Datensicherheit in der Cloud einfach, flexibel, sicher! Markus Schönberger Advisory Technology Consultant Architect Trend Micro
The modern data center changes the game
Security Principles remain the same ADAPTIVE Intelligent, dynamic provisioning & policy enforcement CONTEXT Workload & application-aware SOFTWARE Optimized for virtualization & cloud infrastructure PLATFORM Comprehensive capabilities across data center & cloud
but the Approach to security must change. ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Intrusion Prevention CONTEXT Workload & application-aware Host Firewall Integrity Monitoring SOFTWARE Anti-malware Log Inspection PLATFORM Optimized for virtualization & cloud infrastructure Data Encryption Application Scanning Comprehensive capabilities across data center & cloud
Automatic detection of new systems Deep Security can automatically detect new servers from: vcenter AWS Microsoft Azure vcloud Air Active Directory API s
Automate security specific to your environment Recommend and apply policies automatically - specific to your data center environment 1 Rules Web Servers Exchange Servers VM VM VM VM VM 19 Rules Automatically scale up and down across data center and cloud as required with no security gaps Provisioning Infrastructure, vcenter, Active Directory, vcloud, AWS, Azure 8 Rules Web Server 73 Rules Oracle SAP VM VM VM 28 Rules
Manage all controls across all environments Manage all controls on a single virtual appliance Easily apply consistent policy across multiple environments Integrates with VMware via vsphere, vcenter, vcloud. Supports AWS & Azure Integrates with LDAP & AD Integrates with SIEM Oracle or SQL Eliminate need to manage agents on VMs ESX
Deep Security Modules Anti-Malware with Web Reputation Intrusion Prevention Host-based Firewall Integrity Monitoring Log Inspection Timely protection against new malware being created and used to attack systems and steal data Shield vulnerabilities from attack with auto-updating security policies to ensure the right protection is applied to the right servers Create a firewall perimeter around each server to block attacks and limit communication to only the ports and protocols necessary Meet your compliance monitoring requirements and ensure unauthorized system changes are detected and reported Isolate security-relevant events in system logs to quickly identify suspicious behavior as well as meet compliance requirements.
Intrusion Prevention Protect against vulnerabilities Automated recommendation and deployment of rules, based on your specific environment Detection and prevention of protocol violations & attacks Large set of pre-configured rules, with automatic categorization and ranking for easy implementation Virtual patching to protect before you patch Smart filtering using behavioral and statistical heuristics to reduce effort to manage false-positives Log for audit and compliance and forward to SIEM
Protect against vulnerabilities - before you patch Reduce risk of exposure to vulnerability exploits especially as you scale Save money avoiding costly emergency patching Vulnerability Disclosed or Exploit Available Virtually patch with Trend Exposure Micro Intrusion Prevention Patched Soak Patch at your convenience Patch Available Test Begin Deployment Complete Deployment
SAP Integration
Trend Micro IT Security Konferenz Making The World Safe For Exchanging Digital Information Am 7.10.201, im Messezentrum Nürnberg, NCC West, Raum Venedig im Foyerbereich (linke Seite) 9.30 bis 11.30 Uhr: Zweites Trend Micro Weltsicherheitsfrühstück Im Rahmen eines Business Breakfast zeigen wir Ihnen auf, wie zielgerichtete und komplexe Angriffe ablaufen, was die Motive eines Angriffs sind und wie sich die Branche Cybercrime entwickelt 14.00 bis 14.4 Uhr: Security (Trend Micro) meets Public Cloud (Amazon Web Services) Vollautomatischer Betrieb von Infrastruktur und Sicherheit Sicherheit im SAP Kotext 1.00 bis 1.4 Uhr: Fallstudie SAP Enterprise Threat Defense im Zusammenspiel mit Trend Micro Deep Discovery 16.00 bis 16.4 Uhr: Industrie 4.0 und die Sicherheit Wer? Wie? Was? Warum? Weitere Informationen & Agenda unter http://trendmicro.de/it-sa201
Thank You