How To Protect Your Cloud From Attack
|
|
- Kristian Simon
- 8 months ago
- Views:
Transcription
1 A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure
2 Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to Maximize Resources...4 Public Cloud...5 Agent-based, Self-defending VM Security...6 Hybrid Cloud...6 Agentless and Agent-based VM Security...6 Comprehensive, Adaptive, Efficient Cloud Protection...7 Compliance Requirements...8 Conclusion...8 Page 2 of 8 Trend Micro White Paper
3 Introduction Many businesses are looking to the cloud for increased IT agility and cost savings. As businesses develop their cloud infrastructure, security must be part of the groundwork to ensure that cloud servers, applications, and data remain secure in a cloud environment. Often businesses use traditional physical server security in virtual and cloud infrastructure. But this can cause resource contention issues, increase management complexity, reduce virtual machine (VM) densities, and lower expected return on investment (ROI). Virtualization is the foundation of cloud infrastructure, requiring virtualization-aware security to maximize protection and performance. However, moving applications and data into the cloud also introduces unique risks in all three cloud models: private, public, and hybrid. A comprehensive, adaptive, and efficient approach to cloud protection is needed regardless of which cloud model businesses deploy or how their cloud computing needs evolve. This paper discusses each of the three cloud models, their unique security risks, and the security solutions that best address those risks. With the right security, companies can safely implement any of the cloud models, even if those companies are subject to strict data privacy regulations. When selecting a cloud model, businesses should consider how it will impact their business objectives, IT resources, and security and compliance requirements. Page 3 of 8 Trend Micro White Paper
4 Private Cloud Private clouds are based on dedicated hardware that is either located in the businesses data center or outsourced to a third party. The underlying infrastructure is a virtualization environment and IT resources are provided through an on-demand, self-service portal. The automated provisioning is what converts the virtualization infrastructure into a cloud. Different departments can gain access to IT resources through an online catalog and bill-back functions can bill individual departments for their IT resource consumption. The automation of a private cloud can provide companies with IT resource agility, allowing different departments to gain access to computing resources quickly, as needed no longer having to submit a request to IT staff to meet these needs. However, security designed for a cloud environment is integral to ensuring safe cloud computing. With self provisioning, private clouds can quickly pool resources and VMs can be moved to optimize resources. With shared resources, mobile data, and possible VM sprawl, security and visibility are critical to mitigate privacy and compliance risks. VM-Level Security Virtualization serves as the foundation to cloud computing, allowing businesses to make the best use of resources. When extending virtualization into a private cloud infrastructure, the security used on the virtual servers can also be used in a cloud environment. Private clouds make it easy to provision new VMs. And even different departments can have resources that are all housed on the same host physical server. This can create a mixed-trust level environment with applications and data of differing trust levels on a single host server. Providing security at the network level, such as network firewalls or an intrusion prevention system (IPS), will not protect the individual guest VMs from inter-vm attacks. Another security approach might be to route inter-vm communications to a separate physical security appliance but requiring communications to be routed off box through the separate appliance creates performance and security lags. In addition, compliance regulations may require that certain data stay isolated from other VMs and retain restricted access. To address these issues, security must be provided at the VM level. VM-level protection should integrate multiple security technologies, including intrusion prevention, firewall, anti-malware, web application protection, log inspection, and integrity monitoring. Even as VMs are moved or reconfigured to make the best use of resources, these protections can travel with the VM to ensure security and will better equip the VM to protect itself as it moves into riskier environments. Agentless Security to Maximize Resources Traditional physical security on virtual servers saps resources because by nature it is not virtualization aware. When conducting periodic security scans, physical security will initiate a simultaneous scan of all VMs, which significantly degrades host resources and performance. Some traditional physical security solutions recommend randomization or grouping in virtual environments, but these do not solve the problem. Randomization does not help to avoid times of high system usage and requires that a long period of time be reserved for the full scan cycle. Grouping does not allow for the mobile nature of virtualization, requiring reconfiguration when VMs are migrated or cloned. Virtualization-aware technology is needed to minimize resource usage and increase VM densities. Page 4 of 8 Trend Micro White Paper
5 Agentless security in a virtualization-aware solution optimizes virtualization and cloud performance. Because private clouds are based on dedicated hardware, businesses have control of the underlying hypervisors. Agentless security such as agentless antivirus and agentless file integrity monitoring uses a dedicated VM that integrates with hypervisor APIs to conduct security scanning. The security virtual appliance accesses a small footprint driver used by the virtualization software in each guest VM to coordinate staggered updates and scans and does not require a security agent in each VM. Resource-intensive operations, such as full system scans, are run from the separate virtual appliance, maximizing host resources. Using a dedicated security virtual appliance also ensures that VMs always have up-to-date security. Guest VMs are secure when dormant and receive the latest pattern file updates from the security virtual appliance when activated. In addition, agent-less security reduces management complexity because there are no agents to configure or update. Public Cloud With the public cloud, service providers offer computer resources through online services, enabling businesses to quickly configure, deploy, or expand services online and only pay for the resources they use. The public cloud provides better cost savings because of the shared, multi-tenant architecture which makes better use of resources and reduces vendor costs. These cost savings make public clouds especially popular for storage. Companies also use public clouds for projects requiring temporary or varying computing needs because of the pay-per-use approach. They can use the public cloud instead of building out internal infrastructure for only partial or temporary usage. But the shared infrastructure also introduces increased risk and more limited visibility. With Software as a Service (SaaS) and Platform as a Service (PaaS) public clouds, the service provider is responsible for most of the security. But with Infrastructure as a Service (IaaS), the customer is responsible for securing their VMs deployed in the public cloud. In the multitenant environment of IaaS public clouds, businesses do not know what type of applications or data are housed next to their computing resources. In a private cloud, cybercriminals would simply need to gain access to a VM on a host machine to conduct an inter-vm attack. However, in the public cloud, cybercriminals have it even easier they can purchase their own VMs within the shared infrastructure and use these to attack other guest VMs or even try to compromise the hypervisor which controls access to guest VMs. Visibility can also be an issue. Companies may not be able to track who has accessed their data. For example, has the service provider viewed their data? Or have rogue servers accessed their storage volumes? And perhaps cybercriminals have stolen or compromised data through inter-vm attacks. Companies benefit when service providers move data to optimize resource usage because this lowers costs. However, data is often moved without customer knowledge or visibility. When data is moved, prior data storage volumes should be shredded. Yet sometimes data remnants remain, which can expose data to unauthorized sources. And businesses may be oblivious to this unpermitted access. Page 5 of 8 Trend Micro White Paper
6 Agent-based, Self-defending VM Security Without hypervisor control, agent-based security creates self-defending VMs in the multi-tenant environment of the public cloud. Self-defending VMs are needed to prevent inter-vm attacks and maintain VM isolation. In a private cloud, agentless security optimizes resources. However, in a public cloud the service provider is able to optimize resource usage for its customers with economies of scale as well as ease of data motility in the public cloud virtual environment. So, instead, agent-based, self-defending VMs are needed to protect applications and data regardless of what is housed next to the company s computing resources or where the data may be moved. A similar mix of advanced security technologies as mentioned in the private cloud section intrusion prevention, firewall, anti-malware, web application protection, log inspection, and integrity monitoring is needed in the public cloud. Due to the prevailing levels of risk, these protections are even more critical. The integrated server security platform agent travels with the VMs wherever they are stored in the shared IaaS public cloud environment, always maintaining an umbrella of protection over the VM. Hybrid Cloud Hybrid clouds combine the onsite control of a private cloud with the scalability of the public cloud. Businesses can keep more mission-critical data and applications in house while leveraging the cost savings of the public cloud for storage and temporary computing capacity needs. Some technologies even help organizations seamlessly move resources between private and public clouds as needed. Generally a hybrid cloud is considered an on-going deployment across both a private and public cloud, but organizations can also use cloudbursting. This happens when a private cloud does not have sufficient resources and the company bursts out into a public cloud to cover temporary resource needs. Although hybrid clouds allow companies to decide whether to store particular types of application and data in private or public clouds, this creates the largest potential attack surface as resources span both cloud models. Security for hybrid clouds must have flexible deployment options that protect both private and public cloud infrastructures with consolidated management for ease of use. Agentless and Agent-based VM Security The ideal hybrid cloud security solution combines both agentless and agent-based VM security. Agentless security optimizes resources in the private cloud component and the agent-based security creates self-defending VMs in the public cloud. With both deployment options, data and applications are kept safe throughout the hybrid cloud. Both agentless and agent-based security should be integrated in a single platform with consolidated management. A company should be able to manage security for all types of cloud deployments through one console. This allows seamless protection as VMs are moved between private and public clouds, as well as between different service providers. Page 6 of 8 Trend Micro White Paper
7 Comprehensive, Adaptive, Efficient Cloud Protection Trend Micro Deep Security provides a single platform for server, application, and data security across physical, virtual, and cloud servers ideal for protecting private, public, and hybrid clouds. Businesses can tailor their security with any combination of agentless and agent-based protection including antimalware, firewall, intrusion detection and prevention, web application protection, integrity monitoring, and log inspection. The Deep Security platform includes the following modules: Anti-malware Protection defends against viruses, spyware, Trojans and other malware. This module detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair any system damage caused by the malware. Firewall Protection provides a bi-directional stateful firewall with centralized management of server firewall policy and includes pre-defined templates for common enterprise server types. Intrusion Detection and Prevention (IDS/IPS) shields vulnerabilities in operating systems and enterprise applications until they can be patched. Intrusion detection and prevention helps enterprises achieve timely protection against known and zero-day attacks. Deep Security includes out-of-the-box vulnerability protection for over 100 applications. Web Application Protection rules defend against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities, and shields these vulnerabilities until code fixes can be completed. Deep Security enables compliance with Payment Card Industry Data Security Standard (PCI DSS) Requirement 6.6 for the protection of web applications and the data that they process. Application Control rules provide increased visibility into, and control over, the applications that are accessing the network. These rules can also be used to identify malicious software accessing the network or to reduce the vulnerability exposure of your servers. File Integrity Monitoring inspects files, systems, and registry for changes. Integrity monitoring of critical operating system and application files (e.g., files, directories, registry keys and values, etc.) is necessary for detecting malicious and unexpected changes that could signal a compromise of virtual and cloud computing resources. Deep Security file integrity monitoring addresses PCI DSS Requirements and 11.5 as well as other security and data privacy regulations. Log Inspection provides visibility into important security events captured in log files. Log inspection rules optimize the identification of important security events buried in multiple log entries from numerous sources. These events can be aggregated and sent to a stand-alone security system or forwarded to a security information and event management (SIEM) system for correlation with other infrastructure events, reporting, and archiving. To achieve the agentless deployment option of the above modules, Deep Security tightly leverages and integrates with VMware products and APIs. Deep Security was the first product to integrate with VMware vshield Endpoint APIs for agentless anti-malware and agent-less file integrity monitoring (FIM). This vshield integration enables the offloading of anti-malware and FIM processing to a dedicated, security-hardened VM. And by integrating with additional VMware APIs, Trend Micro offers other agentless protection, including HIPS, web application protection, application control, and firewall. In virtual and private cloud environments this agentless security uses the dedicated security VM to eliminate the security agents off the guest VMs and reduce the resource burden on the underlying host preserving performance and increasing VM densities. This agentless approach also reduces administration with no agents to configure or update. Page 7 of 8 Trend Micro White Paper
8 An agent-based option is available for each of the modules as well to allow companies to deploy self-defending VMs in a public cloud environment. Agent-based security also allows the protection to extend to physical servers as well as to virtual desktops while in local mode. The mix of agent-less and agent-based deployment options result in a comprehensive, adaptive, and efficient server security platform. Together the modules in the Deep Security platform protect mission-critical systems, applications, and data to prevent data breaches and ensure business continuity across physical, virtual, and cloud environments. Compliance Requirements Deep Security provides an integrated, cost-effective solution that addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, FISMA/NIST, NERC, SAS 70 and more. This solution provides detailed, auditable reports to support compliance efforts and helps to support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB and PCI DSS. Conclusion Many companies are still in the midst of deploying cloud computing, and cloud requirements will change and evolve for each company over time. Businesses need a solution that will secure their physical, virtual, and cloud servers, application, and data to protect them throughout their journey to the cloud. And with a solution that protects across private, public, and hybrid clouds businesses can select the right cloud deployment for their resource needs and business objectives without being hindered by security risks. Trend Micro provides this type of cloud protection with Deep Security. Deploying protection that travels between physical, virtual, and private, public, and hybrid cloud servers provides better protection, less administrative complexity, and increased performance. As a recognized leader in virtualization and server security, Trend Micro offers proven solutions that will help you accelerate your virtualization and cloud ROI. Visit to learn more about how Deep Security can protect your cloud environments. Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 26 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Smart Protection Network, and Deep Security are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [WP01_Total_Cloud_Protection_150806US] Page 8 of 8 Trend Micro White Paper
Total Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Agentless Security for VMware Virtual Data Centers and Cloud
Agentless Security for VMware Virtual Data Centers and Cloud Trend Micro Deep Security VMware Global Technology Alliance Partner Trend Micro, Incorporated» This white paper reviews the challenges of applying
Trend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Comprehensive security platform for physical, virtual, and cloud servers
datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents
P h y s i c a l V i r t u a l - C l o u d Securing Your Journey to the Cloud Managing security across platforms today and for the future Table of Contents Executive summary 1 Journey to the cloud varies,
Trend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
WHITE PAPER. The Protection and Operational Benefits of Agentless Security in Virtual Environments SPON. Published March 2012 SPONSORED BY
WHITE PAPER The Protection and Operational Benefits of Agentless Security in Virtual Environments An Osterman Research White Paper Published March 2012 SPONSORED BY sponsored by! SPON sponsored by Osterman
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Trend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Virtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
Secure Virtualization in the Federal Government
White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in
PCI DSS 3.0 Compliance
A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments
Securing Your Journey to the Cloud. Thomas J. Miller Executive Vice President
Securing Your Journey to the Cloud Thomas J. Miller Executive Vice President February 23, 2011 Classification 2/24/2011 Copyright 2011 Trend Micro Inc. 1 Have you ever tried to explain Virtualization to
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Cloud Computing Security
Cloud Computing Security Server Security Making Virtual Machines Cloud-Ready A Trend Micro White Paper May 2010 I. INTRODUCTION Cloud computing has been compared to the early proliferation of electricity.
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
SECURITY FOR VIRTUALIZATION: FINDING THE RIGHT BALANCE
SECURITY FOR VIRTUALIZATION: FINDING THE RIGHT BALANCE Combining protection and performance in your virtualized environment kaspersky.com/beready Introduction In the end, they re all servers and someone
The Clock is Ticking on Windows Server 2003 Support
A Trend Micro White Paper April 2015 The Clock is Ticking on Windows Server 2003 Support >> How Trend Micro can secure your end of life servers while enabling a safe transition Contents Introduction...3
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
How To Protect Your Cloud Computing Servers From Attack
Cloud Computing Security Server Security Making Virtual Machines Cloud-Ready A Trend Micro White Paper August 2009 I. INTRODUCTION Cloud computing has been compared to the early proliferation of electricity.
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Security. TO Evolving. Data Center Security. Virtualization and Cloud Computing
Virtualization and Cloud Computing Security Threats TO Evolving Data Centers Data Center Security Executive Summary Many businesses are evolving their data centers to include virtualization and cloud computing
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
When Desktops Go Virtual
When Desktops Go Virtual Virtualization Security. Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper February 2011 I. VIRTUAL DESKTOP INFRASTRUCTURE Server
Trend Micro Enterprise Security
Trend Micro Enterprise Security Immediate Protection. Less Complexity. Changing the Game for Anti-Virus in the Virtual Datacenter A Trend Micro White Paper September 2010 I. INTRODUCTION From its early
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO
How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO Data everywhere but protection? Unprotected Data Needing Protection
Trend Micro MAS TRM Guidelines Compliance Solutions
Trend Micro MAS TRM Guidelines Compliance Solutions Regulatory Compliance Addressing Server Security and Compliance Challenges of MAS TRM Guidelines July 2013 INTRODUCTION The advancement of information
A Trend Micro ebook / 2009
A Trend Micro ebook / 2009 Table of Contents 1 Introduction: Virtualization: You Can t Afford Not To 4 2 A New Environment to Secure4 3 Invisible Challenges of Virtualization Security4 4 The Risk of Dormant
Automated Protection on UCS with Trend Micro Deep Security
Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
VIRTUALIZATION SECURITY IS NOT AN OXYMORON With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next PREPARING FOR THE VIRTUALIZATION ADVANTAGE Widely acknowledged and celebrated, the
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V
The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V #1 Hyper-V Security The first agentless Security, Virtual Firewall, Anti-Malware
IBM Software Choosing the right virtualization security solution
IBM Software Choosing the right virtualization security solution Meet the unique security challenges of virtualized environments 2 Choosing the right virtualization security solution Having the right tool
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI
White Paper VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI By Jon Oltsik, Senior Principal Analyst June 2012 This ESG White Paper was commissioned by Trend Micro and is distributed
Trend Micro Deep Security
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
PICO Compliance Audit - A Quick Guide to Virtualization
WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization
The Continuing Evolution of Virtualization, Cloud Computing, and Information Security
White Paper The Continuing Evolution of Virtualization, Cloud Computing, and Information Security By Jon Oltsik April, 2012 This ESG White Paper was commissioned by Trend Micro and is distributed under
Implementing Software- Defined Security with CloudPassage Halo
WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...
VIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
VMware Integrated Partner Solutions for Networking and Security
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes
What are your firm s plans to adopt x86 server virtualization? Not interested
The benefits of server virtualization are widely accepted and the majority of organizations have deployed virtualization technologies. Organizations are virtualizing mission-critical workloads but must
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Trend Micro Solutions for PCI DSS Compliance
s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation
Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application
5 Best Practices to Protect Your Virtual Environment
CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
security in the cloud White Paper Series
security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE
White Paper JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3 Typical Antivirus Use Cases...3 Use Case
VIRTUALIZATION AND CLOUD COMPUTING THE JOURNEY TO THE CLOUD. Data Center Security
VIRTUALIZATION AND CLOUD COMPUTING THE JOURNEY TO THE CLOUD Data Center Security Abstract Trend Micro s journey to the cloud started with the desire to build more defenses into its security solutions without
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Intelligent, Scalable Web Security
Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler
Architecting Security for the Private Cloud. Todd Thiemann
Architecting Security for the Private Cloud Todd Thiemann Classification 4/9/2010 Copyright 2009 Trend Micro Inc. 1 The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
in Cloud and Data Center Security for a Reason
#1 in Cloud and Data Center Security for a Reason SMART SIMPLE SECURITY THAT FITS Contents 1. Datasheet - Deep Security 2. Solution Brief - Deep Security and VMware NSX 3. Customer Success Story - Telecom
Security in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Cloud computing: Innovative solutions for test environments
IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading
The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
Securing Cloud Infrastructures with Elastic Security
Securing Cloud Infrastructures with Elastic Security White Paper September 2012 SecludIT 1047 route des dolines, 06560 Sophia Antipolis, France T +33 489 866 919 info@secludit.com http://secludit.com Core
Don t Forget Your Security Umbrella in the Cloud
Don t Forget Your Security Umbrella in the Cloud Richard Sheng Director of Product Marketing, APAC Why the cloud matters? Speed and Business Impact Expertise and Performance Massive Cost Reduction 1) The
Next Generation Datacenters & the Realities of Virtualisation Security
Next Generation Datacenters & the Realities of Virtualisation Security Simon Young General Manager, Server Security EMEA Classification 10/7/2009 1 Agenda The Dynamic Data Center & New Security Challenges