Tech Throwdown: Invincea FreeSpace vs. Micro-Virtualization
|
|
- Ursula O’Neal’
- 8 years ago
- Views:
Transcription
1 Tech Throwdown: Invincea FreeSpace vs. Micro-Virtualization May 2014
2 Table of Contents Summary... 3 A Hot Market Advanced Threat Protection for the Endpoint... 3 Hype Meets Real World Let s do a Throwdown... 4 Architectural Comparison... 5 Invincea FreeSpace Virtual Container Architecture... 5 Micro-Virtualization Virtual Container Architecture... 6 Hardware Dependencies... 7 Virtual Desktop Infrastructure (VDI) Limitations... 7 Microsoft Volume Licensing Required can double desktop license costs... 8 No Malware Detection Capability... 8 Host OS Kernel and System Drivers not fully isolated... 8 Vendor Claims Marketing Hype and the Realities of Deployable Defenses... 9 Throwdown Comparison... 9 Throwdown Comparison Checklist Conclusion and more information Invincea, Inc University Drive, Suite 460 Fairfax, VA USA Tel: info@invincea.com , Invincea, Inc. All rights reserved. Invincea, the Invincea Logo, Invincea FreeSpace, Invincea Management Service are trademarks of Invincea, Inc. All other product or company names may be trademarks of their respective owners. All specifications are subject to change without notice. Invincea assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. INV_WP_microvirtualization_ Page 2 of 12
3 Summary It seems every week there is a new flash-bang technology or vendor that purports to be the latest silver bullet solution to advanced threats. The result from all these market claims is buyer confusion and a healthy dose of skepticism for vendors silver bullet claims. This paper is the first in a series of Tech Throwdowns where we compare another vendor s micro-virtualization approach against Invincea FreeSpace. In it, we describe the technical differences between the two different types of virtual container architectures, then present the side-by-side Throwdown against best for business criteria. We conclude with a Throwdown form for you to take the Throwdown challenge for yourself. A Hot Market Advanced Threat Protection for the Endpoint Each day, users are successfully targeted by a variety of adversaries with the goal of getting a beachhead on corporate networks to subsequently compromise the network for data breach, including customer data, intellectual property, mergers and acquisition deals, and future plans. Traditional security solutions have used signatures of threats to try and find these adversaries on the network. However, the nature of a targeted attack means techniques that rely on signatures will not detect these attacks. As a result, enterprises are looking for non-signature-based techniques to counter advanced threats and targeted attacks. Page 3 of 12
4 As attacks have become more targeted and persistent, and malware more sophisticated and specialized, a market for solutions to defend against these threats has emerged. John Grady IDC Research, Security Products, August 2013 It seems every week there is a new flash-bang technology or vendor that purports to be the latest silver bullet solution to advanced threats. The result from all these market claims is buyer confusion and a healthy dose of skepticism for vendors silver bullet claims like The World s Most Secure Endpoint Solution (see exhibit below from tradeshow). Is it really? Let s explore the claim. Hype Meets Real World Let s do a Throwdown To help cut through all the marketing hype of various vendors, we are putting on a Tech Throwdown (Bobby Flay style) series with key criteria to compare alternative solutions when looking at advanced threat protection solutions. For a more comprehensive comparison of alternative architectures and technologies, please see Buyer s Guide for Advanced Threat Protection Solutions 1. The Throwdown is intended for the reader to perform his or her own comparison of alternative technologies, architectures, and products to determine what is best for his or her business. To aid in evaluation, we provide background on the different approach architectures, then provide a Throwdown comparison for the reader to take and decide what approach is best for business given the various deciding criteria when it comes to protecting your enterprise from advanced threats: deployability, scalability, performance, usability, security, and cost. Instead of focusing on just one of these criterion, we address them all because we know that s how evaluators and buyers conclude what s best for their business and ultimately what it takes to protect your business from the threats you face while going online. 1 Page 4 of 12
5 In this Throwdown, we compare Invincea FreeSpace to a micro-virtualization product. We use micro-virtualization in quotes only because it is a term invented by a vendor, not an actual recognized architecture. Architectural Comparison Both Invincea FreeSpace and the micro-virtualization approach use a virtual container architecture (as defined by Gartner Research) to address threats, both conventional and targeted. In the following we describe the virtual container architectures. Invincea FreeSpace Virtual Container Architecture The virtual container based architecture breaks from the traditional detection-based approaches that have long dominated endpoint security. Figure 1 shows the virtual container architecture employed by Invincea FreeSpace. The fundamental difference between a virtual container architecture and a traditional detection-only architecture is the virtual container implements a protect first design. Figure 1: Invincea FreeSpace Virtual Container Architecture The container-based architecture is flexible enough to determine which applications get containerized, though some configuration of the container is often necessary to ensure correct interoperability with the system. The applications shown in Figure 1 reflect the attack surface from threats your users face: and Web. In particular, Invincea supports browsers, document editors, Adobe reader, Java, and other plug-ins these applications support. When evaluating a virtualization container architecture, be sure to understand which browsers and applications are supported out of the box. Coverage of Internet Explorer (older and current versions you run), Firefox, and Chrome are important to ensure that users are protected with the browser they use. The virtual container architecture is just that virtual. Users do not interact with containers they interact with applications as expected, but are protected from Page 5 of 12
6 compromising their system and network in case the content inside the container is malicious. A virtual container is like a transparent detonation chamber with one exception: rather than testing content for maliciousness and making a decision, the application with its content always runs inside the container so your users are always protected. If any malware detonates inside the container (a malicious document, executable, or web page), it is isolated from infecting the host and network. Detection and capture of forensics is a key differentiating feature of different virtual container solutions. Some containers only contain malicious threats. Invincea FreeSpace will also detect when a detonation event has occurred inside the container, indicating malware is running. Once observed, Invincea FreeSpace collects artifacts from the malware while killing the malicious processes that spawn, preventing further exploitation of the network. The key attributes of Invincea s virtual container architecture are: Scalable with number of applications, windows, and tabs that run inside the container Low performance overhead in memory, on disk, and CPU that is constant No additional latency Hardware (CPU vendor and generation) independent and agnostic Interoperable with other endpoint software Seamless UX Detection of 0day exploits, unknown malware, targeted attacks Reporting of forensics to cloud-managed server Proven to scale to hundreds of thousands of machines Easy deployability and maintenance Out of the box support for standard browsers and document editors/viewers No special licensing required for Microsoft OS and products Extensible to other software applications as desired by users Cost efficient Micro-Virtualization Virtual Container Architecture Recently, the term micro-virtualization has been introduced to describe a form of Type II virtualization that virtualizes single processes running within an operating system. While few technical details 2 about micro-virtualization have been published, what little has been released indicates that, the Xen hypervisor has been forked to create a microvisor to virtualize tasks rather than virtualizing the full operating system, where a task is defined to be an untrusted process and the OS libraries it calls. 2 Microvirtualization for the Security Architect_0.pdf Page 6 of 12
7 Figure 2 shows a micro-virtualization architecture on a Windows7 system. As shown, the u-visor is hosted on the Windows7-64 bit operating system. Xen is classically a Type I hypervisor that runs bare metal and virtualizes the entire operating system, rather than single processes or tasks. Thus, this fork of Xen represents a form of Type 2 virtualization. Figure 2: A micro-virtualization architecture The microvisor has some important design distinctions from other virtual container approaches that drive some system trade-offs we describe here. One key difference is that the microvisor is hardware limited to the Intel VT-x processor instruction set extensions in order to virtualize the supervised process. Hardware Dependencies Using the VT-x ensures that the micro-vm can VM Exit (the equivalent of a hardware interrupt on conditions such as a page fault) on a pre-defined set of VM fault conditions. The ability to VM Exit on a pre-defined set of VM fault conditions has been marketed by the vendor as hardware-enforced isolation caveat emptor. The hardware dependency to the Intel chipset means it will only run on certain CPUs Intel i3, i5, i7 CPUs and requires additional BIOS level configuration of each machine to enable VT extensions at boot time. Virtual Desktop Infrastructure (VDI) Limitations One trade-off with employing VT-x instructions with a virtual container is you cannot run other hypervisors at the same time at least not for current generation deployed desktop CPU architectures that do not support nested virtualization. For instance, you cannot run this microvisor on a virtualized desktop (VDI) because the virtual desktop runs on a Type I hypervisor, nor can you run another Type II VM such as a virtual machine (VMware, VirtualBox, or Parallels) on a machine running the microvisor. Another trade-off is if other security solutions using VT-x, such as McAfee DeepSafe/DeepDefender, cannot run concurrently with the microvisor because of the VT-x conflict. Page 7 of 12
8 Microsoft Volume Licensing Required can double desktop license costs The microvisor provides each virtualized process a reference gold image copy of the host operating system. The micro-visor then employs copy-on-write semantics to any changes to the gold image to gain performance efficiencies for each u-vm. This means each virtualized process references a gold copy of the host OS in memory for the set of system libraries (imported DLLs) and operating system services it needs. The requirement to run a gold copy of the host OS image creates a huge memory, system management, and configuration requirement for this architecture. It will typically take over 1 GB of memory to run the gold copy image, which in turn is a major contributing factor for machine specs to be 8GB of memory. In addition, the approach creates major licensing challenges in working with Microsoft software, including requiring special enterprise licensing of MS Office. Patch management, traditionally difficult for many organizations, must now be coordinated with the gold image to stay in synch with the host OS image. No Malware Detection Capability While malicious changes to the gold image of the system will not persist after the target process is terminated, the exploit code can run for the lifetime of the micro-vm. Without detection capability, this approach means the user and her data is put at risk for the lifetime of the uvm if and when the user encounters malware. Host OS Kernel and System Drivers not fully isolated While certain OS libraries and services are virtualized from the gold image, many devices such as the printer, file system, and network that the virtualized process (e.g., browser, MS Office) needs access to, are not virtualized themselves. Instead, these devices are managed by the host OS itself, as long as the microvisor provides access to the device. These exceptions are coded as policies to allow virtualized programs to connect directly to the host OS devices including to printer services, host and network file systems, and other core kernel drivers. Since network, printer, file system, and other I/O devices are managed by the host OS, the device drivers in the host OS kernel can be exploited to compromise the host OS exactly what microvisor was purported to prevent, but now must allow by exception. In summary, the core attributes of the micro-virtualization architecture are: Hardware limited to certain CPUs with BIOS modification required Memory intensive requiring machines with 8GB of physical memory Overhead created with each new task browser tab, window, or application for each additional micro-vm making it unscalable as number of tabs and windows opened grows Special licensing required for Microsoft OS and Microsoft Office to support type 2 virtualization Interoperability with other software and devices requires creation of policies per application that creates policy infrastructure overhead while simultaneously creating holes in micro-vm Page 8 of 12
9 Lack of detection makes malware infections invisible to enterprise when infections occur on users machines. Unproven after 2 years in market. Largest deployment measured in 10s, not 10 thousands. Best suited for traditional sandbox style analysis of malware in Security Operations Centers by malware analysts rather than enterprise deployment to users. Vendor Claims Marketing Hype and the Realities of Deployable Defenses On the vendor claim from the beginning of this paper that a micro-virtualization product is the world s most secure endpoint solution, we point to an old axiom in security: the world s most secure computer is one you never turn on, nor can be turned on. In the case of this vendor claim, if the endpoint protected by micro-virtualization can t be put into production because of all of its limitations, then perhaps it is the world s most secure endpoint solution. On the other hand, if you would like to be able to use your machines and deploy a solution to protect your network from targeted attacks, then Invincea is the clear winner in this Tech Throwdown. Throwdown Comparison The following table presents a side-by-side comparison of two products implementing alternative virtual container architectures based on best for business criteria. We invite you to do your own side-by-side comparison with the form at the end. Invincea Product(s) FreeSpace Enterprise v3.3 Invincea Management Service 2.0 Micro-Virtualization Bromium vsentry 2.0 Approach and Use Cases Implementation Approach Secure Virtual Container (hardware agnostic) Hardware-dependent micro-vm fork of Xen hypervisor Use Cases Requirements and Supported Applications Anti-malware Anti-Phishing Document + PDF Protection Java Isolation Auto-remediation Application Isolation Windows XP EOL Protection Adversarial Threat Attribution Incident Response Analysis Windows OS support Windows XP 32 Windows 7 32-bit Windows 7 64-bit Windows 8 32-bit (v4) Windows 8 64-bit (v4) Anti-malware Anti-Phishing PDF Protection Java Isolation Auto-remediation Incident Response Analysis Windows 7 32-bit Windows 7 64-bit Page 9 of 12
10 Hardware Support Minimum Host Physical RAM Required No dependencies (Any x86/64 chipset) Intel VT-x, VT-d, + EPT only 512 MB+ 4 GB documented 8 GB real-world Required RAM allocation MB constant 1 GB+ CPU usage Number of processes (initial launch) Number of processes (subsequent) Browser Support Application Support Restore time after browser patch applied < 5% at launch < 1% sustained Not disclosed s+ (plus a copy of Windows OS) s+ (plus a copy of Windows OS) Internet Explorer Chrome Firefox Adobe Acrobat Adobe Reader (PDF) Adobe Flash Apple QuickTime Microsoft Excel 2010/2013 Microsoft PowerPoint 2010/2013 Microsoft Word 2010/2013 Microsoft Outlook helper apps Microsoft Silverlight Java s Internet Explorer Firefox Adobe Reader (PDF) Java MS Office limited support 15 minutes Microsoft LMS Server + Enterprise Licensing for MS Office Compatibility with other hypervisor software Remote Desktop Services Deployment and Management Not required Supported VMWare View Citrix XenDesktop Microsoft Remote Desktop Required Not supported VMWare View Citrix XenDesktop Microsoft Remote Desktop Number of organizations protected Largest number of hosts protected (single org) Hardware OEM partnerships On-premise Management Service Nearly 15,000 10s 70, s Dell Latitude laptops, OptiPlex desktops, Precision workstations, Dell Venue Windows8 tablets (v4) Yes None Yes Page 10 of 12
11 Cloud-hosted Management Service (option) Security Event Information Management and Threat Intelligence Partnerships Yes Not Supported Pre-built Integrations Open API for 3 rd party integration Threat Intelligence / Adversarial Attribution integration Cost Intel (McAfee) epo HP ArcSight RSA Security Analytics (NetWitness) IBM Security (Q1 Labs) QRadar Splunk ForeScout CounterACT Yes ThreatGRID ThreatStream ReversingLabs isight Partners VirusTotal Palo Alto Networks Wildfire None Yes Palo Alto Networks Endpoint license pricing $39.99/device annual subscription $150/endpoint lifetime Page 11 of 12
12 Throwdown Comparison Checklist Conclusion and more information This paper presents the business and security realities of user-targeted threats across an organization. Legacy technologies are not adequate in addressing the modern issues with user threats, and organizations should seriously evaluate if repurposing pointsolutions can meet their current and future needs specific to advanced malware threats. For more information on the Invincea platform and protecting against user-targeted exploits and other forms of security threats, please contact: Website: Phone: or Page 12 of 12
Invincea Advanced Endpoint Protection
SOLUTION OVERVIEW Invincea Advanced Endpoint Protection A next-generation endpoint security solution to defend against advanced threats combining breach prevention, detection, and response The battle to
More informationTrends in Zero-Day Kernel Exploits and Protection 2015
Trends in Zero-Day Kernel Exploits and Protection 2015 Overview of Key Protection Technologies and Their Limitations in Dealing With Zero-Day Kernel Attacks Executive Summary Legacy security solutions
More informationPractical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
More informationThe evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
More informationBuyers Guide to Advanced Threat Protection for EndPoint Solutions. January 2014
Buyers Guide to Advanced Threat Protection for EndPoint Solutions January 2014 1 Table of Contents Advanced Threat Protection for the Endpoint... 2 Architecture... 4 Performance... 8 Enterprise Ready...
More informationMaking Windows Secure by Design
Making Windows Secure by Design Bromium and Microsoft Partner to Advance Security With Micro-Virtualization Introduction Bromium has reinvented endpoint security by using a new approach to defeating breaches
More informationAdvanced Endpoint Protection
Advanced Endpoint Protection CONTAIN IDENTIFY CONTROL Nick Keller Director Federal Civilian Sales Duncker Candle Problem Solution Creativity, Change the Paradigm Why listen to me? Connect these 3 Companies
More informationDesktops in the Cloud
Desktops in the Cloud Your Silver Bullet for Windows XP End of Life WHITE PAPER Table of Contents Executive Summary...3 Incremental Desktop Migration...3 Use Cases for DaaS...3 Desktop Migration Options:
More informationTechnical Specifications
Technical Specifications Deployment and Integration The zero footprint web architecture ensures no intrusion on your users computers. Use ZAP CubeXpress to bring in Microsoft Dynamics customizations and
More informationComparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
More informationHP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
More informationMcAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More information9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
More informationMaking Client-side Java Secure with Bromium vsentry
Making Client-side Java Secure with Bromium vsentry Making Client-side Java Secure Client-side Java has become somewhat of an IT pariah, primarily as a result of the growing list of Java vulnerabilities
More informationServer and Storage Sizing Guide for Windows 7 TECHNICAL NOTES
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Table of Contents About this Document.... 3 Introduction... 4 Baseline Existing Desktop Environment... 4 Estimate VDI Hardware Needed.... 5
More informationTrusteer Rapport Virtual Implementation Scenarios
Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments
More informationThe impact of virtualization security on your VDI environment
ENTERPRISE TE The impact of virtualization security on your VDI environment ST ED WITH LO G I N VS I Contents Introduction... 3 What is VDI?... 3 Virtualization security challenges... 3 Choosing the right
More informationAT&T Connect Participant Application & VDI Platform Support
AT&T Connect Participant Application & Platform Support AT&T Connect Participant Application & Vdi Platform Support 2014 AT&T Intellectual Property Published by: AT&T Intellectual Property Product: AT&T
More informationWhy Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
More informationMcAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
More informationAlphaTrust PRONTO - Hardware Requirements
AlphaTrust PRONTO - Hardware Requirements 1 / 9 Table of contents Server System and Hardware Requirements... 3 System Requirements for PRONTO Enterprise Platform Software... 5 System Requirements for Web
More informationServervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationLecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu
Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches
More informationServer-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
More informationKVM KERNEL BASED VIRTUAL MACHINE
KVM KERNEL BASED VIRTUAL MACHINE BACKGROUND Virtualization has begun to transform the way that enterprises are deploying and managing their infrastructure, providing the foundation for a truly agile enterprise,
More informationVMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
More informationEMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix
EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Version 9.4.1.0 302-002-262 REV 01 Abstract Smarts 9.4.1 Suite can be installed in a typical or a fully distributed, multi-machine production
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationRED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationTechnology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationEMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Support Matrix
EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4 Version 9.4.0.0 302-001-488 REV 01 Abstract Smarts 9.4 Suite can be installed in a typical or a fully distributed, multi-machine production
More informationThree Ways to Secure Virtual Applications
WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.
More informationUses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
More information2009 AAMGA Automation Conference
2009 AAMGA Automation Conference Kenny Morris, MCSE Manager of Network Services CRC Insurance Services, Inc. kmorris@crcins.com Server Infrastructure 170 servers 70% in Central Datacenter 25% of server
More informationHow To Get The Most Out Of Redhat.Com
RED HAT ENTERPRISE VIRTUALIZATION AND CLOUD STRATEGY Aram Kananov EMEA Product Marketing Manager Platform and Cloud Business Units Red Hat 1 RED HAT BRINGS COMMUNITY, VENDORS, USERS TOGETHER 2 RED HAT
More informationDIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
More informationRed Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
More informationVirtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
More informationSUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
More informationVirtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationDesktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
More informationInternational Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
More informationFrontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationDeveloping a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
More informationCSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu
CSE 501 Monday, September 09, 2013 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
More informationAchieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
More informationVIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
More informationDell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationSolution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
More informationVDI Without Compromise with SimpliVity OmniStack and VMware Horizon View
VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View Page 1 of 16 Introduction A Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end user experience and
More informationUnderstanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...
Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationProtecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com
Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the
More informationIT Security Cost Reduction
Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint In the constant drive for increased productivity and cost effectiveness, enterprises are continuously
More informationWHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System
AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes
More informationServer Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
More informationThe Virtualization Practice
The Virtualization Practice White Paper: Security and Data Protection with Intelligent Desktop Virtualization Bernd Harzog Analyst Virtualization Management January 2012 2012 The Virtualization Practice.
More informationGrant Management. System Requirements
January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More informationBasics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
More informationComparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
More informationEMA Product Brief: Desktop Virtualization with Quest
EMA Product Brief: Desktop Virtualization with Quest HIGHLIGHTS Vendor name: Quest Software Product name: vworkspace Production function: Desktop Virtualization Host Operating Systems Support: Windows
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationWhat is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
More informationIntelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring
More informationMcAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
More informationMYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7
MYOB EXO System Requirement Guidelines 30 April 2014 Version 2.7 Contents 1 System Requirements 4 1.1 Overview 4 1.2 Server Requirements 4 1.2.1 Server Requirements (excluding terminal server) 4 1.2.2
More informationEnterprise Desktop Solutions: VMware View 4.5
C H E A T S H E E T Enterprise Desktop Solutions: What is VMware View? VMware View 4.5 is the leading desktop virtualization solution, built for delivering desktops as a managed service from the platform
More informationIBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
More informationCloud Computing Security: Public vs. Private Cloud Computing
Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple
More informationThis white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in
This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration
More informationAP ENPS ANYWHERE. Hardware and software requirements
AP ENPS ANYWHERE Hardware and software requirements Contents Server requirements 3 Hard drives 5 Virtual machines 6 AP ENPS mobile server 6 Client requirements 7 AP ENPS client on a Mac-based computer
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationRally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
More informationEnterprise Printing Solutions. Secure, on-premise mobile printing platform. enterprise education public printing locations print simply anywhere
Enterprise Printing Solutions Secure, on-premise mobile printing platform enterprise education public printing locations print simply anywhere PrinterOn Enterprise provides a secure mobile printing platform
More informationPARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More informationThe Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
More informationThe Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
More informationORACLE VIRTUAL DESKTOP INFRASTRUCTURE
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
More informationMICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT
MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT Frequently Asked Questions Abstract This Enrollment provides Duval County Public Schools a license for certain specified Microsoft Products
More informationPersonal Computer Standard. National Infrastructure Group. National Infrastructure Group, ehealth Leads, ehealth Architecture and Design.
Document Control Document Title Personal Computer Standard Version 1.0 Owner National Infrastructure Group Author Paul McLaren, paul.mclaren@scotland.gsi.gov.uk, 0131 244 2258 Creation date 13 th November
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationMinimum Computer System Requirements
Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through
More informationParallels VDI Solution
Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...
More informationAccelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate
Accelerate Patching Progress Title of in Presentation the Enterprise the Enterprise Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate Insert presenter logo here on
More informationCloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni, Pongsin Poosankam, y Matei Zaharia, Jun Han, y Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig,
More informationA Superior Hardware Platform for Server Virtualization
A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations
More informationAdonis Technical Requirements
Information Sheet Adonis Technical Requirements CONTENTS Contents... 1 Adonis Project Implementation... 1 Host Installation / Onboard Installation Full replication (LARGER Vessels):... 1 Onboard installation
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationSage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage
More information