Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services



Similar documents
Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

How To Protect Your Cloud From Attack

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

Total Cloud Protection

Virtualization Journey Stages

Automated Protection on UCS with Trend Micro Deep Security

Comprehensive security platform for physical, virtual, and cloud servers

Netzwerkvirtualisierung? Aber mit Sicherheit!

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Deep Security

Agentless Security for VMware Virtual Data Centers and Cloud

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

PCI DSS 3.0 Compliance

Effective End-to-End Cloud Security

Cloud and Data Center Security

Trend Micro MAS TRM Guidelines Compliance Solutions

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Trend Micro deep security 9.6

Trend Micro. Advanced Security Built for the Cloud

Bitdefender GravityZone Sales Presentation

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

End to End Security do Endpoint ao Datacenter

Deep Security Vulnerability Protection Summary

Sichere Virtualisierung mit VMware

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Protecting the un-protectable Addressing Virtualisation Security Challenges

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

VMware Integrated Partner Solutions for Networking and Security

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Symantec Endpoint Protection

PICO Compliance Audit - A Quick Guide to Virtualization

Ovation Security Center Data Sheet

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Endpoint protection for physical and virtual desktops

Secure Cloud Computing

Trend Micro Wer denkt schon an die Security der SAP Anwendungen? Timo Wege, Technical Consultant DACH Trend Micro Deutschland GmbH

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

overview Enterprise Security Solutions

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Next Generation Datacenters & the Realities of Virtualisation Security

FISMA / NIST REVISION 3 COMPLIANCE

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

The Virtualization Practice

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

I D C T E C H N O L O G Y S P O T L I G H T. S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Cloud and VM Based Security

OVERVIEW. Enterprise Security Solutions

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Ovation Security Center Data Sheet

McAfee Server Security

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

VDI Security for Better Protection and Performance

How To Protect A Virtual Desktop From Attack

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Virtual Patching: a Proven Cost Savings Strategy

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Symantec Endpoint Protection

overview Enterprise Security Solutions

Trend Micro Deep Security

Meeting the Challenges of Virtualization Security

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Modular Network Security. Tyler Carter, McAfee Network Security

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

AppGuard. Defeats Malware

Virtualization Impact on Compliance and Audit

The Benefits of an Integrated Approach to Security in the Cloud

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CloudCheck Compliance Certification Program

Cisco Advanced Services for Network Security

Transcription:

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013 Copyright 2012 Trend Micro Inc. 2 2

SPAM? Cloud! Death? Taxes?

Chance or Risk?

What s Holding Back IaaS Deployment? In 2012, over ½ said apprehension over security is holding back their cloud adoption Top two risks / barriers to adopting the cloud: 50% - performance / availability of cloud 54% - security of data or cloud infrastructure 3/26/2013 5 Copyright 2012 Trend Micro Inc.

Securing workloads Copyright 2011 Trend Micro Inc.

Security Requirements do not change! Firewall HIPS / Virtual Patching Web Application Protection Antivirus File Integrity Monitoring Log Inspection Single Management Console Advanced Reporting Module

Trend Micro Deep Security System, application and data security across: 5 protection modules Shields web application vulnerabilities Deep Packet Inspection IDS / IPS Web Application Protection Application Control Detects and blocks known and zero-day attacks that target vulnerabilities Provides increased visibility into, or control over, applications accessing the network Reduces attack surface. Prevents DoS & detects reconnaissance scans Firewall Anti-Virus Detects and blocks malware (web threats, viruses & worms, Trojans) Optimizes the identification of important security events buried in log entries Log Inspection Integrity Monitoring Detects malicious and unauthorized changes to directories, files, registry keys Protection is delivered via Agent 8 and/or Virtual Appliance

Virtual Patching Rules are developed and delivered automatically to protect Before patches are available Unsupported OSs and apps Legacy web applications Devices that are difficult to patch ATM kiosk, point of sale, medical devices, etc. Prevent business disruption and data breach. Keep systems, applications, and data secure 3/26/2013 9 Copyright 2012 Trend Micro Inc. 9

Virtual Patching with Deep Security Raw Traffic Over 100 applications shielded including: Operating Systems 1 Stateful Firewall Allow known good Database servers Web app servers Deep packet inspection Filtered Traffic 2 3 4 Exploit Rules Stop known bad Vulnerability Rules Shield known vulnerabilities Smart Rules Shield unknown vulnerabilities and protect specific applications Mail servers FTP servers Backup servers Storage mgt servers DHCP servers Desktop applications Mail clients Web browsers Anti-virus Other applications 10

Deep Security Integration with VMware APIs Integrates with vcenter Integrates with vcloud Integrates with Intel TPM/TXT Trend Micro Deep Security Antivirus Web reputation Log inspection Agentless Intrusion prevention Firewall Agentless Agentless Integrity monitoring Agent-based 1 2 3 4 VMsafe APIs vshield Endpoint vshield Endpoint Security agent on individual VMs Security Virtual Machine v S p h e r e v C l o u d 5 years of collaboration and joint product innovation First and only agentless security platform First and only security that extends from datacenter to cloud Hypervisor Integrity Monitoring

Efficient Security for VMware environemnts With Agentless Security The Old Way Security Virtual Appliance VM VM VM VM VM VM VM VM VM VM VM VM VM Agentless Security for VMware Antivirus and more Antivirus Integrity Monitoring Intrusion Prevention Virtual Patching Firewall Web Application Protection Maximizes Performance and ROI

Deep Security Architecture Single Pane Scalable Redundant Deep Security Manager 1 Reports 2 Deep Security Agent 3 4 SecureCloud Deep Security Agent Modules: DPI & FW Anti-malware Integrity Monitoring Log Inspection Deep Security Virtual Appliance Modules: DPI & FW Anti-malware Integrity Monitoring CSP Integration Modules: Data Protection

Deep Security Summary of highlights A fully integrated server security platform Only solution to offer specialized protection for physical virtual and hosted First and only agentless security platform (anti-malware, web reputation, firewall, intrusion prevention, VM & hypervisor integrity monitoring) for VMware environment First and only datacenter security solution that extends to public/hybrid cloud Only solution in its category to be certified EAL 4+ Trend Micro 22.9% Trend Micro 13% Trend Micro All Others 77.1% All Others Combined 87%

Deep Security for xsps Copyright 2011 Trend Micro Inc.

Deep Security for xsps SaaIS Security as a Infrastructure Service Agentless Security on VMWare Additional modules/plans Guarentee SLAs by minimizing Admin interference Hosted Deep Security Manager Multitenant setup Manage local, on-premise and remote systems 3/26/2013 16 Confidential Copyright 2012 Trend Micro Inc.

Securing data Copyright 2011 Trend Micro Inc.

The cloud eraser!

SecureCloud Enterprise Datacenter or SaaS Offering Service Provider VM Corporate App VM VM VM Hypervisor Trend Micro SecureCloud Console Shared Storage Enterprise Key My Data

SecureCloud for xsps Copyright 2011 Trend Micro Inc.

SecureCloud for xsps Customer uses on-premise/saas KMS Plausible deniability - No access to sensitive data Backup/Restore Maintenance xsp offers hosted KMS as a services Experience with 24x7 sensitive services High-margin service (compared to IaaS) 3/26/2013 23 Confidential Copyright 2012 Trend Micro Inc.

Total Cloud Protection with Deep Security 9 and SecureCloud 3 System, application and data security in the cloud Deep Security 9 Context Aware Credit Card Payment Sensitive Social Patient SecureCloud Security Medical Research Numbers Records Results 3 Information Modular protection for servers and applications Self-Defending VM Security in the Cloud Agent on VM allows travel between cloud solutions One management portal for all modules Encryption with Policy-based Key Management Data is unreadable to unauthorized users Policy-based key management controls and automates key delivery Server validation authenticates servers requesting keys

Trend Ready Programm Copyright 2011 Trend Micro Inc.

Trend Ready Program for Cloud Service Providers A technology partnership initiative aimed at facilitating enterprise adoption of public and hybrid IaaS cloud computing by reducing security adoption barriers Provides end user education on cloud security and governance risks; describes methods to mitigate them Delivers cloud security tools relevant to reducing cloud risk Deep Security and SecureCloud offer integrated application, server and data threat mitigation Verifies through testing that Trend Micro security products are interoperable and effective in partner clouds Directs enterprises towards Trend Ready CSPs for rapid and secure cloud deployment Value: End user: gain additional knowledge about cloud risk factors; ability to safely access efficiencies and economics offered by public IaaS CSP: offer additional security components that help increase user base, add revenue and differentiate cloud service from peer CSPs

Thank You! 3/26/2013 28 Confidential Copyright 2012 Trend Micro Inc.