Virtualization and Cloud Computing
|
|
|
- Julian Lawson
- 10 years ago
- Views:
Transcription
1 Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr.
2 Virtualization Purpose of Presentation: To inform entities about the importance of assessing the benefits and risks related to the incorporation of virtualization and cloud computing. To provide guidance for entities on assessing and incorporating virtualization and cloud computing into production and test environments. To assist entities with information about developing and maintaining a detailed documentation set that demonstrates how virtualization is implemented. What are auditors looking for? A logical approach and plan toward compliance. Practical steps toward compliance that can be demonstrated. Verification for how the entity mapped its Information Technology (IT) security controls to the Critical Infrastructure Protection (CIP) Standards. 2
3 Virtualization continued What is virtualization?.virtualization is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more concepts or technologies such as hardware and software partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others. Source: 3
4 Virtualization - continued Why are companies moving into virtualization? Reason Benefit Sever Consolidation Legacy Applications Build Secure Computing Platforms Create Operating Systems Simulate hardware and hardware configuration Savings in hardware, environmental costs, management, and administration. Ability to run legacy applications that will not run on newer hardware and/or OS. Provides secure, isolated sandboxes to run untrusted applications. Resource limits and guarantees. The illusion of running multiple processors and to simulate networks of independent computers. Task Management System migration, backup, and recovery. 4
5 Virtualization continued Four main areas where virtualization is implemented Server-Based Storage-Based Network-Based Virtual Desktop Infrastructure (VDI) 5
6 Virtualization continued Defining Some Terms: Host: Virtualization platform running hypervisor software. Hypervisor Software: A central program used to manage virtual machines (guests) within a simulated environment (host). Common host platforms: VMware ESXi, Microsoft Hyper-V, Citrix XenServer, Red Hat KVM, and others. Computer resources such as Random Access Memory (RAM), processors (CPUs), and storage are emulated through the host environment. 6
7 The Hypervisor Primary component of a server virtualization platform. Often referred to as the virtual machine monitor (VMM). Central nervous system within a virtual infrastructure. Manages the host s underlying hardware resources and handles all guest-initiated operating system (OS) and application requests for CPU, memory, I/O, and disk resources. 7
8 Virtualization Defining Some Terms: Virtual guest, virtual machine (VM), or guest system: A VM is a group of files that represents a hardware-based computing platform, complete with storage, memory, and configuration components. 8
9 Server Virtualization Virtual Host: is a physical server with virtualized layer Virtual Machine: Each guest OS running on the host Virtual Machines (Virtual OS and Apps) App App OS OS Virtualization layer (The Hypervisor) Physical Layer 9
10 Storage-Based Virtualization Multiple storage devices into what appears to be a single storage unit. Storage virtualization helps perform tasks like backup, archiving, and recovery in less time. Storage virtualization can be implemented using software and hardware hybrid appliances. Must adhere to the CIP Standards Verify technical and procedural controls all the way down to the LUN (Logical Unit Number) of the Storage Area Network (SAN). 10
11 Server Virtualization MES Server Win 2003 ERP Server Win 2008 Traditional Servers SCADA Server Linux MES Server Win 2003 ERP Server Win 2008 SCADA Server Linux H y p e r v i s o r Virtualized Server Virtualized Server 11
12 Virtualization VDI Virtual Desktop Infrastructure (VDI) consists of virtualizing desktops into images that run on centralized hypervisor platforms. Similar to server virtualization, but there are many differences in how the images are created, managed, and in some cases, secured. VDI desktops can be accessed in a number of ways. The most common access methods are standard Remote Desktop Protocol (RDP) services. 12
13 Benefits of VDI Operational improvements and cost savings. Bring your own device (BYOD) Employees bring their own laptops and other computing devices to work. VDI can help accomplish this because the operating system, applications, and data access can be controlled by central policies and security technologies within VDI images while a companycontrolled client can be installed on the employee's device to permit access. 13
14 Benefits of VDI continued Security VDI can reduce the cost of compliance and security for desktops. VDI supports centralized policy control, ephemeral (short-term) desktop images, and granular and manageable change and configuration management tools and processes. Fighting malware and responding to desktoprelated incidents can be easier because all of the infrastructure is centrally located and controlled. Virtual machines can be easily deleted and created. 14
15 VDI Challenges Operational Issues Bandwidth When a large number of users need to access desktop images simultaneously, the amount of bandwidth consumed can be significant. Power A large number of desktop images in use simultaneously could lead to major power spikes and an increase in overall consumption. 15
16 Network-Based Virtualization Hypervisors can provide networking capabilities that allow individual guest OSs to communicate with one another while limiting access to the external physical network. The network interfaces that the guest OSs see may be virtual, physical, or both. 16
17 Network-Based Virtualization continued Network Bridging The guest OS is given direct access to the host s network interface cards (NIC) independent of the host OS. Network Address Translation (NAT) The guest OS is given a virtual NIC that is connected to a simulated NAT inside the hypervisor. As in a traditional NAT, all outbound network traffic is sent through the virtual NIC to the host OS for forwarding, usually to a physical NIC in the host system. Host Only Networking The guest OS is given a virtual NIC that does not directly route to a physical NIC. In this scenario, guest OSs can be configured to communicate with one another and, potentially, with the host OS. 17
18 Network Virtualization Technologies Virtual Switching Systems (VSS) Virtual Switches (VSwitch) Virtual Private Network (VPN) Virtual Storage Area Network (VSAN) Virtual Routing and Forwarding (VRF) Virtual Local Area Networks (VLAN) Virtual Port Channels (VPC) Virtual Device Context (VDC) 18
19 Network Virtualization Device Clustering Allows multiple physical devices to be combined into a larger logical device. Combines two physical switches into a single logical switch (e.g., VSS series). The main benefit of clustering techniques is they allow systems to scale beyond the size of a single system. Complexity of the overall system design does not increase. 19
20 Virtualization and CIP All CIP Standards Apply! Virtual Networks need to be just as secure as Physical Networks. 20
21 Virtualization and CIP continued VMs should be treated no differently than physical machines and all CIP Standards apply: CIP version 3 CIP version 5 Identification: CIP-002 Least Privilege Access: CIP-003 Change Control/Configuration Management: CIP-003 Personnel and Training: CIP-004 Segregation (ESP): CIP-005 Physical Security: CIP-006 The same as CIP version 3, including CIP and CIP Testing, Security Patching, and Malicious Software Prevention: CIP-007 Proper Disposal/Redeployment: CIP-007 Incident Response: CIP-008 Recovery Plans: CIP
22 Virtualization and CIP Questions CIP-002 Is the Hypervisor hosting Critical Cyber Assets (CCA) VMs? If the answer is yes, then the Hypervisor is a CCA too. Since the Host OS interacts with the Guest OS via the Hypervisor, then the Hypervisor is in scope. ALL VM Cyber Assets on the Hypervisor, to include non-ccas should be considered in-scope of CIP Standards. CIP-003 Do you have authorized administrators managing the Hypervisor and VMs in scope? CIP-004 Does the administrator have the specialized security virtualization training? CIP-005 Creating on-the-fly virtualized environments may cause security risks to the ESP. 22
23 Virtualization and CIP Questions continued CIP-005 (Continued) Does every virtualized CCA reside within an ESP? VMs that are functioning as Access Control and Monitoring System. Virtual IDSs Do any hosts or VMs connect to corporate (non-esp) networks? How is remote management performed for the Host and VMs? CIP-006 Are the Hypervisor and the VMs located within the Physical Security Perimeter? CIP-007 Are all security patches/upgrades for the Hypervisor and VMs assessed for applicability? 23
24 Virtualization and CIP Questions continued CIP-007 (Continued) How is the process of testing VMs different from physical cyber assets? How is a complex password implemented on images snapshots? Verify security of those images. Automated tools required to logging monitors VMs. CIP-008 Make sure VMs follow the same rules as physical machines. How does the Incident Respond Plan apply to virtualization? Retention of evidence (images). Forensic purposes (images can be preserved). CIP-009 Backing up and restoring. Hypervisor, host OS, and guest OS. 24
25 Virtualization Threats to a Virtualized Environment 25
26 Threats to a Virtualized Environment Teams must evaluate and assess Vulnerabilities that may exist in the technology. Threats to the environment could exploit those vulnerabilities. Potential impact of security events. 26
27 Threats to a Virtualized Environment continued Operational Threats: VM sprawl: Virtual machines can be deployed in seconds, making it easy to create unapproved VMs (for example, short-term testing systems). VMs created on-the-fly might not be patched, updated, or configured properly. Lack of visibility into virtual environments: Many virtual network environments are not monitored adequately. Many virtual networks have quite a bit of internal traffic that is not being monitored adequately by external security and network tools. 27
28 Threats to a Virtualized Environment continued Operational Threats - continued Separation of duties not maintained: Separation of duties for people managing systems, networks, and applications in a virtual environment is often lacking. Different teams may not understand how they should manage their parts of the virtual infrastructure. Granting unilateral access to any one group could be a big security risk. 28
29 Virtualization Change and configuration management is a key area to focus on for virtualized organizations. Configuration details Network settings Security-specific settings 29
30 Malware-Based Threats VM-Aware Malware: Various strains and versions of bots, worms, rootkits, and other malicious code formats are capable of determining whether they are running on a physical or virtual host by looking at memory and hardware attributes, memory locations, and process and function behavior. 30
31 VM Escape Threat VM Escape: Malicious code runs within a VM and is able to break out onto the underlying host. In a VM escape, trust zones are violated, access controls are circumvented, and the confidentiality and integrity of Elastic Sky X (ESX) hosts is suspect as soon as it happens. Directory Traversal Attack Vmchat Vmcat VM Drag-n-Sploit VMftp 31
32 Virtualization Challenges Adapting Anti-malware Tools for Hosts and Guests Two primary concerns for anti-malware protection include host scanning and guest scanning. The main issues are performance impacts and integrity problems that result from scanning particular virtualization-specific file structures such as virtual machine disk (VMDK) files in VMware environments. 32
33 Cloud Computing Cloud Computing 33
34 Cloud Computing Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (NIST, 2010). In the simplest of terms, cloud computing is basically internet-based computing. 34
35 Cloud Benefits Pay as you go (Utility Computing Systems). On-demand self-service. Shared resources. Focus on business rather than IT. Elasticity-Scale up and down based on business need. Cloud computing introduces a level of abstraction between the physical infrastructure and the owner of the information being stored and processed. The large variety of devices that can connect to the internet, such as PDAs, mobile phones and handheld and static devices, all expanded the number of ways the cloud can be accessed. What about the Service Level Agreement (SLA)? 35
36 Cloud Models Deployment Models Public cloud Private cloud Hybrid cloud Community cloud Service Models IaaS (Infrastructure as a Service) PaaS (Platform as a Service) SaaS (Software as a Service) 36
37 Cloud Models Service Models Enterprise Resources E-Commerce Office Automation Knowledge Management Operating System Groupware Web Hosting Developers Studios Accounting Systems Network Storage OS Database Management Hardware 37
38 Risks, Threats, and Vulnerabilities Organization Risks, Threats, and Vulnerabilities Non-Cloud Specific Cloud Specific Technical Legal Other 38
39 Risks, Threats, and Vulnerabilities continued Organization Risk: Loss of business reputation due to co-tenant activities (or the tenants sharing the same resource), and any organizational change that can happen to the cloud provider (as a business organization) including provider failure, termination or acquisition. Technical Risk: The technical risks classification includes problems or failures associated with the provided services or technologies contacted from the cloud service provider. Legal Risk: Issues that surround data being exchanged across multiple countries that have different laws and regulations concerning data traversal, protection requirements, and privacy laws. Examples of such risks include, but not limited to, risks resulting from possible changes of jurisdiction and the liability or obligation of the vendor in case of loss of data and/or business interruption. Other: Data Leakage on Upload/Download: When the data is being transferred across the cloud unencrypted, it is subject for traffic sniffing, spoofing, and man-in the-middle attacks, amongst others. 39
40 Cloud Computing and CIP CIP-002: Identification of CAs, CCAs, EACMS and PCS CIP-003: Access Control Management CIP-004: Information Protection Program, cloud computing training and PRAs CIP-005: Design and protection of the Electronic Security Perimeter CIP-006: Design and protection of the Physical Security Perimeter CIP-007: Security patches/upgrades on cloud servers assessed for applicability CIP-008: How is the Incident Respond Plan applies cloud computing CIP-009: Backing up and restoring Critical Cyber Assets 40
41 Questions 41
42 Virtualization and Cloud Computing References: Information Resources Management Association, USA. Grid and Cloud Computing, Safari Online Books Shackleford, Dave. Virtualization Security: Protecting Virtualized Environments Safari Online Books Tiso, John. Designing Cisco Network Service Architectures Safari Online Books
Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
Cloud Computing. Chapter 8 Virtualization
Cloud Computing Chapter 8 Virtualization Learning Objectives Define and describe virtualization. Discuss the history of virtualization. Describe various types of virtualization. List the pros and cons
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure [email protected]
Protecting the Irreplacable November Athens Ian Whiteside, F-Secure [email protected] PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the
[email protected] 2009 STREAM FRBC
Virtualization ti Dave Balka [email protected] Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
Securing the Physical, Virtual, Cloud Continuum
Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Restricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
Virtualization and Cloud Computing
Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Cloud Optimize Your IT
Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
TechTarget Windows Media
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed
Building the Virtual Information Infrastructure
Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012
Presentation for ISACA Chapter NL Auditing Virtual Servers VMware: Security and Operations Gert-Jan Timmer 3. September, 2012 Auditing Virtual Servers: Vmware: Security and Operations Presentation today:
Journey to the Private Cloud. Key Enabling Technologies
Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu
Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Virtualization and Disaster Recovery
Virtualization and Disaster Recovery Ray Trygstad Director of Information Technology, Associate Director, Information Technology & Management Degrees Illinois Institute of Technology NetSecure 09 March
Windows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com
Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Guide to Security for Full Virtualization Technologies
Special Publication 800-125 Guide to Security for Full Virtualization Technologies Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Paul Hoffman NIST
Hyper-V R2: What's New?
ASPE IT Training Hyper-V R2: What's New? A WHITE PAPER PREPARED FOR ASPE BY TOM CARPENTER www.aspe-it.com toll-free: 877-800-5221 Hyper-V R2: What s New? Executive Summary This white paper provides an
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
VMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
Virtualization of CBORD Odyssey PCS and Micros 3700 servers. The CBORD Group, Inc. January 13, 2007
Virtualization of CBORD Odyssey PCS and Micros 3700 servers January 13, 2007 61 Brown Road Ithaca, NY 14850 (607) 257-2410 Document Revision: 2 Last revised: January 13, 2007 Changes are periodically made
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1
Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 1 DEFINITIONS AND INTERPRETATIONS 1.1. Words or phrases used with capital letters in this Service Schedule shall have the same meanings
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Running vtserver in a Virtual Machine Environment. Technical Note. 2015 by AVTware
Running vtserver in a Virtual Machine Environment Technical Note 2015 by AVTware Table of Contents 1. Scope... 3 1.1. Introduction... 3 2. General Virtual Machine Considerations... 4 2.1. The Virtualization
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
SCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
CA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Servervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH [email protected] Virtualization Wave is Just Beginning Only 6% of x86
RUNNING vtvax FOR WINDOWS
RUNNING vtvax FOR WINDOWS IN A AVT / Vere Technologies TECHNICAL NOTE AVT/Vere Technical Note: Running vtvax for Windows in a Virtual Machine Environment Document Revision 1.1 (September, 2015) 2015 Vere
LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING
LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING 2 WARNING The Hacker High School Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Citrix XenServer 7 Feature Matrix
Citrix XenServer 7 Matrix Citrix XenServer 7 Matrix A list of Citrix XenServer 7 features by product edition, including entitlements XenApp and XenDesktop license holders. The most comprehensive application
vsphere 6.0 Advantages Over Hyper-V
v3c Advantages Over Hyper-V The most trusted and complete virtualization platform 2015 Q1 2015 VMware Inc. All rights reserved. The Most Trusted Virtualization Platform Hypervisor Architecture Broad Support
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
Security Virtual Infrastructure - Cloud
Security Virtual Infrastructure - Cloud Your Name Ramkumar Mohan Head IT & CISO Orbis Financial Corporation Ltd Agenda Cloud Brief Introduction State of Cloud Cloud Challenges Private Cloud Journey to
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Virtualization Technologies. Embrace the new world of healthcare
Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Table of Contents. vsphere 4 Suite 24. Chapter Format and Conventions 10. Why You Need Virtualization 15 Types. Why vsphere. Onward, Through the Fog!
Table of Contents Introduction 1 About the VMware VCP Program 1 About the VCP Exam 2 Exam Topics 3 The Ideal VCP Candidate 7 How to Prepare for the Exam 9 How to Use This Book and CD 10 Chapter Format
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
