The Virtualization Practice

Size: px
Start display at page:

Download "The Virtualization Practice"

Transcription

1 The Virtualization Practice White Paper: Protect your Virtual and Cloud Environment with Symantec Critical System Protection Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice Sponsored by Symantec Version 1.0 November The Virtualization Practice, LLC. All Rights Reserved. All other marks are property of their respective owners. Abstract For the past few years I ve researched security products in the Symantec booth at VMworld. What are they doing about virtualization and cloud security? Do they have two approaches to end point security? At the time I knew about two strategies, and Symantec had neither, but they all related to Anti-virus and Anti-malware. To my surprise Symantec had another product that was a form of Anti-virus but did not use blacklists, instead it used whitelists, Symantec Critical System Protection (CSP). CSP is an agent-full approach to providing mandatory access controls within Windows and Linux physical and virtual systems. Mandatory access controls are a sought after mechanism to control not only who but what can access critical resources within an operating system while providing an audit log of who or what accessed those critical resources. When mandatory access controls are partnered with sandboxes we end up with a way to protect critical systems from faulty applications and unknown attacks. PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 1

2 Table of Contents I. Introduction... 3 Mandatory Access Control... 3 Symantec Critical System Protection s Approach... 3 II. Anatomy of an Attack and How to Protect Against Them... 4 Anatomy of an Attack... 4 Stops Attacks with Mandatory Access Controls and Sandboxes... 6 III. Placing Symantec Critical System Protection within Your Environment 6 Host Attestation... 6 Manage Mandatory Access Controls with Symantec Critical System Protection... 7 What to Protect... 7 Recommended Placement of Symantec Critical System Protection... 8 IV. Closing Thoughts V. About The Virtualization Practice VI. VII. About Symantec References PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT

3 I. Introduction Symantec Critical System Protection (CSP) does not require any virus, malware, or attack signatures to work, as it is a mandatory access control system similar in nature to the United States National Security Agency s Security Enhanced Linux or what is commonly known as SELinux today. Unlike SELinux, CSP has a well-designed and relatively easy to use management interface that spans hosts and operating systems. But what really is mandatory access control and why do we want it? Mandatory Access Control Mandatory Access Control is described on Wikipedia ( Mandatory_access_control) as: mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, etc. Subjects and objects each have a set of security attributes. At the lowest level of a single operating system, MAC denies non-privileged subjects from accessing privileged resources. As an example, consider the case were a user runs Internet Explorer? The user is the first subject who access the file system to execute Internet Explorer which is a new subject that attempts to contact various resources: DNS, the file system (for caching), and ports on remote servers. In addition, DNS is a subject that attempts to access ports on your DNS server, the local file system for a local hosts file, and logs data to a logging server or the local host. At the very least we have 3 possible subjects and many resources to access. Each of these subjects has a set of roles associated with them (i.e. Domain User), and each resource has a set of access controls associated with them. MAC is a part of a robust role based access control (RBAC) mechanism. In this one example, we have many subjects and many resources. For each subject there is a set of resources they are allowed to access and for each resource there is a set of authentication rules associated with them. If we take DNS we can set rules that limit communication to just outgoing from any port to port 53 using UDP or TCP on a specific server. Any attempt to change these rules would result in a defined failure mode: being clamped to the defined rule, rejecting the request, or allowing but logging the requested action. In all cases, the attempt by the subject to violate MAC policies would be logged for immediate (if it is egregious enough) or later analysis. Symantec Critical System Protection s Approach Traditional MAC however still allows you direct access to a file system, while limiting what you can see and/or do. This is where CSP differs from standard MAC and the SELinux approach. Instead of allowing a subject direct access to a resource from a subject executable it builds a sandbox around the subject executable. The sandbox adds yet another layer of protection between the subject executable and the file system that it could be using. In this way, even if the subject was allowed to manipulate the file system, only accepted file system manipulations would be allowed but they would write to the sandbox. Only the true files placed in the sandbox for PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 3

4 access by subject would be written to disk. Consider Microsoft Word, in general it has access to the entire Windows file system, but with CSP we could literally limit what Microsoft Word could access by only allowing it to see a specific directory. While an attack within a Microsoft Word document would attempt to write outside the specific directory and would succeed, it would instead write to the sandbox, which is thrown away when Microsoft Word exits. Meanwhile, you can write to allowed files at any time. CSP not only has a sand box that surrounds the object with respect to file systems, it also has a similar sandbox that surrounds network ports. In this fashion both approaches that attackers commonly take are covered. There is a robust set of rules that can be applied using CSP that will enhance the security of your virtual and physical machines. II. Anatomy of an Attack and How to Protect Against Them Before we can decide how to use CSP we need to understand the anatomy of an attack. At this year s VMworld 2012, CSP was demonstrated by attacking an unprotected system using a standard attack against Windows systems. Then CSP was enabled and the same attack was propagated and even though the attack previously succeeded, which generally means attackers have put on systems root kits, backdoors, and other tools, this time the attack failed outright. CSP protected the system even if previously attacked. So what is the anatomy of an attack? Anatomy of an Attack Figure 1: Path of an Attack 4 PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT

5 An attack can propagate through several means. In Figure 1, taken from The Virtualization Practices Secure Hybrid Cloud Reference Architecture ( we can see two immediate attacks points, From Outside and To Clouds (which is also From Clouds). While these could be attacked via brute force mechanisms, it is not the most obvious attack point. Let us instead consider a phishing attack which sends to a group of administrators, something that interests them either as an advertisement on a website or an included . So those users are sitting on their Admin Workstation and open up a seemingly innocent document or advertisement. From there the attack is launched. The Admin Workstation is soon infected and the attack could propagate to anywhere that Administrator attempts to reach. Which is shown via the bolded lines within Figure 1. If the VM that is the end point of this path is a file server for example, the administrator, who has full privileges to modify the contents of that file server, could become an unwitting accomplice to the attack and help propagate the attack. Ask yourself: What is the difference between an administrator and a very good electronic copy of an administrator? Figure 2: What is Difference between a Real Admin and Electronic Copy? Is it obvious in Figure 2, which is the original picture and which is not the original picture? One may assume the picture on the right is the copy, but is it? The same holds true for administrators and electronic copies of administrators as well as users and electronic copies of users. Users however should already be locked down to a certain extent, but even so, new virus, malware, and attacks show up every day. So if your system is not originally configured to remediate all known attacks, old attacks will still propagate. However, it is the unknown and new attacks for which we do not KNOW the footprints. Due to that, we need a better way to protect our environments. An administrator currently has unparalleled access, one we grant to them to do their daily work. Given this existing access, an administrator or electronic copy of an administrator can reach anything that administrator is allowed to reach, which on some systems is everything and anything. Because they have access to everything, new attacks can take advantage of that and follow all paths a normal administrator will take, even through existing security devices like physical and virtual edge firewalls, virtual introspective firewalls, virtual switch protections, and eventually the current protections that reside on a guest (such as anti-virus and anti-malware PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 5

6 agents). Why because we already granted the administrator the rights to go down those paths. Yet the payload transferred over the network could contain new and more deadly attacks. Stops Attacks with Mandatory Access Controls and Sandboxes Mandatory Access Controls and Sandboxes protect your environment from such new and unknown attacks. Attacks will come over well known, well supported, and allowed paths such as port 80 or even port 443. We may limit traffic in a firewall to only allow port 80, but since we are allowing that traffic it is perfectly reasonable to continue to allow regardless of payload. However, we can also allow protocol analyzers or layer 3 firewalls, these see HTTP or encrypted HTTPS traffic and once more allow the payload to pass. In essence, security is setup to allow what is considered to be normal access as well as what is considered to be unknown traffic (as it may be encrypted), or may look like standard HTTP traffic. While Administrators should be able to access tools to do their jobs, those tools are subjects that have their own access controls and will use their own sandboxes to protect the environment further. III. Placing Symantec Critical System Protection within Your Environment CSP is a tool that ends up being the final line of defense for such unknown attacks while granting a finer level of control of what aspects of critical systems an administrator and user can access. For example, normally an administrator is required to update an application package or even patch the system. With MAC we can create separate users who are allowed to update the application and the system while removing the ability from the administrative user. In this way we also gain a better understanding of who did what when where and how, which is the goal of any audit logging software. However, that is not all CSP does. CSP can add in attestation, or verification, that configuration options are as expected for a number of different systems. So not only do we have MAC that can be applied to several subjects, we also have attestation for hosts and critical systems. While, CSP does not read OVAL/CPE/XCCDF style checks it does have many of the same capabilities using a proprietary set of input data. So the question becomes where to we place Symantec CSP within your virtual and cloud environments? Host Attestation Symantec CSP provides as part of its user interface a mechanism to verify that the virtualization host s configuration is set per policy. Currently this functionality is only available for VMware vsphere. Host attestation is a fairly large security concern, as you cannot harden the hypervisor, just the surrounding management constructs. But wait all the security tools say they protect the hypervisor? Actually, they do not, they protect some aspect that surrounds a hypervisor such as the network, virtual machines, guest operating systems, or the management constructs. No security tool can reach into the virtualization host to directly protect the hypervisor; it is buried 6 PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT

7 behind all the other constructs it creates. As such, we need to pay close attention to those constructs and the management construct is the most crucial of these. But not only must we understand how each individual VMware vsphere host configured, we need to look at the entire cluster or data center of hosts (as defined by VMware vcenter). Which also implies we need to attest the hardening of VMware vcenter in addition to each host. But what about the database that VMware vcenter uses, auto deploy hosts, log aggregators, update manager, and other VMware management constructs that are used to manipulate our virtualization hosts? All these need attestation around their configuration and adherence to security policy. We can look at just a single VMware vsphere host, but we will miss the bigger picture that is the virtual environment. Our scope cannot be limited in view as we are protecting the entire virtual environment that often layers management on top of management. This leads to use of delegate users are all levels, which make determining who did what, when, where, and how difficult at best. This also implies, that delegate users are often granted more access than they should be allowed. So we need to provide attestation of more than just the vsphere hosts but also vcenter, and all other management constructs above vsphere. CSPs functionality to provide attestation to vsphere hosts and vcenter Windows based installations and provides two parts of the attestation puzzle. CSP therefore requires access to vcenter and vsphere hosts. Unfortunately, as of this writing, attestation is not provided for the appliance version of vcenter. Such access provides a possible attack point, as does the layering of management and delegate users. What confounds the problem is that the security team will often be the team deploying CSP and not the virtualization team. So how do we grant this access without imposing impossible to use draconian security practices? Manage Mandatory Access Controls with Symantec Critical System Protection Symantec CSP s management console provides a mechanism to also manage your mandatory access control policies. Since the security team will configure these policies we should place the management components in a place within our environment to which the security team has access. However, if the Mandatory Access Controls will be applied to Windows and Linux based virtualization management constructs, the management tool must also be able to access those constructs to impose policy. What to Protect The next issue about placing Symantec CSP within a virtual environment is what to protect with it. Should we protect everything? Or are we looking at protecting only the critical systems. There are several schools of thought on this, but the first thing we need to do with Symantec CSP is realize that its protection mechanism uses an agent within each guest OS or physical system to be protected, as such it will not protect the management construct that is built into any vsphere hypervisor. However, it could be installed on Windows running Hyper-V, Linux systems running KVM, Citrix XenServer, or even the Open Source Xen. Why all the others and not VMware vsphere? Because the others use standard operating systems (no matter how just enough and small) as PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 7

8 part of their management constructs and VMware vsphere ESXi is not, in addition, there needs to be a special build of the agent just for ESXi, which at this time does not exist. Could it work on older versions of VMware vsphere ESX? There is a possibility given that ESX has a full GNU/Linux environment that has its own kernel based on Red Hat Enterprise Linux. Minimally, what needs to be protected within a data center is a fairly short list however, depending on your requirements, more could be required: Windows or Linux virtualization management consoles such as VMware vcenter installed into a Windows operating system, Citrix XenConsole running upon Linux, Microsoft System Center running within Windows, as well as other management tools that directly touch any virtualization host Jump Machines used by administrators to access Windows or Linux virtualization management consoles accounting for all the specialized tools used within these Jump Machines such as the VMware vsphere Client, Browsers to access other management tools, PowerShell and other virtualization software development kits (SDKs), third party tools that access the management constructs Active Directory (or any other form of Directory Server) Domain Name Service (DNS) servers Agent Management Servers (ASM) for agent-less or agent-full anti-virus and anti-malware, CSP itself Recommended Placement of Symantec Critical System Protection So CSP requires an agent to be installed on quite a few virtual machines or physical hosts per our list above, but also requires access to the virtual environment management constructs to provide attestation (at least for VMware vsphere). So how do these fit into the environment? In Figure 3, we have augmented the reference architecture to include the CSP Management appliance (labeled CSP) in dark purple, and highlighted which systems should have the CSP agents installed (purple outlined green representing a collection of agents). Note we have installed CSP agents into every VM within our DMZ, all administrative Jump Machines, vcenter, and all Enterprise Management and nearly all Security Management tools. Those not augmented with CSP agents for Mandatory Access Controls and Multi-layer Security are systems in these trust zones that are considered appliances and therefore black boxes. However, this still does not account for how the CSP management tool can provide attestation of the virtualization management 8 PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT

9 constructs. Figure 3: With CSP and CSP Agents To do this, we need to manipulate to of our virtual environment defense in depth constructs that are highlighted with a lighter red within a red border and are named vfw and Proxy. The highlighted virtual firewall would need to allow CSP Management attestation commands to reach vcenter and the vsphere Consoles, which can only be done when passing through the highlighted proxy (which is currently only the HyTrust Appliance). These two subsystems would control the access to those all-important management constructs. Ideally, such packets would also be encrypted which would require more security to be put into place. Which is what we have done in Figure 4. By adding the items highlighted in a dark brick red we can create an encrypted tunnel from one vfw to another vfw. VMware vcloud Network and Security Edge Gateways support such encrypted tunnels between gateways, as do other virtual firewalls. In this fashion, the CSP management tool could send its attestation request to the vnetwork Distributed Switch which would forward it to the Edge Gateway which would contain one end of the tunnel over which this traffic would be sent to the other Edge Gateway which would decrypt it and allow CSP traffic to contact either vcenter or the vsphere hosts themselves. In this fashion, high value security data and connectivity would be managed, encrypted, and secure in motion from the rest of the network. This way, the security team could control its component, which is CSP, while the virtualization team would allow the necessary access. PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 9

10 Figure 4: Additional Security, Encrypted Tunnels Alternatively, we would need a proxy service from CSP that would live within the Virtualization Management trust zone, which would communicate back to the CSP manager within the security zone. While such a proxy is possible and depicted in Figure 3, such a proxy does not currently exist. Which limits how and where CSP can be deployed within your virtual environment if you wish for its attestation features. If you do not require attestation, but wish to employ its mandatory access controls, then you will not need much more than the CSP manager to manage the agents within each of the critical systems. What that list of critical systems is however, depends on each organization, but the minimal set within a virtual environment will not change. IV. Closing Thoughts Symantec CSP provides two clear benefits. The first is for compliance (attestation) and the second is what I would consider the last line of a defense-in-depth. The attestation component is fairly easy to understand and demonstrate as the product runs a set of checks against a system and reports back on whether or not the system meets some compliance standard. The unfortunate aspect of CSP s attestation is that it uses a proprietary format instead of a standard OVAL or XCCDF format. Regardless of standard, attestation is a major requirement for all compliance requiremens. 10 PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT

11 The last line of a defense-in-depth is much harder to demonstrate, as you are required to understand the inner workings of an attack as well as the inner workings of the application to be protected. The last line of defense-in-depth is a mixture of application, user, and resource whitelisting provided by mandatory access controls and sandboxing technologies. In this way, the well-known trusted usage paths and patterns can be allowed while protecting from the unknown attacks that try to take a system, application, or resource outside the well-known trusted usage paths and patterns. For critical systems, and this could be argued for all systems, this level of protection is required moving forward. It is ultimately required for anything that manages the complex virtual or cloud environments as well as for other critical systems these management tools touch. An equally much needed place for such protection, is a DMZ and the internal components those systems can touch. Therefore Symantec CSP becomes a new component of your existing defense-in-depth. V. About The Virtualization Practice The Virtualization Practice is the leading online resource of objective and educational analysis focusing upon the virtualization and cloud computing industries. Edward L. Haletky is the author of VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2 nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. VI. About Symantec Symantec protects the world s information, and is the global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our industry-leading expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at VII. References Edward L. Haletky. VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment, Prentice Hall PTR; 1 edition (June, 2009) Edward L. Haletky. Secure Hybrid Cloud Reference Architecture, The Virtualization Practice, LLC ( Version 1.1 (September 2012) PLACING SYMANTEC CSP INTO THE VIRTUAL AND CLOUD ENVIRONMENT 1 1

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Security Requirements of Hybrid Clouds: A Product Comparison! Edward L. Haletky Analyst Virtualization and Cloud Security! The Virtualization Practice Sponsored

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: A Look at Trend Micro Deep Security 7.5 Edward L. Haletky Analyst March 2011 2011 The Virtualization Practice. All Rights Reserved. Abstract Trend Micro Deep Security

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««; Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

Measuring Hypervisor Footprints: Assessing Risk

Measuring Hypervisor Footprints: Assessing Risk Measuring Hypervisor Footprints: Assessing Risk Edward L. Haletky The Virtualization Practice, LLC Author of: VMware vsphere TM and Virtual Infrastructure Security: Securing the Virtual Environment Assessing,

More information

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

PICO Compliance Audit - A Quick Guide to Virtualization

PICO Compliance Audit - A Quick Guide to Virtualization WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Update 2 Installation Guide Applies to the following editions: Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com

More information

VMware: Advanced Security

VMware: Advanced Security VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191 Index A Active Directory Restore Mode (DSRM), 12 Application profile, 293 Availability sets configure possible and preferred owners, 282 283 creation, 279 281 guest cluster, 279 physical cluster, 279 virtual

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

GRAVITYZONE UNIFIED SECURITY MANAGEMENT GRAVITYZONE UNIFIED SECURITY MANAGEMENT Quick Start Guide GravityZone Unified Security Management Quick Start Guide Publication date 2013.02.22 Copyright 2013 Bitdefender Legal Notice All rights reserved.

More information

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016 Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0

vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the

More information

vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04

vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012 Presentation for ISACA Chapter NL Auditing Virtual Servers VMware: Security and Operations Gert-Jan Timmer 3. September, 2012 Auditing Virtual Servers: Vmware: Security and Operations Presentation today:

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Virtualization & Cloud Computing (2W-VnCC)

Virtualization & Cloud Computing (2W-VnCC) Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Using Application Performance Management for Security Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice Sponsored by New Relic

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack This vendor-independent research contains a product-by-product comparison of the most popular cloud platforms (along with

More information

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

App Orchestration Setup Checklist

App Orchestration Setup Checklist App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App

More information

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

Shavlik NetChk Protect 7.1

Shavlik NetChk Protect 7.1 Shavlik NetChk Protect 7.1 New s in Shavlik NetChk Protect 7.1 Asset Management Define asset scans for physical and virtual machines for Software Assets, Hardware Assets, and Virtual Machine Assets. This

More information

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1) Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware vshield Zones R E V I E W E R S G U I D E

VMware vshield Zones R E V I E W E R S G U I D E VMware vshield Zones R E V I E W E R S G U I D E Table of Contents Getting Started..................................................... 3 About This Guide...................................................

More information

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Version 1.15. Kaspersky Lab www.kaspersky.com FOR INTERNAL USE ONLY

Version 1.15. Kaspersky Lab www.kaspersky.com FOR INTERNAL USE ONLY Version 1.15 Kaspersky Lab www.kaspersky.com Table of Contents Introduction... 4 Virtualization... 4 Hypervisors... 4 Full virtualization and para-virtualization... 6 Virtualization platforms... 7 Protection

More information

WatchGuard Training. Introduction to WatchGuard Dimension

WatchGuard Training. Introduction to WatchGuard Dimension WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Control your corner of the cloud.

Control your corner of the cloud. Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing

More information

Security Overview Introduction Application Firewall Compatibility

Security Overview Introduction Application Firewall Compatibility Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2014.11.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

vcloud Automation Center Support Matrix vcloud Automation Center 5.2 vcloud Automation Center Support Matrix vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

User Security Education and System Hardening

User Security Education and System Hardening User Security Education and System Hardening Topic 1: User Security Education You have probably received some form of information security education, either in your workplace, school, or other settings.

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Security Whitepaper. NetTec NSI Philosophy. Best Practices Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security

More information

Reference Testing Guide for Deep Security

Reference Testing Guide for Deep Security A Trend Micro Technical White Paper June 2015 Reference Testing Guide for Deep Security >> This reference testing guide contains information and instructions to help validate a Trend Micro Deep Security

More information