Servers PC:s
9 Reality of Today As seen from a vendor perspective Massive increase in number of servers in tenders since last year, mainly inspired from NERC-CIP (security and quality assurance) With the increase in number of servers, there are always discussions regarding virtualization. A couple of customers are considering virtualization of their existing production systems, possibly waiving parts of the support agreements. One contract includes virtualized quality assurance systems Two major tenders includes virtualized environments for development and quality assurance Vendors offering virtualized environment will also have to face to music. Warranty and support agreements must include the virtualized solutions. Readiness for such responsibilities are made by fully virtualized (to some extent including virtual security appliances) release acceptance environments in addition to physical ones. Currently, applications that interact with physical interfaces not natively supported by the VM are excluded, typically data acquisition hosts.
10 Real Life Experiences Internal Acceptance Tests conducted on virtualized systems Internal Acceptance Tests System verification and validation are conducted on virtualized systems, including virtual appliances, in addition to the physical environments. This facilitates better test coverage since multiple configurations can be tested for each release with significantly less deployment efforts. Penetration and vulnerability tests are conducted on virtual environments but are currently excluding the hypervisors and virtualization infrastructures Development merge verification and validation Virtual environments are used to verify and validate that development tracks are merged into the baseline correctly.
11 Real Life Experiences Miscellaneous applications of virtualized environments SCADA images produced for critical roles for development and test: SCADA/EMS/Historian application servers in one image Domain Controller, Engineering and HMI in another VMs produced for use in local workstations. Being replaced by centralized lab automation solution ESXi leverage excellent test and demo possibilities A $1000 PC can now run an almost full configuration with reasonable performance, making the virtualization technology very inexpensive and commonly available Introduction of lab automation system Excellent workbench for core configuration tests (dual SCADA, dual Historian, ICCP partners, Security Management etc) Multiple developers can test core configurations at the same time by checking out a specific build, conduct tests and then drop it. Checking out such a configuration is a matter minutes. A system of 5-6 hosts is up and running within five minutes. Unsuitable for testing components that interact with physical interfaces like data acquisition.
12 Real Life Experiences Lab automation as development and test platform, from beta tests Screenshot from lab automation configuration overview, showing system with dual SCADA/Historian servers and combined Domain Controller, Engineering and HMI
13 Real Life Experiences Lab automation as development and test platform Screenshot from lab automation configuration overview, showing system from a network perspective
14 Real Life Experiences Lab automation as development and test platform, console view
15 Real Life Experiences Lab automation as development and test platform, HMI console view
16 What awaits us in the future Regarding virtualization in control systems Personally, at the time of writing Virtualization will be the most common solution for non-critical systems, like development, test and quality assurance Production environments will be partly virtualized, but not fully. There will be security incidents where hypervisors are compromised New mitigation techniques and strategies will be developed to make hypervisors extremely difficult to compromise Overall quality of control system over the full life-cycle will increase Stratos Technologies thinks: ( True utility computing enables resource sharing and dynamic resource allocation based on user-specified criteria, such as time of day and incremental capacity needs.
17 What awaits us in the future Regarding virtualization in control systems Stratos Technologies thinks (contd.): ( Utility computing is the focus Simpler deployment, use will make benefits more broadly accessible Management and monitoring come of age Self-management Policy making can be automated What does that mean exactly? Virtualization standards will increase ease of deployment, reduce risk Single point of failure at virtualization layer is overcome by deploying in a fault-tolerant environment Robust fault-tolerant hardware eliminates single points of failure on the virtualization server platform Finally; what do you think?
18 ABB Group October 19, 2009 Slide 18
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Server Virtualization in Manufacturing
W H I T E P A P E R Server Virtualization in Manufacturing Do s and Don ts for Business- and Mission-critical Manufacturing Systems Uptime. All the time. 1 Abstract While the benefits of server virtualization
6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
Sustain.Ability. 2012 Honeywell Users Group EMEA. Virtualization Solutions: Improving Efficiency, Availability and Performance
Sustain.Ability. 2012 Honeywell Users Group EMEA Virtualization Solutions: Improving Efficiency, Availability and Performance Experion Virtualization Solutions Overview Virtualization Today s hot topic
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,
SERVER VIRTUALIZATION IN MANUFACTURING
SERVER VIRTUALIZATION IN MANUFACTURING White Paper 2 Do s and Don ts for Your Most Critical Manufacturing Systems Abstract While the benefits of server virtualization at the corporate data center are receiving
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
VIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10
Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Introduction... 3 Backup Approaches for Virtual Machines (VMs)...
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
M6422A Implementing and Managing Windows Server 2008 Hyper-V
M6422A Implementing and Managing Windows Server 2008 Hyper-V Looking at Training Differently... Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: Published: Language(s): Audience(s):
Protecting Virtual Servers with Acronis True Image Echo
Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
Technology Insight Series
Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V
MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials Outline Introduction
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
Deployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
Virtualization In Manufacturing Industries. Copyright 2012 Rockwell Automation, Inc. All rights reserved.
Virtualization In Manufacturing Industries Rev 5058-CO900C What is Virtualization? Traditionally the OS and its applications were tightly coupled to the hardware they were installed on Virtualization breaks
A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology
A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology Acronis True Image Enterprise Server for Windows Acronis True Image Server for Windows Acronis True Image Server for Linux Another
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
RELIABILITY AND AVAILABILITY OF CLOUD COMPUTING. Eric Bauer. Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC.
RELIABILITY AND AVAILABILITY OF CLOUD COMPUTING Eric Bauer Randee Adams IEEE IEEE PRESS WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS Figures Tables Equations Introduction xvii xxi xxiii xxv I
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
VMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Instant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
Leveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil
Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104
Protecting Virtual Servers with Acronis True Image
Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection
Leveraging Virtualization for Higher Business Continuity within Industrial Facilities
White Paper Leveraging Virtualization for Higher Business Continuity Author: Jim Frider, Product Marketing Manager, Invensys Operations Management What s Inside: 1. Executive Summary 2. Introduction 3.
SCADA Virtualization
SCADA Virtualization Information on Virtualization of SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
Server Virtualization with VMWare
Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,
Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE
Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Why is the V3 appliance so effective as a physical desktop replacement?
V3 Appliance FAQ Why is the V3 appliance so effective as a physical desktop replacement? The V3 appliance leverages local solid-state storage in the appliance. This design allows V3 to dramatically reduce
Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage [email protected]
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage [email protected] Little video to start with... The Problem with Laptops Windows XP support is expiring
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
Simplifying the Transition to Virtualization TS17
Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation
Citrix XenServer Backups with Xen & Now by SEP
Citrix Backups with Xen & Now by SEP [email protected] www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 CITRIX XENDESKTOP ENVIRONMENT... 4 CITRIX DESKTOP DELIVERY CONTROLLER BACKUP... 5 CITRIX
Total Data Protection for your business
A platform to empower your business C Y K C K C K Total Data Protection for your business Protecting business data No matter where it lives At Breakwater we understand the importance of a dependable, extremely
Microsoft Windows Server 2008: MS-6422 Implementing and Managing Hyper V Virtualization 6422
coursemonster.com/us Microsoft Windows Server 2008: MS-6422 Implementing and Managing Hyper V Virtualization 6422 View training dates» Overview This three day instructor led course teaches students how
Complete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
HP Data Protector software. Assuring Business Continuity in Virtualised Environments
HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could
How bare-metal client hypervisors will mean the end of agent-based Windows management
How bare-metal client hypervisors will mean the end of agent-based Windows management Abstract... 2 Understanding the old (current?) way of managing desktops.... 2 How do companies manage desktops currently?...
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - [email protected] Solution Network
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
A Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Simplify VDI and RDS Private Clouds for SMBs
PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,
DeltaV Virtualization High Availability and Disaster Recovery
DeltaV Distributed Control System Whitepaper October 2014 DeltaV Virtualization High Availability and Disaster Recovery This document describes High Availiability and Disaster Recovery features supported
CA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution
EMC Virtual Infrastructure for Microsoft Applications Data Center Solution Enabled by EMC Symmetrix V-Max and Reference Architecture EMC Global Solutions Copyright and Trademark Information Copyright 2009
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft
PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft Agenda Security Development Lifecycle Initiative Using PI to Protect Critical Infrastructure Hardening Advice for the PI
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
Session 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Virtualized Domain Name System and IP Addressing Environments. White Paper September 2010
Virtualized Domain Name System and IP Addressing Environments White Paper September 2010 Virtualized DNS and IP Addressing Environments As organizations initiate virtualization projects in their operating
How To Protect Water Utilities From Cyber Attack
Cybersecurity in the Water Sector Copyright 2015 American Water Works Association Overview Reality of the Threat Environment Water Sector Cyber Risk Management Key Resources Connectivity = Exposure Process
1518 Best Practices in Virtualization & Cloud Security with Symantec
1518 Best Practices in Virtualization & Cloud Security with Symantec Tues May 6, 11:00 Kevin Stultz Symantec Product Management Chip Epps Symantec Product Marketing 1 Agenda 1 2 Trends in Virtualization
Deep Dive on SimpliVity s OmniStack A Technical Whitepaper
Deep Dive on SimpliVity s OmniStack A Technical Whitepaper By Hans De Leenheer and Stephen Foskett August 2013 1 Introduction This paper is an in-depth look at OmniStack, the technology that powers SimpliVity
EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
Wonderware Industry Solutions for Facilities Management
Wonderware Industry Solutions for Facilities Management Wonderware offers software solutions for the facilities management industry that can help you provide higher quality services to your occupants,
Always On Infrastructure for Software as a Ser vice
Solution Brief: Always On Infrastructure for Software as a Ser vice WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
managing the risks of virtualization
managing the risks of virtualization Chris Wraight CA Technologies 28 February 2011 Session Number 8951 abstract Virtualization opens the door to a world of opportunities and well managed virtualization
Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites
Course Syllabus Implementing and Managing Windows Server 2008 Hyper-V Key Data Product #: 3961 Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
