Two Great Ways to Protect Your Virtual Machines From Malware
|
|
|
- Noah Patterson
- 10 years ago
- Views:
Transcription
1 Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase availability of servers and virtual desktops. But how do you protect virtual machines from malware without compromising the performance and convenience that you expect from your investment in virtualization? This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments: agentless scanning using vshield Endpoint and client-based scanning optimized for virtual platforms.
2 Introduction Over the past several years, organizations technology needs have become increasingly complex. IT departments are now expected to support a mobile workforce, a variety of portable devices, interactive websites, a portfolio of critical business applications, and a set of traditional network services and infrastructure. While IT spending has grown in many organizations, it rarely keeps pace with the demand for services. This leads IT professionals to turn to virtualization as an efficient means of scaling their capabilities. In the server room or data center, virtualization offers benefits such as simpler management, reduced hardware costs and lower operational expenses. Virtual desktop infrastructure (VDI) extends these benefits to the increasingly mobile workforce, while affording the IT department a layer of control and monitoring not commonly available with traditional endpoint devices. Security is often cited as an advantage of virtualization as well. In practice, virtualization can be both a security opportunity and a challenge. Yes, virtual platforms provide new security capabilities, like sandboxing, data centralization, and easy duplication of hardened configurations. On the other hand, the ease of deployment and cloning can lead to virtual machine (VM) sprawl and the associated difficulty in ensuring that every VM is properly protected. Furthermore, an emphasis on performance and consolidation ratios the number of VMs hosted per physical server can lead some IT professionals to sacrifice security to conserve resources. As the market leader in server virtualization, VMware brings a lot of innovation to how organizations deploy and manage virtual systems. This innovation includes a new approach to protecting VMs from malware: agentless antivirus (AV) based on VMware s vshield Endpoint technology. VShield Endpoint, included as part of most editions of VMware s vsphere product, combines the important security benefits of antivirus protection with the high performance and consolidation ratios that organizations demand from their virtual deployments. In addition to delivering vshield-based AV solutions, some security vendors have invested in optimizing their endpoint clients for VMware and other virtual environments. This leaves IT professionals with many choices for protecting their VMs, and questions about how best to balance security and performance. This paper examines the challenges with running traditional antivirus products on VMs, examines the advantages and limitations of agentless AV and optimized clients, provides guidance for deciding between the two, and describes Sophos solutions for both approaches. A Sophos Whitepaper January
3 Challenges with antivirus in a virtual environment Since the early days of the AV industry, malware protection has followed a familiar model. An antivirus client is installed on each workstation or server to be protected. That client runs in memory, scanning for threats and periodically updating its definitions and engine. In corporate environments, a management console provides centralized deployment, administration, updating and reporting for the clients installed on each system. This model for threat protection emerged at a time when the systems being protected were all separate pieces of hardware. When systems are consolidated onto virtual platforms, traditional antivirus products can get in the way of optimal performance and scalability. The ease of creating, suspending, deleting and moving virtual machines also leads to challenges with managing protection. Let s look more closely at both of these issues. Performance and scalability Overhead and impact on density One challenge with traditional AV software is the resource overhead associated with running the client software on each VM. Some AV clients use as much as 500MB of RAM per system. Increasing each virtual machine s RAM footprint to accommodate that extra load would require an extra 10GB of RAM for a host with 20 guest VMs. For hosts that are bound by the available RAM, the added overhead of traditional security software may prevent the achievement of an optimal VM consolidation ratio. Scan storms Scan storms occur when a host s resources are overwhelmed by many VMs running AV scans at the same time. Because each VM is engaged in nearly identical behavior requiring multiple input/output (I/O) operations and substantial CPU processing, data throughput and system response time can slow noticeably. Even an otherwise speedy SAN or local storage array can be affected by the sheer volume of simultaneous read requests. Simultaneous scheduled or on-demand scans can lead to a scan storm, increasing resource use and decreasing system performance. A Sophos Whitepaper January
4 There may be times when a scan storm is an acceptable side effect of a high priority activity. In the wake of a malware outbreak, for example, you might run an on-demand scan to find and remove the malware from infected systems. In this case, the performance penalty may be less of a concern than completing the scan as quickly as possible. In most instances, however, maintaining the best performance and highest availability of your virtual machines is paramount. Scan storms, then, can contribute to a failure to meet service level agreements or otherwise deliver performance in accordance with users or management s expectations. Update storms Like scan storms, update storms can result in overuse of resources due to simultaneous activity across VMs. In this instance, the culprit is updates to security software s data (e.g., definition files) and/or the security software itself (e.g., product or engine updates). Because the client running on each VM has to download and install the updates, I/O and network bandwidth are typically the resources hit hardest. Traditional security software typically schedules updates at a specific time of day or at a fixed frequency, increasing the likelihood of concurrent updates. VDI is especially susceptible to update storms. AV products are often configured to check for updates upon system startup. Furthermore, the master or gold image may have been created days, weeks, or months previously, which means the client will require substantial updates to become current. If most users start their workdays around the same time in the morning, it can result in dozens, hundreds, or even thousands of virtual desktops all checking for, downloading, and installing updates simultaneously. The same impact can be seen when an entire virtual server pool is started. Managing protection in a dynamic environment Ensuring that all systems have security software installed and populated with the latest updates is a challenge in any organization, but the challenge is magnified in virtual environments. It takes very little effort to deploy a new VM, particularly one duplicated from an existing system or gold image. That image, however, may have outdated or nonexistent protection, leading to a protection gap from the time of deployment until the security client has been installed and/or updated. Similarly, a VM or an entire pool of VMs that is resumed from a suspended state will have protection that was current as of the time it was suspended and will be unprotected against the latest threats until it updates. Once again, VDI environments are especially prone to this issue because of the tendency to start new sessions and frequently new instances at every login or at the start of each day. Coupled with the delays caused by an update storm, this can leave users of virtual desktops susceptible to new threats for a substantial window of time first thing in the morning, just as they are exposing themselves to malware by opening s and browsing the web. A Sophos Whitepaper January
5 Finally, the constant starting, stopping, creating and deleting of virtual machines can make it difficult to clearly identify which machines are protected and with which version of the client software. This can waste IT staff time, make compliance checks difficult, and increase the risk of a machine being inadvertently left unprotected. Two approaches to addressing the challenges There are two fundamental approaches to addressing the issues described above. One involves agentless AV scanning, which removes the security client from the VM in favor of a centralized scanner on the host. The second optimizes the traditional managed antivirus client for virtual environments. Both approaches help mitigate the performance, scalability and management challenges; the main difference is where the scanning takes place centralized on the host or distributed on each VM. These differences have implications for how the systems are managed and how they perform. There are, of course, also differences in how the two approaches are implemented by different vendors. These differences can affect the performance, manageability and level of protection afforded by each vendor s solutions. vshield Endpoint enables automatic, agentless scanning through a central secure virtual machine. Agentless scanning Agentless scanning was popularized by VMware via its vshield Endpoint technology. This technology, included in most recent editions of vsphere, provides a lightweight driver known as a thin agent to install on each VM. The driver communicates through vsphere with a secure virtual machine (SVM) provided by the security vendor and installed on the host. All of the AV scanning takes place in the SVM, leaving the protected VMs free to allocate their resources to other tasks. Agentless scanning offers several advantages over a traditional endpoint AV solution: No security client to install on each VM, saving time and reducing the risk that someone will fail to deploy protection. Lighter use of host resources, as there is no duplication of the client software on each VM. A Sophos Whitepaper January
6 Unlike traditional AV software, agentless scanning scales efficiently, keeping resource use to a minimum. Updates only have to occur at the SVM, not at each client. This eliminates update storms and protection gaps. Coordinated scanning on the SVM avoids excessive use of system resources by limiting the number of files and VMs that are scanned concurrently. Caching reduces scan times and avoids unnecessary resource use and file access delays. VShield routinely makes use of caching at the VM, and Sophos s implementation additionally caches files centrally within the SVM. These substantial benefits do come with some limitations. For example, because the vshield Endpoint driver is available only for Windows, there is no support for agentless scanning of other platforms. Similarly, vshield Endpoint is a proprietary VMware technology, so other hypervisors are not supported. Another limitation is an inherent result of the agentless architecture: vshield Endpoint only supports the scanning of files. Without an agent, there is no way to detect malware running in RAM or to take advantage of advanced security features like HIPS or web filtering. The lack of a local client also limits the ability to clean up a detected infection; in case of an infection, you may be required to use a dedicated cleanup tool, manually remove the malwarend revert to a clean snapshot. User notification, too, is limited by the lack of a local client: if a user tries to open a malicious file, s/he will simply see a Windows error message indicating that the file is not accessible. Also, it is not possible to configure policies per VM, but only per host. This could be an issue in environments with a broad diversity of virtual systems running on a single host, or where VMs cannot be restricted to a specific host. Finally, the use of a central scanner can potentially create a performance bottleneck, if many VMs are requesting on-access scans of files simultaneously. Caching minimizes the risk of this issue in most real-world scenarios, but it could be a concern in certain environments. A Sophos Whitepaper January
7 Optimized client Because agentless scanning is not viable or ideal for every situation, security vendors have also responded by optimizing their antivirus clients for virtualized environments. Optimizations available in Sophos products, for example, include: The ability to stagger scans and/or updates to avoid scan and update storms. Enabling memory sharing on VMware s ESXi hypervisor so total RAM usage on the host is minimized when identical clients are running across multiple VMs. Allowing the client to be built into the gold image without creating duplicate or conflicting entries in the management console as clones are deployed. (This can also reduce boot up storms resulting from clients being deployed automatically by the management server to each new VM.) Keeping definition files and updates small to minimize the time and resources required to update multiple VMs. These optimizations can be supplemented by thoughtful policy configuration. For example, you may wish to group VMs separately from physical devices to allow for different scan, exclusion and cleanup settings. One application of this, for example, would be to disable automatic cleanup of detected malware on virtual desktops, which can easily be discarded and replaced with clean images. Installing a virtualization-optimized client on each VM avoids most of the issues described earlier while providing many of the benefits of traditional security software: Additional layers of protection, including web scanning, HIPS and application control. Support for a broader range of operating systems and hypervisors. Ability to set policies per VM rather than per host, and for the policy to follow the VM if it moves to a new host. There are some limitations to this approach as well. Even with memory sharing, use of hardware resources is likely to be higher (compared to agentless scanning) on hosts with large numbers of VMs. In highly dynamic environments, where virtual machines are routinely created and discarded, update and deployment lag are likely to remain issues. In addition, keeping track of all the VMs in the management console including removing ghost entries for VMs that no longer exist can be time-consuming in these situations. A Sophos Whitepaper January
8 Agentless or optimized client: How to choose Every virtual environment is different. For some, the simplicity and speed of vshield-powered agentless scanning will be ideal. For others, the flexibility and additional protection that come with installing clients on each VM will be critical. There may even be organizations that benefit from using agentless protection on some VMs and optimized clients on others. The following table summarizes the strengths and limitations of each approach and is offered as a guide to help you decide which is best suited to your environment. Note that the exact capabilities will vary from one vendor to another. Agentless or optimized client? Factors to consider Performance Compatibility Management Security End user experience Agentless Scales well for large VMware deployments Marginal performance cost per VM is minimal Performance is optimized out of the box Windows VMs only vsphere only Initial setup is more complex Managed per host, not per VM Some products require a separate console (Sophos s does not) File-level antivirus/anti-malware scanning No AV-specific notifications; users only see OS access denied messages No local configuration, cleanup, or other tools Optimized client For small number of VMs, may use fewer resources than agentless Marginal performance cost per VM is moderate Requires extensive configuration for optimal performance VMs can be any OS with an available client Works with most hypervisors Builds on traditional AV infrastructure Requires greater attention in large deployments File-level antivirus/anti-malware scanning Automated malware cleanup/removal HIPS Web filtering Application control Other features Local client provides notifications Users may have options and tools, as configured by IT As may be evident from the table above, small deployments with just a few VMs on a single host may find that it is easier to manage each VM with an installed client. In contrast, large, dynamic environments are likely to see immediate performance and management benefits from moving to an agentless configuration. In situations where agentless scanning seems ideal for most VMs, but certain machines require a higher level of protection or are running non-windows platforms, a hybrid approach may be warranted. A Sophos Whitepaper January
9 Sophos makes it simple Sophos offers both agentless AV and client-based protection optimized for virtual environments. With centralized management through our intuitive Sophos Enterprise Console, Sophos makes it simple to protect every virtual machine in your organization. Our partnership with VMware, Citrix and Microsoft means that our products have been tested to work seamlessly with the most popular hypervisors. Agentless scanning for virtual servers and desktops Sophos Antivirus (SAV) for vshield is our high performance agentless solution for virtual servers and desktops. Designed to take full advantage of vshield Endpoint, SAV for vshield s advanced caching keeps scan times and resource use to a minimum. The centralized scanner uses our sophisticated threat detection engine coupled with Live Protection, a real-time connection to the correlated threat intelligence provided by SophosLabs. This means every VM is defended against both known malware and previously unseen threats. Unlike some agentless products that require dedicated consoles, Sophos Antivirus for vshield is managed through Sophos Enterprise Console. Protected hosts can be configured alongside managed workstations and servers running our security client. Server protection for Windows, Linux, Mac and UNIX Sophos Server Protection gives you the flexibility to deploy whatever combination of agentless and client-based protection meets your server room needs. Minimize threats to your critical data with agentless SAV for vshield or our high performance Sophos Antivirus for Windows, Linux, UNIX or Mac. Manage all of them through a single interface with Sophos Enterprise Console. Endpoint protection for virtual desktops Endpoint protection solutions from Sophos provide complete, layered security for your virtual desktops. A single, efficient client incorporates antivirus, firewall, HIPS, data loss prevention, web protection and more. Our Virtualization Scan Controller allows you to stagger scan times to avoid scan storms, and the client can be incorporated into your gold image for no-fuss deployment. The Sophos Enterprise Console makes it simple to manage protection for all your virtual desktops, traditional workstations and servers. A Sophos Whitepaper January
10 Conclusion In a fairly short time, virtualization has become an everyday IT tool, thanks to the efficiency and ease of management it brings to the server room. Preserving these benefits while securing VMs against malware, however, has its challenges. Fortunately, thanks to new technology and product enhancements, these challenges can be overcome. Indeed, with agentless scanning, we even see virtualization technology being used to deliver AV protection in a new and more efficient way. With a range of complete security solutions that incorporate Sophos Antivirus for vshield, our optimized endpoint client and our simple-to-manage Sophos Enterprise Console, Sophos offers security made simple for your virtual environment and your entire organization. Sophos Server Protection Get a free trial at sophos.com United Kingdom and Worldwide Sales Tel: +44 (0) [email protected] North American Sales Toll Free: [email protected] Australia and New Zealand Sales Tel: [email protected] Asia Sales Tel: [email protected] Oxford, UK Boston, USA Copyright Sophos Ltd. All rights reserved. Registered in England and Wales No , The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners GH.wpna.simple
Protecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
Simple Security Is Better Security
Simple Security Is Better Security How small and medium-sized businesses can benefit from cloud-based security By Tsailing Merrem, Senior Product Marketing Manager Most vendors seem to assume that small
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Simplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
McAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
Managing BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
Optimize VDI with Server-Side Storage Acceleration
WHITE PAPER Optimize VDI with Server-Side Storage Acceleration Eliminate Storage Bottlenecks for Fast, Reliable Virtual Desktop Performance 1 Virtual Desktop Infrastructures (VDI) give users easy access
Bitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
VIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Encryption Buyers Guide
Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from
WHITE PAPER 1 WWW.FUSIONIO.COM
1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics
VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
VIRTUALIZATION SECURITY IS NOT AN OXYMORON With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next PREPARING FOR THE VIRTUALIZATION ADVANTAGE Widely acknowledged and celebrated, the
JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE
White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case
Trend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
McAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Agentless Security for VMware Virtual Data Centers and Cloud
Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying
Sizing Guideline. Sophos UTM 9.2 - SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances
Sizing Guideline Sophos UTM 9.2 - SG Series Appliances Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos SG Series appliance for your
Storage Solutions to Maximize Success in VDI Environments
Storage Solutions to Maximize Success in VDI Environments Contents Introduction: Why VDI?. 1 VDI Challenges. 2 Storage Solutions Optimized for VDI. 3 Conclusion. 6 Brought to you compliments of: Introduction:
Botnets: The dark side of cloud computing
Botnets: The dark side of cloud computing By Angelo Comazzetto, Senior Product Manager Botnets pose a serious threat to your network, your business, your partners and customers. Botnets rival the power
Sample Mobile Device Security Policy
Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.
Nimble Storage for VMware View VDI
BEST PRACTICES GUIDE Nimble Storage for VMware View VDI N I M B L E B E S T P R A C T I C E S G U I D E : N I M B L E S T O R A G E F O R V M W A R E V I E W V D I 1 Overview Virtualization is an important
Why is the V3 appliance so effective as a physical desktop replacement?
V3 Appliance FAQ Why is the V3 appliance so effective as a physical desktop replacement? The V3 appliance leverages local solid-state storage in the appliance. This design allows V3 to dramatically reduce
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4
The impact of virtualization security on your VDI environment
ENTERPRISE TE The impact of virtualization security on your VDI environment ST ED WITH LO G I N VS I Contents Introduction... 3 What is VDI?... 3 Virtualization security challenges... 3 Choosing the right
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Protecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper
Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
Nimble Storage VDI Solution for VMware Horizon (with View)
BEST PRACTICES GUIDE Nimble Storage VDI Solution for VMware Horizon (with View) B E S T P R A C T I C E S G U I D E : N I M B L E S T O R A G E V D I F O R V M W A R E H O R I Z O N ( w i t h V I E W )
Top Four Considerations for Securing Microsoft SharePoint
Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft
The Benefits of Virtualizing Citrix XenApp with Citrix XenServer
White Paper The Benefits of Virtualizing Citrix XenApp with Citrix XenServer This white paper will discuss how customers can achieve faster deployment, higher reliability, easier management, and reduced
Make Optimizing Security Protection in Virtualized Environments a Priority
G00229651 Make Optimizing Security Protection in Virtualized Environments a Priority Published: 15 February 2012 Analyst(s): Neil MacDonald As the virtualization of servers and desktops becomes more common,
The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Parallels VDI Solution
Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
What s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
Virtual server management: Top tips on managing storage in virtual server environments
Tutorial Virtual server management: Top tips on managing storage in virtual server environments Sponsored By: Top five tips for managing storage in a virtual server environment By Eric Siebert, Contributor
An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability
An Oracle White Paper August 2011 Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability Note This whitepaper discusses a number of considerations to be made when
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Server-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
Getting the Most Out of VMware Mirage with Hitachi Unified Storage and Hitachi NAS Platform WHITE PAPER
Getting the Most Out of VMware Mirage with Hitachi Unified Storage and Hitachi NAS Platform WHITE PAPER Getting the Most Out of VMware Mirage with Hitachi Unified Storage and Hitachi NAS Platform The benefits
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment
Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,
Five reasons why you need Citrix Essentials for Hyper-V now
Five reasons why you need Citrix Essentials for Hyper-V now This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
McAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis
GUIDELINE on SERVER CONSOLIDATION and VIRTUALISATION National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis Introduction There is an ever increasing need for both organisations
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Table of Contents About this Document.... 3 Introduction... 4 Baseline Existing Desktop Environment... 4 Estimate VDI Hardware Needed.... 5
Paragon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
Increasing Your VDI Project s Return on Investment Using Workspace Virtualization
W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,
Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010
W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec
Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models
1 2 Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 3 Introduction What is Virtualization Station? Allows users to create and operate
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Boost your VDI Confidence with Monitoring and Load Testing
White Paper Boost your VDI Confidence with Monitoring and Load Testing How combining monitoring tools and load testing tools offers a complete solution for VDI performance assurance By Adam Carter, Product
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
EMC XTREMIO EXECUTIVE OVERVIEW
EMC XTREMIO EXECUTIVE OVERVIEW COMPANY BACKGROUND XtremIO develops enterprise data storage systems based completely on random access media such as flash solid-state drives (SSDs). By leveraging the underlying
White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition
Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense
