Datensicherheit in der Cloud einfach, flexibel, sicher! Markus Schönberger Advisory Technology Consultant Architect Trend Micro

Similar documents
Netzwerkvirtualisierung? Aber mit Sicherheit!

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Trend Micro. Advanced Security Built for the Cloud

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Windows Server 2003 End of Support. What does it mean? What are my options?

Comprehensive security platform for physical, virtual, and cloud servers

Trend Micro deep security 9.6

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Devising a Server Protection Strategy with Trend Micro

Cloud and Data Center Security

How To Protect A Virtual Desktop From Attack

Trend Micro Wer denkt schon an die Security der SAP Anwendungen? Timo Wege, Technical Consultant DACH Trend Micro Deutschland GmbH

OVERVIEW. Enterprise Security Solutions

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Devising a Server Protection Strategy with Trend Micro

Automated Protection on UCS with Trend Micro Deep Security

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Trend Micro Cloud Security for Citrix CloudPlatform

Meeting the Challenges of Virtualization Security

Virtualization Journey Stages

How To Protect Your Cloud From Attack

The Clock is Ticking on Windows Server 2003 Support

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

PCI DSS 3.0 Compliance

Trend Micro MAS TRM Guidelines Compliance Solutions

Total Cloud Protection

OVERVIEW. Enterprise Security Solutions

McAfee Server Security

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Effective End-to-End Cloud Security

Trend Micro Deep Security

FISMA / NIST REVISION 3 COMPLIANCE

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Cisco ASA und FirePOWER Services

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Security in the Software Defined Data Center

Virtual Patching: a Proven Cost Savings Strategy

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Deep Security Vulnerability Protection Summary

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Critical Controls for Cyber Security.

overview Enterprise Security Solutions

Trend Micro Solutions for PCI DSS Compliance

Architecting Security for the Private Cloud. Todd Thiemann

Bitdefender GravityZone Sales Presentation

21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

Reference Testing Guide for Deep Security

Agentless Security for VMware Virtual Data Centers and Cloud

Endpoint protection for physical and virtual desktops

A Trend Micro ebook / 2009

Next Generation Datacenters & the Realities of Virtualisation Security

Deep Security 9.5 Supported Features by Platform

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

in Cloud and Data Center Security for a Reason

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Trend Micro Deep Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

AppGuard. Defeats Malware

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

Critical Security Controls

Virtual Compliance In The VMware Automated Data Center

SANS Top 20 Critical Controls for Effective Cyber Defense

How to Grow and Transform your Security Program into the Cloud

Endpoint protection for physical and virtual desktops

McAfee Public Cloud Server Security Suite

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Vulnerability Management

Security Solution Architecture for VDI

THE TOP 4 CONTROLS.

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Enterprise Security Solutions

overview Enterprise Security Solutions

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Virtual Patching: a Compelling Cost Savings Strategy

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PICO Compliance Audit - A Quick Guide to Virtualization

Superior protection from Internet threats and control over unsafe web usage

1 Introduction Product Description Strengths and Challenges Copyright... 5

VMware Integrated Partner Solutions for Networking and Security

Sichere Virtualisierung mit VMware

Data Center Connector for vsphere 3.0.0

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

BeyondInsight Version 5.6 New and Updated Features


WHITE PAPER. The Protection and Operational Benefits of Agentless Security in Virtual Environments SPON. Published March 2012 SPONSORED BY

Safeguarding the cloud with IBM Dynamic Cloud Security

Transcription:

Datensicherheit in der Cloud einfach, flexibel, sicher! Markus Schönberger Advisory Technology Consultant Architect Trend Micro

The modern data center changes the game

Security Principles remain the same ADAPTIVE Intelligent, dynamic provisioning & policy enforcement CONTEXT Workload & application-aware SOFTWARE Optimized for virtualization & cloud infrastructure PLATFORM Comprehensive capabilities across data center & cloud

but the Approach to security must change. ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Intrusion Prevention CONTEXT Workload & application-aware Host Firewall Integrity Monitoring SOFTWARE Anti-malware Log Inspection PLATFORM Optimized for virtualization & cloud infrastructure Data Encryption Application Scanning Comprehensive capabilities across data center & cloud

Automatic detection of new systems Deep Security can automatically detect new servers from: vcenter AWS Microsoft Azure vcloud Air Active Directory API s

Automate security specific to your environment Recommend and apply policies automatically - specific to your data center environment 1 Rules Web Servers Exchange Servers VM VM VM VM VM 19 Rules Automatically scale up and down across data center and cloud as required with no security gaps Provisioning Infrastructure, vcenter, Active Directory, vcloud, AWS, Azure 8 Rules Web Server 73 Rules Oracle SAP VM VM VM 28 Rules

Manage all controls across all environments Manage all controls on a single virtual appliance Easily apply consistent policy across multiple environments Integrates with VMware via vsphere, vcenter, vcloud. Supports AWS & Azure Integrates with LDAP & AD Integrates with SIEM Oracle or SQL Eliminate need to manage agents on VMs ESX

Deep Security Modules Anti-Malware with Web Reputation Intrusion Prevention Host-based Firewall Integrity Monitoring Log Inspection Timely protection against new malware being created and used to attack systems and steal data Shield vulnerabilities from attack with auto-updating security policies to ensure the right protection is applied to the right servers Create a firewall perimeter around each server to block attacks and limit communication to only the ports and protocols necessary Meet your compliance monitoring requirements and ensure unauthorized system changes are detected and reported Isolate security-relevant events in system logs to quickly identify suspicious behavior as well as meet compliance requirements.

Intrusion Prevention Protect against vulnerabilities Automated recommendation and deployment of rules, based on your specific environment Detection and prevention of protocol violations & attacks Large set of pre-configured rules, with automatic categorization and ranking for easy implementation Virtual patching to protect before you patch Smart filtering using behavioral and statistical heuristics to reduce effort to manage false-positives Log for audit and compliance and forward to SIEM

Protect against vulnerabilities - before you patch Reduce risk of exposure to vulnerability exploits especially as you scale Save money avoiding costly emergency patching Vulnerability Disclosed or Exploit Available Virtually patch with Trend Exposure Micro Intrusion Prevention Patched Soak Patch at your convenience Patch Available Test Begin Deployment Complete Deployment

SAP Integration

Trend Micro IT Security Konferenz Making The World Safe For Exchanging Digital Information Am 7.10.201, im Messezentrum Nürnberg, NCC West, Raum Venedig im Foyerbereich (linke Seite) 9.30 bis 11.30 Uhr: Zweites Trend Micro Weltsicherheitsfrühstück Im Rahmen eines Business Breakfast zeigen wir Ihnen auf, wie zielgerichtete und komplexe Angriffe ablaufen, was die Motive eines Angriffs sind und wie sich die Branche Cybercrime entwickelt 14.00 bis 14.4 Uhr: Security (Trend Micro) meets Public Cloud (Amazon Web Services) Vollautomatischer Betrieb von Infrastruktur und Sicherheit Sicherheit im SAP Kotext 1.00 bis 1.4 Uhr: Fallstudie SAP Enterprise Threat Defense im Zusammenspiel mit Trend Micro Deep Discovery 16.00 bis 16.4 Uhr: Industrie 4.0 und die Sicherheit Wer? Wie? Was? Warum? Weitere Informationen & Agenda unter http://trendmicro.de/it-sa201

Thank You