Netzwerkvirtualisierung? Aber mit Sicherheit!



Similar documents
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

How Network Virtualization can improve your Data Center Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cloud and Data Center Security

Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

Business Values of Network and Security Virtualization

Trend Micro. Advanced Security Built for the Cloud

How To Protect Your Cloud From Attack

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Meeting the Challenges of Virtualization Security

Softverski definirani data centri - 2. dio

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

Windows Server 2003 End of Support. What does it mean? What are my options?

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Comprehensive security platform for physical, virtual, and cloud servers

VMware NSX A Perspective for Service Providers part 2

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Data Center Connector for vsphere 3.0.0

Managed Antivirus Quick Start Guide

PCI DSS 3.0 Compliance

How To Build A Software Defined Data Center

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Secure Cloud-Ready Data Centers Juniper Networks

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

VMware vcloud Networking and Security Overview

Trend Micro deep security 9.6

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

1518 Best Practices in Virtualization & Cloud Security with Symantec

Itex VMware NSX Network Virtualization Presentation

Data Center Micro-Segmentation

Virtualization Journey Stages

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

VMware Integrated Partner Solutions for Networking and Security

Security in the Software Defined Data Center

Protect Root Abuse privilege on Hypervisor (Cloud Security)

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Bitdefender GravityZone Sales Presentation

How To Protect A Data Center From A Hacker Attack

Agentless Security for VMware Virtual Data Centers and Cloud

Sichere Virtualisierung mit VMware

PICO Compliance Audit - A Quick Guide to Virtualization

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

SANS Top 20 Critical Controls for Effective Cyber Defense

Limiting the Spread of Threats: A Data Center for Every User

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Total Cloud Protection

RSA Security Solutions for Virtualization

FISMA / NIST REVISION 3 COMPLIANCE

Safeguarding the cloud with IBM Dynamic Cloud Security

1 Introduction Product Description Strengths and Challenges Copyright... 5

Automated Protection on UCS with Trend Micro Deep Security

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

McAfee Server Security

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Trend Micro Deep Security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

VMware vcloud Networking and Security

Cloud and VM Based Security

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Securing the Virtualized Data Center With Next-Generation Firewalls

Effective End-to-End Cloud Security

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

SDN Security for VMware Data Center Environments

Veranderende bedreigingen Security in het virtuele datacenter

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Software Defined Environments

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.

Product Description. Product Overview

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

VMware vcloud Director for Service Providers

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Transcription:

Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware

Agenda Background and Basic Introduction to Network Virtualization Why Network Virtualization? Insight on Micro Segmentation Why Micro Segmentation? NSX Security Tags Dynamic security group inclusion, why it matters. Deep Security 9.5 and NSX Keep responsibilities where they belong

The Software-Defined Data Center Approach Ideal architecture for the hybrid cloud Private Cloud Hybrid Cloud Public Cloud All infrastructure services virtualized: compute, networking, storage Platform Management and Automation Control of data center automated by software (management, security) Compute Network Storage SOFTWARE-DEFINED DATA CENTER Unified platform for existing and new apps, delivered to many devices

NSX The Strategic Platform for the Next Generation Data Center Provision or repurpose generic physical capacity on demand Automation Micro- Segmentation Security NSX makes network security inside data center perimeter operationally feasible Reduce infrastructure provisioning time from weeks to minutes NSX Reduce RTO by 80% Self service Cloud (vrealize Automation or Openstack) Beyond the Datacenter Live migrate workloads to new data center without changing IP addresses. 4

Provides A Faithful Reproduction of Network & Security Services in Software Switching Routing Load Balancing Connectivity to Physical Networks Management APIs, UI Policies, Groups, Tags Firewalling VPN Data Security Activity Monitoring 5

VMware NSX: Virtualize the Network 6

VMware NSX: Virtualize the Network 7

VMware NSX: Virtualize the Network 8

VMware NSX: Virtualize the Network Logical Switching Logical Routing Load Balancing Physical to Virtual Firewalling & Security 9

VMware NSX: Virtualize the Network Logical Switching Logical Routing Load Balancing Physical to Virtual Firewalling & Security One-Click Deployment via Cloud Management Platform 10

Problem: Data Center Network Security Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible Internet Internet Little or no lateral controls inside perimeter Insufficient Operationally Infeasible

Solution: Advanced Security Services Insertion through Micro Segmentation Anti-Malware Vulnerability and Software Scanning File Integrity Monitoring Intrusion Prevention / Detection Deep Security Security Admin Security Policy Traffic Steering Internet 8

Automated Security in a Software Defined Data Center Security Group = Quarantine Zone Members = {Tag = ANTI_VIRUS.VirusFound, L2 Isolated Network} Security Group = Web Tier Policy Definition Standard Desktop VM Policy Anti-Virus Scan Quarantined VM Policy Firewall Block all except security tools Anti-Virus Scan and remediate 13 11 Quarantine Vulnerable Systems until Remediated by combining NSX Tagging with Deep Security Advanced Detection Capabilities 13 11

How Deep Security works Virtual appliance is deployed and gains visibility into VMware environment using APIs Policies, rules, events, tasks are managed via single console Updates across capabilities are provided to the virtual appliance Scans are performed by the virtual appliance All events can be shared with SIEM Integrates with VMware via vsphere, vcenter, vcloud Director Integrates with LDAP Integrates with SIEM Oracle or SQL

Deep Security for VMware NSX Logical Switching Auto Deployment Anti-Malware with Web Reputation Logical Routing No Hypervisor Install Firewall No Reboot Logical Load Balancer Logical VPN Logical Firewall NSX Deep Security 9.5 Fine Grained Intrusion Prevention Control Integrity Automation Through Monitoring Tagging Vulnerability & App Inventory Scan

Optimize data center environment resources How do you address the bottlenecks created by traditional security capabilities?

Use agentless security to reduce system load ESXi Network Usage Scan Speed SAN IOPS Disk Disk Disk Disk Disk Storage

Trend Micro provides capabilities to address threats, meet compliance, and support security best practices Anti-Malware with Web Reputation Intrusion Prevention Host-based Firewall Integrity Monitoring Timely protection against new malware being created and used to attack systems and steal data Shield vulnerabilities from attack with auto-updating security policies to ensure the right protection is applied to the right servers Create a firewall perimeter around each server to block attacks and limit communication to only the ports and protocols necessary Meet your compliance monitoring requirements and ensure unauthorized system changes are detected and reported Log Inspection Isolate security-relevant events in system logs to quickly identify suspicious behavior as well as meet compliance requirements.

Deep Security Intrusion Prevention Protect against vulnerabilities Detection and prevention of protocol violations & attacks Automated recommendation and deployment of rules, based on your specific environment Large set of pre-configured rules, with automatic categorization and ranking for easy implementation Virtual patching to protect before you patch Smart filtering using behavioral, statistical, behavioral, heuristic and protocol enforcement to stop attacks and reduce false positives Log for audit and compliance and forward to SIEM

Protect against vulnerabilities - before you patch Reduce risk of exposure to vulnerability exploits especially as you scale Save money avoiding costly emergency patching Patch at your convenience Vulnerability Disclosed or Exploit Available Virtually patch with Trend Exposure Micro Intrusion Prevention Soak Patched Patch Available Test Begin Deployment Complete Deployment

All controls from single management platform Monitor all controls with a comprehensive dashboard and built-in alerting Provide continuous protection VM no matter what state or location No need for Security admins to have deep virtualization knowledge

Data Center Physical Virtual Private Cloud Public Cloud Anti- Malware Intrusion Prevention Web Reputation Integrity Monitoring Log Inspection Firewall Cloud and Data Center Security Security Data Center Ops

#1 Corporate Server Security Market Share 31% Source: IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013

Thank You