Cloud and VM Based Security



Similar documents
雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Securing the private cloud

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Proactively Secure Your Cloud Computing Platform

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Check Point 3D Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Netzwerkvirtualisierung? Aber mit Sicherheit!

Microsoft SharePoint Architectural Models

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Top 10 Reasons Enterprises are Moving Security to the Cloud

Security in the Software Defined Data Center

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

How To Protect A Data Center From A Hacker Attack

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Centrify Cloud Connector Deployment Guide

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Securing the Virtualized Data Center With Next-Generation Firewalls

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

5 Best Practices to Protect Your Virtual Environment

VMUG - vcloud Air Deep Dive VMware Inc. All rights reserved.

Security Overview Enterprise-Class Secure Mobile File Sharing

MOVING SECURITY TO THE CLOUD. pandasecurity.com

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Third Party Cloud Services Its Adoption in the New Age

Move over, TMG! Replacing TMG with Sophos UTM

10974B: Deploying and Migrating Windows Servers

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Zscaler Internet Security Frequently Asked Questions

Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud

APS Connect Denver, CO

Business Values of Network and Security Virtualization

VMware vcloud Air Networking Guide

Security Administration R77

How Network Virtualization can improve your Data Center Security

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Integrating Single Sign-on Across the Cloud By David Strom

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

2013 ovh.com. All rights reserved

Software defined networking. Your path to an agile hybrid cloud network

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

VMware NSX A Perspective for Service Providers part 2

About the VM-Series Firewall

Relocating Windows Server 2003 Workloads

JUNIPER NETWORKS CLOUD SECURITY

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Course 20465C: Designing a Data Solution with Microsoft SQL Server

How To Protect Virtualized Data From Security Threats

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

On and off premises technologies Which is best for you?

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Learn how to build Enterprise Hybrid Clouds for your customers using VMware vcloud

Lecture 02b Cloud Computing II

About the VM-Series Firewall

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

vshield Administration Guide

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Secure Cloud Computing

Securing Virtual Applications and Servers

Unified Threat Management, Managed Security, and the Cloud Services Model

T-SYSTEMS Cloud STORY

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

How To Protect Your Cloud From Attack

IBM WebSphere Cast Iron Cloud Integration

Effective End-to-End Cloud Security

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

Configuring User Identification via Active Directory

Secure Cloud-Ready Data Centers Juniper Networks

Virtual Machine in Data Center Switches Huawei Virtual System

Websense Security Transition Guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Azure Active Directory

Achieving PCI-Compliance through Cyberoam

SofaWare Management Architecture Basics

Designing a Data Solution with Microsoft SQL Server 2014

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Securing the Service Desk in the Cloud

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Transcription:

Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.

Agenda 1 Market Landscape 2 Private Cloud Security 3 Public Cloud Security 4 Summary 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2

The Cloud Evolution On-Premise Hybrid Cloud Off-Premise Efficiency Virtualization Private Cloud Public Cloud SaaS Legacy Datacenter Web Hosting $11.8 billion by 2014 $55 billion by 2014 3

Agenda 1 Market Landscape Private Cloud Security 2 VLAN Sprawl problem Secure Dynamic Cloud Security Gateway Virtual Edition 3 Public Cloud Security 4 Summary 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 4

Private Cloud Cost Reduction Shrinking 1,000 servers that use 100K watts into 100 servers that uses 10K watts IT as a Service IT becomes an ISP within the corporation 5

Moving to Private Cloud Legacy Datacenter Corpnet DMZ Extranet 1:1 Server per Application 1:10 Security Zone (VLANs) per Server 6

Moving to Private Cloud Application Virtualization Corpnet DMZ Extranet 1:5 Server per Application 1:1 Security Zone (VLANs) per Server 7

Moving to Private Cloud Networks Virtualization Corpnet DMZ Extranet 1:20 Server per Application 5:1 Security Zone (VLANs) per Server 8

Moving to Private Cloud Datacenter Consolidation Corpnet DMZ Extranet 1:100 Server per Application 20:1 Security Zone (VLANs) per Server 9

The VLANs Sprawl Problem Cheap and easy to add applications Everyone wants more s s Sprawl How to secure? More VLANs to segment s Hard to manage VLANs Sprawl Problem Lack of compliance Black spots Latency 10

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically 11

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Hypervisor 12

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Ensure Security in dynamic environment 13

Check Point Virtual Edition R75.20 Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual 14

Secure the Virtual Infrastructure Protects Virtual Machines VE Hypervisor security Certified by Ware Hypervisor Hypervisor Connector Audit virtualization system 15

Virtual Edition Features Best Security Check Point Software Blades All Software Blades Firewall Anti-Virus IPS URL Filtering VPN Flexible Security Mobile Access DLP Application Control Identity Awareness VE Hypervisor Connector Hypervisor 16

Virtual Edition Features Best Security s Protection All Software Blades Flexible Security Securing New s Automatically Secure Dynamic Environment VE Inspecting Inter- Traffic Hypervisor Connector Hypervisor 17

Virtual Edition Features Best Security s Protection All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment VE Hypervisor Connector Hypervisor 18

Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management 19

Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management Hypervisor Connector Hypervisor 20

Secure Dynamic Virtualized Environment Using Identity Based Policy Define a secure policy using Machines and Users identity Update identity-based policy from the Active Directory Old Policy New Policy From To Service Action 192.134.12.12 Database 176.12.34.23 Virtual SQL SQL Allow Admins Group Servers Group User/Group Identity Virtual Machines Identity 21

Agenda 1 Market Landscape 2 Private Cloud Security Public Cloud Security 3 4 Public Cloud Potential Multi-tenancy Security Summary 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 22

23

Public Cloud in 2011 Few Global Clouds Many Regional Clouds 24 24

Cloud Providers Security Needs Multi-tenancy: Servicing Multiple Customers From the Same Environment Cloud Secure connection to the Cloud Security of the Cloud Security within the Cloud 25

Agenda 1 Market Landscape 2 Private Cloud Security 3 Public Cloud Security Summary 4 Best Practices Summary 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 26

Virtualized Security Scenarios VE Hypervisor Connector Hypervisor Securing the Virtual Environment Use the new Virtualization Software Blade to apply granular Firewall and IPC policy on traffic between virtual machines. VE Hypervisor Office in a Box Use the Security Gateway VE with FW, IPS, VPN and any other software blade to secure your office networks and assets VE VE VE Enterprise Security Gateways Hypervisor Consolidate your Security Gateways deployment into a virtualized environment. 27

Cloud Security Best Practices Use Firewall to segment between Virtual Machines Use IPS to secure s from External and Internal threats Let the same security Admin manage both physical and virtual policy from a single console Ensure full security with zero downtown-time during live migration Log and audit all Virtualization events and traffic 28

Summary Check Point Pioneers the Cloud Security Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines The only solution with unified management for Physical and Virtual 29