VIRTUALIZATION SECURITY IN THE REAL WORLD



Similar documents
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Implementing and Managing Windows Server 2008 Hyper-V

Server Virtualization A Game-Changer For SMB Customers

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Trend Micro Deep Security

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

How To Protect Your Cloud From Attack

Endpoint protection for physical and virtual desktops

Server-centric client virtualization model reduces costs while improving security and flexibility.

Virtual Desktops Security Test Report

Endpoint protection for physical and virtual desktops

Agentless Security for VMware Virtual Data Centers and Cloud

M6422A Implementing and Managing Windows Server 2008 Hyper-V

Parallels Virtuozzo Containers

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

Virtualization Support - Real Backups of Virtual Environments

Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites

Cloud Computing. Chapter 8 Virtualization

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V

Microsoft Windows Server 2008: MS-6422 Implementing and Managing Hyper V Virtualization 6422

Virtualizing Exchange

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Bitdefender GravityZone Sales Presentation

Cloud and Data Center Security

Parallels Virtuozzo Containers

How To Protect A Virtual Desktop From Attack

Comprehensive security platform for physical, virtual, and cloud servers

Two Great Ways to Protect Your Virtual Machines From Malware

Overview Customer Login Main Page VM Management Creation... 4 Editing a Virtual Machine... 6

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Networking for Caribbean Development

McAfee Server Security

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Trend Micro deep security 9.6

GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis

McAfee MOVE / VMware Collaboration Best Practices

Data Center Connector for vsphere 3.0.0

VDI Security for Better Protection and Performance

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Total Cloud Protection

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

What s New with VMware Virtual Infrastructure

2009 AAMGA Automation Conference

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

Parallels Virtuozzo Containers

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

IOS110. Virtualization 5/27/2014 1

Make Optimizing Security Protection in Virtualized Environments a Priority

Expert Reference Series of White Papers. VMware vsphere Essentials

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Protecting the un-protectable Addressing Virtualisation Security Challenges

CA Cloud Overview Benefits of the Hyper-V Cloud

Protecting your Data in a New Generation Virtual and Physical Environment

MobiKEY. Virtual Desktop Infrastructure (VDI) Integration. September 2012

Version Kaspersky Lab FOR INTERNAL USE ONLY

Release Version 4.1 The 2X Software Server Based Computing Guide

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Cutting Costs with Red Hat Enterprise Virtualization. Chuck Dubuque Product Marketing Manager, Red Hat June 24, 2010

Devising a Server Protection Strategy with Trend Micro

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

VM Backup methodologies Oren Wolf, TSM Product Manager 11 Mar 2011

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Servervirualisierung mit Citrix XenServer

Top 10 Reasons to Virtualize VMware Zimbra Collaboration Server with VMware vsphere. white PAPER

vsphere 6.0 Advantages Over Hyper-V

Parallels VDI Solution

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Devising a Server Protection Strategy with Trend Micro

Virtualization Essentials

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Meeting the Challenges of Virtualization Security

Virtualization Technologies. Embrace the new world of healthcare

End to End Security do Endpoint ao Datacenter

Transcription:

VIRTUALIZATION SECURITY IN THE REAL WORLD

Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing 70% of all server workloads with forecasted growth to 82.4% in 2015. Gartner predicts that server virtualization will drive storage requirements up by 600%, meaning virtual environments will need six times the storage to support those environments. 1 As the prevalence of the technology increases, virtualization security issues are becoming more critical and complex. When virtual machines have downtime, sensitive data is exposed, making the system more vulnerable to security and regulatory risk. To reap the rewards of virtualization, you must also consider increased complexity, storage requirements, compliance regulations, and cybersecurity needs. Virtualization 101 For the purposes of this ebook, the term virtualization is used to speak of a virtual hardware platform where an operating system can run. This platform is called a virtual machine (VM) which is an isolated software environment that is assigned computing resources (e.g., CPU, RAM, or HDD) from the hypervisor. The hypervisor is the core of the virtualization system. It provides connection between the physical server and virtual machine hardware. The hypervisor isolates VMs so that each only has access to its own resources. The hypervisor is used to create and manage VMs and ensure resources are available for all VMs configured in the host environment. This architecture allows multiple different operating systems and applications running on a single host. As far as the user is concerned, a VM acts like a real computer with an operating system. 1 Gartner, 2014

There are two main types of hardware virtualization: Server Virtualization: With server virtualization, you can create multiple virtual servers on a single host. The benefits include reduced hardware equipment, floor space, and energy by consolidating multiple workloads onto fewer physical servers. Traditional servers tie up valuable capital, drain operational resources, and are typically underutilized. Virtual Desktop Infrastructure (VDI): With a virtual desktop infrastructure (VDI), user desktop environments are accessed over a network using a remote display protocol. A connection brokering service is used to connect users to their assigned desktop sessions. For users, this means they can access their desktop from any location, without being tied to a single client device. Since the resources are centralized, users moving between work locations can still access the same desktop environment with their applications and data. Benefits of Virtualization Reduced costs Simplified management Prompt deployment of test and industrial configuration Standard drivers provide portability Efficient use of resources Prompt disaster recovery High availability and load balancing

Security Risks Although virtualization is widely accepted as an efficient and cost-effective option, VMs are not inherently more secure than physical machines. In reality, VMs are just as vulnerable to malware in the form of malicious email attachments, drive-by-downloads, botnet Trojans and even targeted spearphishing attacks. Virtualization security is not optional. Virtualization Security Options For virtualization security, there s no one size fits all solution. The optimum approach for your organization and the unique architecture of your IT infrastructure will depend on a number of factors, including: The level of risk you re likely to encounter The value of the data that your systems store and process The consolidation ratios that you re aiming to achieve Your organization s virtual environment including servers and desktops Your choice of virtualization platform With a virtualized system, you have several protection options available, including: Agent-based (conventional security solution deployed within guest VM like it would be a physical machine) Agentless Light Agent

Agentless protection has its pros and cons, depending on your organization s particular circumstances: There are some cases such as organizations with less than 20 VMs or super-low consolidation ratios whereby a traditional, agent-based security product would be the best option. In general, security that s optimized for virtual environments is desirable because it offers significant performance, consolidation, and operating cost benefits. For solutions that are optimized for virtualization, it s a matter of choosing an agentless solution or a light agent (or small footprint ) security product. Kaspersky Virtualization Security Options Kaspersky Lab released its first dedicated solution for virtualization in early 2011. Today, there are options that support a variety of virtualization platforms. VMware internal storage servers benefit from the density available through agentless security. The Kaspersky Security for Virtualization Light Agent (KSV LA) solution provides advanced anti-malware and network protection for virtual machines through a combination of a dedicated virtual appliance and small software agents which are installed onto each virtual machine or template.

FEATURE Virtualization Platforms Supported KSV I AGENTLESS VMware KSV I LIGHT AGENT VMware, Microsoft Hyper-V, Citrix Guest OS Supported MS Windows MS Windows Consolidation Ratio with a Single Host Centralized Management via Kaspersky Security Center KESB Any except OS-level 1 MS Windows, Mac OS X, Linux * * * * * * * * + + + KSN Functionality + + + Protection of New VM without Additional Installations + +/ Anti-Malware * * * * * * * * Firewall + + Host-based Intrusion Prevention (HIPS) + + Network Attack Blocker + + + Application Control with Dynamic Whitelisting and Support for Default Deny + + Web Control + + Device Control + + Systems Management +/ +/ Virtualization Case Study To read a case study about an enterprise organization in the healthcare industry that has improved efficiency and performance with Kaspersky Security for Virtualization, click here.

Call Kaspersky today at 866-563-3099 or email us at corporatesales@kaspersky.com, to learn more about Kaspersky Endpoint Security for Business. www.kaspersky.com/business SEE IT. CONTROL IT. PROTECT IT. With Kaspersky, now you can. 2014 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners.