Securing the Virtualized Data Center With Next-Generation Firewalls



Similar documents
Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Network Virtualization Solutions - A Practical Solution

About the VM-Series Firewall

Using Palo Alto Networks to Protect the Datacenter

Next-Generation Datacenter Security Implementation Guidelines

Agenda , Palo Alto Networks. Confidential and Proprietary.

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Virtualization, SDN and NFV

About the VM-Series Firewall

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

PALO ALTO SAFE APPLICATION ENABLEMENT

Enterprise Security Platform for Government

How Network Virtualization can improve your Data Center Security

VMware vcloud Networking and Security

Palo Alto Networks. October 6

Palo Alto Networks. Security Models in the Software Defined Data Center

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Secure Cloud-Ready Data Centers Juniper Networks

Limiting the Spread of Threats: A Data Center for Every User

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

Business Values of Network and Security Virtualization

VMware vcloud Networking and Security Overview

Securing FlexPod Deployments with Next-Generation Firewalls

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Set Up a VM-Series NSX Edition Firewall

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Deployment Guide for Citrix XenDesktop

Set Up a VM-Series NSX Edition Firewall

Set Up a VM-Series NSX Edition Firewall

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER

VMware NSX A Perspective for Service Providers part 2

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

Securing Traditional and Cloud-Based Datacenters With Next-generation Firewalls

Software defined networking. Your path to an agile hybrid cloud network

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

How To Protect A Data Center From A Hacker Attack

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Software Defined Networks Virtualized networks & SDN

Netzwerkvirtualisierung? Aber mit Sicherheit!

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

SOFTWARE DEFINED NETWORKING

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

Data Center Micro-Segmentation

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Data Center Virtualization and Cloud QA Expertise

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Content-ID. Content-ID URLS THREATS DATA

VMware vcloud Air Networking Guide

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

WildFire. Preparing for Modern Network Attacks

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Software Defined Network (SDN)

Software-Defined Networks Powered by VellOS

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

The Road to SDN: Software-Based Networking and Security from Brocade

Deployment Guide for Microsoft Lync 2010

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

How To Orchestrate The Clouddusing Network With Andn

Next Generation Enterprise Network Security Platform

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Using SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Leveraging SDN and NFV in the WAN

SDN and NFV in the WAN

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Moving Beyond Proxies

How To Build A Software Defined Data Center

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

Next-Generation Firewalls: Critical to SMB Network Security

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Software Defined Environments

SDN PARTNER INTEGRATION: SANDVINE

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Cloud and VM Based Security

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Simplifying IT with SDN & Virtual Application Networks

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

BROCADE NETWORKING: EXPLORING SOFTWARE-DEFINED NETWORK. Gustavo Barros Systems Engineer Brocade Brasil

Embracing the Federal Cloud First Initiative. August 2012

SDN Software Defined Networks

Transcription:

Securing the Virtualized Data Center With Next-Generation Firewalls

Data Center Evolution Page 2

Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks to provision security policies versus minutes for workloads Security policies require manual and repetitive steps Policies do not follow VM adds, moves, changes Policies are not tied to VM instantiation Policies cannot track VM movement (server or data center) Lack of visibility into the virtual infrastructure Segmentation of virtualized apps of different trust levels Virtualized traffic may not flow outside of virtualized server (Sharepoint application communicating with SQL database) Page 3

But Your Existing Challenges Didn t Go Away Attackers Mobile and remote users Enterprise boundary Partners & Contractors Distributed Enterprise Internal employees New Application Landscape Modern Attacks Page 4

A New Paradigm for Security is Needed Deliver all the features that are table stakes: - Safe app enablement, threat protection, flexible integration Must become more dynamic - Security policy must be there when VM is created - Security policy must follow VM movement - Security workflows must be automated//orchestrated so it doesn t slow down the data center Consistent, centralized management - Centralized management is critical - Must be consistent for all environments - physical, hybrid, mixed Page 5

Safely Enable All Traffic in the DC WHO WHERE WHAT HOW Security Profile Exploits, malware, spyware User/Group/Device Server/Hardware Application Content Segment applications by function, trust levels, and compliance needs Inspect all traffic between security zones by default Manage unknown traffic Page 6

Enabling Applications, Users and Content Applications: Safe enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats both known and unknown; with Content-ID and WildFire. Page 7

NGFW Platforms for the Data Center PA-5000 Series Just because your network is running faster than ever, doesn t mean you have to give up security and visibility All Palo Alto Networks next-generation firewalls support App-ID, User- ID, Content-ID The PA-5000 Series brings app, user, and content visibility and control to 20 Gbps networks Unmatched performance Extended parallel processing hardware architecture Enterprise- and service provider-specific hardware features

Introducing the VM-Series Safe Application Enablement of Intra-Host Traffic VM-100 VM-200 VM-300 50,000 sessions 100,000 sessions 250,000 sessions 250 rules 2,000 rules 5,000 rules 10 security zones 20 security zones 40 security zones Next-generation firewall in a virtual form factor Consistent features as hardware-based next-generation firewall Inspects and safely enables intra-host communications (East-West traffic) Tracks VM creation and movement with dynamic address objects Initial support on VMware platform - ESXi 4.1 and ESXi 5.0 Available in 3 models (VM-100, VM-200, VM-300), and supports 2, 4, 8 CPU cores Licensing by firewall capacity Individual, Enterprise, Service-Provider Page 9

VM orchestration When new VMs are created, and assigned to address objects, security policies are in place Page 10 2012, Palo Alto Networks. Confidential and Proprietary.

VM Migration Dynamic address objects tracks VM movement to allow security policy to follow VM Page 11 2012, Palo Alto Networks. Confidential and Proprietary.

Automation and Orchestration via REST API Application/service/tenant o Instantiation o Provisioning o Deprovisioning Service state tracking Policy Mapping RESTful XML API over SSL Device Configuration ACC/Report data Automated Compliance Page 12

A Comprehensive Approach to Virtualized DC PA-5000 Series VM-Series Safe application enablement Physical Form Factor Virtual Form Factor App-ID, User-ID, Content-ID, GlobalProtect, WildFire Threat protection without performance implications Multi-core hardware. Separate management & data plane. Single pass software architecture Flexible integration Comprehensive networking foundation (routing, VLAN) Integration at layer 1, 2, 3 Single pass software architecture Separate management & data plane. Cloud-readiness Multi-tenancy via virtual systems Multi-tenancy via virtual instances Centralized management, one integrated policy Dynamic objects ties VM movement to policy Cloud orchestration via REST API Panorama with centralized provisioning and logging Page 13

Securing The Next-Gen Data Center Requires a Next-Generation Firewall Modern threats, applications, and datacenter architectures are creating network security challenges The dynamic nature of virtualization and cloud requires security to be more agile, and keep up with VM movement Next-generation network security - Safely enables all applications in the datacenter - Protects against all datacenter threats without performance impact - Provides simplified integration into the infrastructure - Ties security policies to VM creation and movement - Security policies orchestrated in line with virtualized workloads Consistent management for virtualized or physical firewalls Page 14

Questions

Page 16

Security and Software-Defined Networking VLAN Palo Alto Networks easily embeds into SDNenabled networks SDN Controller At the gateway, SDN protocols (VXLAN, NVGRE, etc) will be translated to VLANs for context At the host, SDN protocols will be terminated at the hypervisor; dynamic objects + orchestration will provide context Page 17

SDN Partners Page 18