Proactively Secure Your Cloud Computing Platform

Similar documents
雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing the private cloud

Cloud and VM Based Security

How To Build A Software Defined Data Center

How to Grow and Transform your Security Program into the Cloud

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Chapter 11 Cloud Application Development

Third Party Cloud Services Its Adoption in the New Age

Architecting Security for the Private Cloud. Todd Thiemann

SOFTWARE DEFINED NETWORKING

Lecture 02b Cloud Computing II

VMware for your hosting services

Threat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect

How To Protect Your Cloud From Attack

Understanding ArcGIS Deployments in Public and Private Cloud. Marwa Mabrouk

Cloud Models and Platforms

What Cloud computing means in real life

Building Private & Hybrid Cloud Solutions

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing

Demystifying Cloud Computing Graham McLean

Vyatta Network OS for Network Virtualization

Taking the Leap to Virtualization

Lecture 02a Cloud Computing I

Virtualization and Cloud Computing

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Securing Virtual Applications and Servers

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity

Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon

MoMoD-Cloud Movie Mobile on Demand by Cloud

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

SDN Unlocks New Opportunities for Cloud Service Providers

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

From Secure Virtualization to Secure Private Clouds

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

WHITEPAPER. Beyond Infrastructure Virtualization Platform Virtualization, PaaS and DevOps

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

Hosting Provider Plans to Expand Cloud Business by 80 Percent Using Software Upgrade

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Contents. What is Cloud Computing? Why Cloud computing? Cloud Anatomy Cloud computing technology Cloud computing products and market

Performance Management for Cloudbased STC 2012

RemoteApp Publishing on AWS

Imperva SecureSphere Appliances

OpenFlow/SDN for IaaS Providers

VMUG - vcloud Air Deep Dive VMware Inc. All rights reserved.

Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group. Virtualization and Cloud

Deployment Options for Microsoft Hyper-V Server

Cloud Computing and Data Center Consolidation

Introduction to OpenStack

Building an AWS-Compatible Hybrid Cloud with OpenStack

CLOUD COMPUTING. When It's smarter to rent than to buy

Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

Cloud OS. Philip Meyer Partner Technology Specialist - Hosting

Private Cloud Hosting

CoIP (Cloud over IP): The Future of Hybrid Networking

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

How To Monitor Hybrid It From A Hybrid Environment

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

WINDOWS AZURE NETWORKING

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Windows Azure Platform

Software Defined Network (SDN)

Cisco Intercloud Fabric for Business

Network performance in virtual infrastructures

Running Oracle on the Amazon Cloud

Going Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager!

Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack

Evolving Datacenter and Cloud Connectivity Services

Building Private & Hybrid Cloud Solutions

Total Cloud Protection

Delivering Managed Services Using Next Generation Branch Architectures

vcloud Air Disaster Recovery Technical Presentation

Cloud Computing: Making the right choices

Infrastructure Virtualization for Hybrid Cloud

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Web Application Firewall Data Security Solutions. Cloud Firewall

WHITE PAPER: Egenera Cloud Suite

4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?

WHITE PAPER: PAN Cloud Director Technical Overview

CloudPlatform XenDesktop/XenApp cloud provisioning. Gaby Grau - gaby.grau@citrix.com Systems Engineer Networking & Cloud October 2014

Overview of IBM Cloud Integration

IBM Spectrum Protect in the Cloud

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

What are your firm s plans to adopt x86 server virtualization? Not interested

Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions

Cloud Computing Best Practices. Bluepi Consulting Services

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

An Introduction to Private Cloud

Performance Management for Cloud-based Applications STC 2012

HP OpenStack & Automation

A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)

ArcGIS for Server: In the Cloud

Amazon EC2 Product Details Page 1 of 5

Transcription:

Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals

Agenda 1 Cloud Security - IMPERATIVE 2 Positives and Challenges 3 Physical and Virtual Gateways 4 Leveraging Investment 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 2

Strong Drivers for Move to the Cloud Compute Power Reduced Costs Business Continuity Scalable, elastic infrastructure Pay only for what you use Resilience and disaster recovery 3

Cloud Delivery Models Model Vendors Target IaaS Infrastructureas-a-Service PaaS Platform-as-a- Service SaaS Software-asa-Service Rent Hardware Software Networks Rent Hardware and Software Rent Applications Such as Email IT Developers End Users 4

IT Infrastructure Deployment Models Physical Virtual Private Cloud (On-Premise) Public Cloud (Off-Premise) Appl OS HW Appl OS HW Appl OS HW A p pl A p pl OS OS VMWARE. A p pl OS HARDWARE Traditional enterprise Virtualization, better utilization Owned and operated by organization Resources on demand and pay-per-use 5

Agenda 1 Cloud Security - IMPERATIVE 2 Positives and Challenges 3 Physical and Virtual Gateways 4 Leveraging Investment 6

Cloud Security Positives Scalable Security Expert Security Global Intelligence Multi-Layer Security Cost Effectiveness 2011 Check Point Software Technologies Ltd. [Restricted] ONLY for for designated groups and individuals 7

Cloud Security Challenges Network Attacks Multi Tenancy Access Control Data Security Compliancy and Regulations 2011 Check Point Software Technologies Ltd. [Restricted] ONLY for for designated groups and individuals 8

Agenda 1 Cloud Security - IMPERATIVE 2 Positives and Challenges 3 Physical and Virtual Gateways 4 Leveraging Investment 10

Case Study - Amazon Web Services Virtual Gateways for Amazon Public Cloud Public Cloud Secure Your Infrastructure in AWS Public Cloud 2011 Check Point Software Technologies Ltd. [Restricted] ONLY for for designated groups and individuals 11

Amazon VPC Topology Internet 5 5 Direct connectivity to Internet or over VPN 3 4 4 Amazon VPC Amazon VPC internet gateway 3 Amazon VPC router 2 2 Check Point Virtual Appliance for VPC 1 1 1 AWS EC2 instances in private subnets 12

Central Management and Enforcement 13

Virtualization Security Challenges Security Challenges in Virtual Environments Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically 14

Virtualization Security Challenges Security Challenges in Virtual Environments VM VM VM Hypervisor 15

Virtualization Security Challenges Security Challenges in Virtual Environments (Data Center/Cloud) Ensure Security in dynamic environments Maintain zero-downtime during Virtual Machines live migration 16

Secure the Virtual Infrastructure Inter-VM Traffic Inspection Protects Virtual Machines Seamless security within the Hypervisor VE VM VM IMPORTANT to Integrate using VM Vendor APIs Hypervisor Hypervisor Connector Central Management, Granular Policy design 17

Public or Private Clouds Multiple Virtual Systems in ONE Physical.. Partner Sales VS Policy 2 Internet Policy 1 Datacenter Web email Finance HR Legal VS Policy 3 VS Policy 4 VPN Customer Marketing Engineering Policy 1 VS Policy 5 VS Policy 6 Virtualized Gateways Simplify Cloud Security 18

Public or Private Clouds Multiple Virtual Systems in ONE Physical.. Customer A Customer B Customer C Internet Customer D Multi-Domain Management Orchestration Virtualized Gateways Simplify Cloud Security 19

Cloud Security Challenges Network Attacks Firewall, IPS Multi Tenancy Gateways in Virtual Infrastructure Access Control Firewall, VPN Data Security Data Loss Prevention Compliancy Security Management 20

Agenda 1 Cloud Security - IMPERATIVE 2 Positives and Challenges 3 Physical and Virtual Gateways 4 Leveraging Investment 21

Leveraging Investment One-click Activation of functionality From the central management console Application Control Identify and control usage of thousands of applications based on user and machine identity. 22

Thank You 2011 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals