The Virtualization Practice
|
|
- Tracey Powell
- 8 years ago
- Views:
Transcription
1 The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice Sponsored by Trend Micro Version 1.0 January The Virtualization Practice, LLC. All Rights Reserved. All other marks are property of their respective owners. Abstract Trend Micro was one of the first VMware security ecosystem partners to implement the VMware introspective API from that came the very first version of Trend Micro Deep Security TM. Deep Security has grown to include much more than just a firewall allowed by the very first introspective API to a product that includes agentless offload of many important security tasks. Trend has expanded this functionality to cover not only a virtual environment, but also physical and cloud environments. Trend Micro SecureCloud TM has grown to use Deep Security policy to further refine who or what can gain access to encrypted data. Given these new changes, how Trend Micro Deep Security and SecureCloud products provide a solution that fits into the over all hybrid cloud security architecture comes to the forefront, as these products are no longer just a virtualization tool. 1
2 Table of Contents I. Introduction... 3 II. III. IV. Why a Spectrum of Security... 5 Trend Micro within the Spectrum... 6 Protect the Data: Physical, Virtual, and Cloud... 8 V. About The Virtualization Practice... 8 VI. VII. About Trend Micro... 8 References
3 I. Introduction At the start of any reference architecture is the requirements, and the requirements for this particular architecture is to look at the entire hybrid cloud. We want to see where specific Trend Micro products fit into a spectrum that covers the entire hybrid cloud, and not just one aspect such as virtualization. While previous versions of Deep Security were virtualization specific, Trend Micro Deep Security has strengthened their cloud offerings over the last several years. Trend Micro has added in support not only for cloud infrastructures but also provides a centralized management interface for physical, cloud, and virtual end point security tools while integrating the policies for end point security into their SecureCloud offering. By combining these products at the policy level it is possible to allow SecureCloud to know whether or not specific end point security policy is met before allowing access. So the question becomes, where does Trend Micro Deep Security, SecureCloud, and other products fit into the overall hybrid cloud architecture. This architecture was presented within The Virtualizaiton Practice s Secure Hybrid Cloud Reference Architecture ( What follows is a synopsis of this architecture in a more general form. We present a security spectrum of the hybrid cloud built upon logical boundaries as shown in Figure 1 (which resides on page 4). Figure 1 shows this spectrum spanning end user computing (EUC) through the typical data center bastion, into the data center and then the application layer. At this point there is a change of control to the virtualization layers, which make more efficient use of the underlying hardware (below the spectrum) and storage (far right). Any part of this spectrum could communicate with a cloud service (above the spectrum). In addition to defining each spectrum as a different color and by name, we also present a typical flow chart of functionality for a Tier 1 application: . is rather unique today as we have many decisions to make as to how our mail moves through out a hybrid cloud. At the EUC layer of our spectrum, we have to decide do we go direct to the cloud service, through a security service residing in the cloud first or into our data center through our bastion that would often contain a DMZ where VPN end points may terminate. Once we are within the bastion we may then decide to either redirect to a cloud service via some gateway service or go deeper into our datacenter. The datacenter layer in our spectrum is a set of switches and decision logic that tells us where we go from here. We could hook into a cloud gateway service at this layer, or we could go direct to our Tier 1 App, in this case our Server. An server running as a virtual machine would either choose to go to a cloud gateway service to access in the cloud or run locally, in either case the tier 1 App changes its control to the virtualization layers and the hypervisor which then may or may not implement an introspection layer that is a part of the hypervisor. Eventually the request could be written locally to disk and also be replicated to some cloud service. Perhaps this is a combination of using Google Mail for personal data and a corporate Exchange server as your Tier 1 App as well as integrating in Microsoft Forefront capabilities as well as data protection via VMware SRM Replication to a cloud service. 3
4 4
5 II. Why a Spectrum of Security With hybrid clouds there is are a wide range of application interactions and directions you can take within the application when you start to look at how the application is accessed and then how the data within the application is secured. We are therefore looking at Data Access Security as well as Data Security (in motion and at rest) as well as Data Protection techniques to maintain availability. All three of these are looked at within this spectrum of security depicted on page 4. We start with End User Computing Devices (EUC) (Data Access) and quickly either head northbound to the Cloud (still Data Access) or Eastbound towards our Bastions hosts and DMZ. Which if consider this bastion as also the beginning of your cloud, you are really ahead of the game. What is East of our EUC devices is also what is north of them. Once you are in the Bastion and DMZ aspects of your hybrid cloud (north or eastbound) there is also choice to head further east or once more north into the cloud. Once you head east you will enter the real data center. The datacenter ends up being one big switching environment that sends data either south into the virtual environments, west with results, or even further south to the physical hardware. It could also send data north to a cloud environment. In either case, data is being sent in almost all directions with one exception. When we mover further east we are changing control from the data center layer to the virtualization layers, that change of control is where virtual machines interact with hypervisors in a many to one configuration (many VMs to one hyperviros) and hypervisors interact with physical hardware (south bound) in a one to one configuration (one hypervisor to one set of hardware). There is a subset of the hypervisor layer that is the introspective layer. The introspective layer allows security tools to gain access to what is happening within each virtual machine within the hypervisor. While all hypervisors have the capability, only a few aspects of introspection are being used outside of the VMware vsphere environment (which allows access to all resources: memory, network, CPU, and storage). Specifically, we see more third parties tying into storage introspection specifically on Hyper-V than any other resource. Introspection gives use a wonderful place to extend our security deep into the virtual environment. The last layer of our spectrum is the storage layer. We cannot escape the physical nature of storage, but storage these days is more than just a disk, we include in this layer all things related to data protection, replication, tiering, encryption, etc. In essence, whatever the storage hardware can do, while it seems pretty simplistic to treat all storage the same but from a security spectrum that covers the interactions between layers, storage is one major layer overlooked from a security perspective today. Security within storage is very simplistic, and while this is very good from a security management perspective it does require more physical security than other areas of the spectrum. We have a spectrum that goes west <-> east and north <-> south. We can enter the cloud at nearly every point in this spectrum. Each boundary of this spectrum will require some form of security. We need to extend our security measures to cover all colors of our spectrum. 5
6 III. Trend Micro within the Spectrum Trend Micro has many tools that provide coverage through our spectrum of security; in addition, Trend Micro has teamed up with VMware to provide further coverage of our spectrum of security. There are a number of tools that Trend Micro provides to cover the spectrum of security, specifically: Trend Micro Deep Security (DS) Trend Micro SecureCloud Trend Micro Mobile Security While VMware provides vcloud Network and Security (vcns) Edge vcloud Network and Security APIs VMware Horizon Mobile VMware Horizon Application Manager (HAM) Within the page 4 diagram, you can see where each of these tools fit with their respective Trend Micro and VMware icons. As we move through our spectrum the following tools have been placed. Spectrum Element Trend Micro VMware Notes End User Computing (EUC) Mobile Security Horizon Mobile Securing the EUC device is not only about encrypting the device but ensuring data access security. Bastion Deep Security vcns Edge All items within a DMZ 6 should have active end point security Data Center vcns Edge, HAM The data center can be viewed as a switching fabric. Once in the data center we must control access to any cloud or enterprise applications. Applications Deep Security vcns Edge All tier one applications and cloud gateways should have end point security and virtualization management layers need to be segregated.
7 Virtual Machines VMware provides lowlevel protection via built-in hypervisor security including use of Intel TXT. Hypervisor Deep Security vcns APIs VMware provides all APIs to access introspective and other security mechanisms. While Deep Security provides a mechanism to set the TPM/TXT registers. Introspection Deep Security Deep Security hooks into the vcns network and storage (DS versions < v8) APIs to perform its introspective security. DS on vsphere provides per VM firewalls as well as end point security. Storage SecureCloud SecureCloud provides an encrypted share that virtual machines can use as storage for application data. Cloud Hardware Deep Security, SecureCloud DS can run within a cloud service provider to provide integrated management of all DS end point security countermeasures. In addition, SecureCloud can be used within various clouds as well. The hardware vendor provides hardware security. As can be seen from this table and the page 4 diagram, Trend Micro fits within nearly all aspects of hybrid cloud security. Deep Security covers not only virtual but also physical or even cloud aspects of end point security all centrally managed from your own datacenter. This is a big win when trying to manage policy. Tie Deep Security with SecureCloud you have a mechanism to not 7
8 only provide end point security, but ways to provide a policy store for access to your data. Even so, we are looking at a solution to the problem of hybrid cloud security, not point products. The solution includes point solutions from VMware as well as Trend Micro. IV. Protect the Data: Physical, Virtual, and Cloud When you look at protecting your data within all aspects of the hybrid cloud: physical, virtual, and cloud locations, we need to start considering solutions that span products instead of specific products. No one product can cover the entire spectrum of security. At best they can be used in many different bands of the spectrum, but there needs to be some glue that holds them together, we need to consider how the data is accessed, how to secure the data, while providing data protection in the form of disaster recovery, business continuity, and high availability. No man is an island, and no single security product will currently cover all aspects of the hybrid cloud. While we looked only at VMware vsphere based clouds, the Trend Micro security solution can be applied as well to non-vsphere based clouds and datacenters. All we loose is the ability to make use of the introspective layers of the hypervisor. Trend Micro Deep Security works just as well in agent-full mode as it does in agent-less mode while the Trend Micro Mobile Security and SecureCloud products and VMware Mobile Horizon and HAM work as part of this solution regardless of hypervisor framework. The one change when not using VMware vsphere products is to find another Edge firewall capability. V. About The Virtualization Practice The Virtualization Practice is the leading online resource of objective and educational analysis focusing upon the virtualization and cloud computing industries. Edward L. Haletky is the author of VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2 nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. VI. About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our 8
9 customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network global threat intelligence data mining framework, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at and as part of an RSS feed at Or follow our news on Twitter SOURCE Trend Micro Incorporated VII. References Edward L. Haletky. VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment, Prentice Hall PTR; 1 edition (June, 2009) Edward L. Haletky. Secure Hybrid Cloud Reference Architecture, The Virtualization Practice, LLC ( Version 1.1 (September 2012) 9
The Virtualization Practice
The Virtualization Practice White Paper: Security Requirements of Hybrid Clouds: A Product Comparison! Edward L. Haletky Analyst Virtualization and Cloud Security! The Virtualization Practice Sponsored
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Protect your Virtual and Cloud Environment with Symantec Critical System Protection Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization
More informationMeasuring Hypervisor Footprints: Assessing Risk
Measuring Hypervisor Footprints: Assessing Risk Edward L. Haletky The Virtualization Practice, LLC Author of: VMware vsphere TM and Virtual Infrastructure Security: Securing the Virtual Environment Assessing,
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationThe Challenge of Workload Portability in a Multi-Provider Cloud
Cloud Expo 2015 Software Defined Data Centre and Networks Theatre The Challenge of Workload Portability in a Multi-Provider Cloud Kevin Linsell Director, Strategy & Architecture, Adapt Steve Bianciardi
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationSecurity. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
More informationHow To Compare The Cost Of A Microsoft Private Cloud To A Vcloud With Vsphere And Vspheon
A Comparative Look at Functionality, Benefits, and Economics November 2012 1 1 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and
More informationMeeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
More informationVirtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC
Virtualization as a key enabler for Cloud OS vision Vasily Malanin Datacenter Product Management Lead Microsoft APAC Can I enable employees to work from anywhere? How can I evolve my business apps to
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationThe Virtualization Practice
The Virtualization Practice White Paper: A Look at Trend Micro Deep Security 7.5 Edward L. Haletky Analyst March 2011 2011 The Virtualization Practice. All Rights Reserved. Abstract Trend Micro Deep Security
More informationTotal Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationTop 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5
Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and
More informationLeveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity
White Paper White Paper Managing Public Cloud Computing in the Enterprise Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity A Quick Start Guide By Edward Haletky Principal
More informationVMware for SMB environments(min. 505 1 st year)
VMware offers dozens of products, but at its core is vsphere, its virtualization platform, and vcenter Server, its management family. Understanding VMware's vsphere, vcenter and vcloud licensing is critical
More informationBen Prusinski Session 3: 11/15/2012 14:30 to 15:30 Location: Diablo
Ben Prusinski Session 3: 11/15/2012 14:30 to 15:30 Location: Diablo About the Speaker- Ben Prusinski Oracle ACE Director, OCP, Beta tester, Author, Underwater Photographer Avid scuba diver and student
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationEnterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
More informationWhich is Better: Virtualization or Cloud IaaS?
A White Paper Which is Better: Virtualization or Cloud IaaS? Which is Better: Virtualization or Cloud IaaS? Why should I consider Virtualization or Cloud IaaS at all? Simply put, they can save you money.
More informationEvolving Datacenter Architectures
Technology Insight Paper Evolving Datacenter Architectures HP technologies for Cloud ready IT By Russ Fellows January, 2013 Enabling you to make the best technology decisions Evolving Datacenter Architectures
More informationAgentless Security for VMware Virtual Data Centers and Cloud
Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying
More informationvcloud Air Disaster Recovery Technical Presentation
vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air
More information1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer
1 2 3 1. VMware is part technology and part sales and marketing genius. As a result of their marketing efforts many people in IT (especially the newer generations) believe that VMware invented virtualization.
More informationTrend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
More informationCourse Title: Virtualization Security, 1st Edition
Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised
More informationTrend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
More informationCloudCore. cloudcore infrastructure 4 100% SOLID STATE STORAGE 4 TRUE SCALE-OUT ARCHITECTURE 5 RAID-LESS DATA PROTECTION 5
OVERVIEW CloudCore Supports the Most Demanding Workloads ISO 27001:2013 Security with 100% Data Encryption VMware s vcloud Air Network Service Compatible Choice of Multiple Offshore Jurisdictions calligo
More informationHardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security
Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware
More informationTrend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
More informationVirtualizing Exchange
Virtualizing Exchange Simplifying and Optimizing Management of Microsoft Exchange Server Using Virtualization Technologies By Anil Desai Microsoft MVP September, 2008 An Alternative to Hosted Exchange
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
More information雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com. 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone
雲 端 發 展 與 安 全 趨 勢 陳 建 宏 Jovi Chen 技 術 顧 問 jovichen@checkpoint.com 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Agenda 1 雲 端 發 展 概 況 2 私 有 雲 演 進 過 程 及 未 來 3 雲 端 虛 擬 化 的 安 全 疑
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationMitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
More informationHOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
More informationVMware for your hosting services
VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware
More informationMicrosoft Private Cloud. A comparative look at Functionality, Benefits, and Economics
Microsoft Private Cloud A comparative look at Functionality, Benefits, and Economics Published: July 2012 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided
More informationLong Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments
BUYER CASE STUDY Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments Iris Feng Eric Sheppard IDC OPINION Today's datacenter is dominated by virtualized workloads
More informationManaging Application Performance and Availability in a Virtual Environment
The recognized leader in proven and affordable load balancing and application delivery solutions White Paper Managing Application Performance and Availability in a Virtual Environment by James Puchbauer
More informationvsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration
Course Details Level: 1 Course: V6PCRE Duration: 5 Days Language: English Delivery Methods Instructor Led Training Instructor Led Online Training Participants: Virtualization and Cloud Administrators,
More informationMaking a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies
More informationEvaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
More informationSecurity in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined
More informationMANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael
More informationBackup and recovery as agile as the virtual machines being protected
hosted by Mario Blandini @ Drobo Backup and recovery as agile as the virtual machines being protected Approaches and architectures for protecting VMware virtual machines using image-based backup Special
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationConfiguring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)
Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management
More informationComprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
More informationVmware VSphere 6.0 Private Cloud Administration
To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com Vmware VSphere 6.0 Private Cloud Administration Class Duration 5 Days Introduction This fast paced,
More informationVeeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
More informationDOUBLE VIRTUALIZATION BENEFITS WITH STORAGE FOR VIRTUALIZED ENVIRONMENTS
DOUBLE BENEFITS WITH STORAGE FOR VIRTUALIZED ENVIRONMENTS As IT has increasingly implemented server virtualization, it has neglected storage virtualization. Storage represents a rapidly growing investment
More informationCisco Intercloud Fabric for Business
Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationVMware vsphere Design. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330623/ VMware vsphere Design. 2nd Edition Description: Achieve the performance, scalability, and ROI your business needs What
More informationWHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10
Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Introduction... 3 Backup Approaches for Virtual Machines (VMs)...
More informationManaging Physical and Virtual Machines in Paragon Protect & Restore
Managing Physical and Virtual Machines in Paragon Protect & Restore Best Practices last updated: August 2013 Overview Paragon Software s Protect & Restore (PPR) offers a unified system and data protection
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationMAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products
TECHNOLOGY REVIEW MAKING YOUR VIRTUAL INFRASTUCTURE NON-STOP Making availability efficient with Veritas products AUGUST 2015 All businesses have a core set of applications and services that are critical
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationInfrastructure Virtualization for Hybrid Cloud
Infrastructure Virtualization for Hybrid Cloud Technology Transformation Public cloud has delivered elastic computing to enterprises by offering on-demand resources to accommodate the burst computing needs.
More informationDisaster Recovery As A Service Storage by CloudGrid and Zerto Virtual Replication Disaster Recovery and Business Continuity Platform
Disaster Recovery As A Service Storage by CloudGrid and Zerto Virtual Replication Disaster Recovery and Business Continuity Platform Cloud Grid Virtual Replication Cloud Grid provides an enterprise-class
More informationExpert Reference Series of White Papers. Five Reasons VMware vsphere 6.0 is a Game Changer. 0118 912 3456 www.globalknowledge.co.
Expert Reference Series of White Papers Five Reasons VMware vsphere 6.0 is a Game Changer 0118 912 3456 www.globalknowledge.co.uk Five Reasons VMware vsphere 6.0 is a Game Changer Bill Ferguson, MCT Alumni,
More informationAdvanced Security Services with Trend Micro Deep Security and VMware NSX Platforms
A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested
More informationRSA Security Solutions for Virtualization
RSA Security Solutions for Virtualization Grzegorz Mucha grzegorz.mucha@rsa.com Securing the Journey to the Cloud The RSA Solution for Virtualized Datacenters The RSA Solution for VMware View The RSA Solution
More informationA cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype
A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype Tim Hall Oracle ACE Director Oracle ACE of the Year 2006 OakTable Network OCP DBA (7, 8, 8i, 9i, 10g, 11g)
More informationWhat s New in VMware Site Recovery Manager 6.1
What s New in VMware Site Recovery Manager 6.1 Technical Overview AUGUST 2015 Table of Contents Introduction... 2 Storage profile based protection... 2 Stretched Storage and Orchestrated vmotion... 5 Enhanced
More information2013 ovh.com. All rights reserved
Abstract During this session, the user will learn how to optimize security, rights, network layers to build Private, Hybrid & Public Cloud range of services based on a same infrastructure using VMware
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationNetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
More informationNET ACCESS VOICE PRIVATE CLOUD
Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of
More informationTODAY S CLOUD MEETS TODAY S STORAGE
SOLUTIONBRIEF TODAY S CLOUD MEETS TODAY S STORAGE Today s businesses are looking for ways to grow revenues while reducing costs. Cloud computing delivers new revenue generating services and reduces costs
More informationVMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R
Pricing, Packaging and Licensing Overview W H I T E P A P E R Table of Contents Introduction to VMware vsphere 4..................................... 3 Pricing, Packaging and Licensing Overview..............................
More informationAgile Cloud Architecture for TDM and Architects
Agile Cloud Architecture for TDM and Architects Lawrence Tse lawrencetse@falcon-solutions.com Director, Professional Services Chief Architect Falcon Consulting (HK) Limited Hybrid Cloud Architecture Ecology
More informationAcronis Backup Product Line
New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote
More informationPROTECTING DATA IN MULTI-TENANT CLOUDS
1 Introduction Today's business environment requires organizations of all types to reduce costs and create flexible business processes to compete effectively in an ever-changing marketplace. The pace of
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More informationExtending the Power of Your Datacenter
Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Solution Architect Enterprise Group Taiwan Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained
More informationSoftware Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
More informationPLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
More informationHBC1533 - How to build your cloud - Steps to Extend your Datacenter
VMworld 2014 Page 1 HBC1533 - How to build your cloud - Steps to Extend your Datacenter Tuesday, 14 October 2014 14:00 Dave Hill, VMware 5 key steps to Hybrid DC A thing made by combining two different
More informationVirtualclientTechnology 2011 July
WHAT S NEW IN VSPHERE VirtualclientTechnology 2011 July Agenda vsphere Platform Recap vsphere 5 Overview Infrastructure Services Compute, Storage, Network Applications Services Availability, Security,
More informationHow To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
More informationTechnology Insight Series
Advancing VMware-based Data Resilience John Webster August, 2011 Technology Insight Series Evaluator Group Advancing VMware-based Data Resilience Copyright 2011 Evaluator Group, Inc. All rights reserved.
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationMicrosoft Private Cloud. A comparative look at Functionality, Benefits, and Economics
Microsoft Private Cloud A comparative look at Functionality, Benefits, and Economics Published: January 2012 Table of Contents Executive Summary... 4 What is a Private Cloud?... 4 Microsoft Private Cloud
More informationSHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS
SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends INTRODUCTION Enterprise Windows demands enterprise-class
More informationMonitoring Best Practices. Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software
Monitoring Best Practices Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software 1 Choosing the Right Approach to Get the Best Results Technical Track 1
More informationVirtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3
Service Description Virtualized Disaster Recovery (VDR) Terremark's Virtualized Disaster Recovery (VDR) service is a fully managed replication and Disaster Recovery (DR) service, where Terremark provides
More informationOptimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s 2012-06-14
Optimization, Business Continuity & Disaster Recovery in Virtual Environments Darius Spaičys, Partner Business manager Baltic s 2012-06-14 Agenda Business Continuity and Disaster Recovery Challenges How
More informationINTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs
White Paper INTEGRATING CLOUD ORCHESTRATION WITH EMC SYMMETRIX VMAX CLOUD EDITION REST APIs Provisioning storage using EMC Symmetrix VMAX Cloud Edition Using REST APIs for integration with VMware vcloud
More informationPrivate Cloud for the Enterprise: Platform ISF
Private Cloud for the Enterprise: Platform ISF A Neovise Vendor Perspective Report 2009 Neovise, LLC. All Rights Reserved. Background Cloud computing is a model for enabling convenient, on-demand network
More informationSOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT. Julian Chesterfield, Director of Emerging Technologies
SOFTWARE-DEFINED: MAKING CLOUDS MORE EFFICIENT Julian Chesterfield, Director of Emerging Technologies DEFINING SOFTWARE DEFINED! FLEXIBILITY IN SOFTWARE Leveraging commodity CPU cycles to provide traditional
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
More informationGoing Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager!
Going Hybrid The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager! About Aruba! Few figures! About Aruba! Few figures! 2 million customers! About Aruba! Few figures! 600 people!
More informationKEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure
KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform
More information