Limiting the Spread of Threats: A Data Center for Every User



Similar documents
Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

How Network Virtualization can improve your Data Center Security

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Itex VMware NSX Network Virtualization Presentation

How To Protect A Data Center From A Hacker Attack

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

How To Build A Software Defined Data Center

Securing the Virtualized Data Center With Next-Generation Firewalls

Business Values of Network and Security Virtualization

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Netzwerkvirtualisierung? Aber mit Sicherheit!

SDDC: A New Architecture for a New Era of Ed IT

Softverski definirani data centri - 2. dio

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Secure Cloud-Ready Data Centers Juniper Networks

Data Center Micro-Segmentation

Software defined networking. Your path to an agile hybrid cloud network

Security in the Software Defined Data Center

Optimizing the Mobile Cloud Era Through Agility and Automation

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Use Case Brief NETWORK SECURITY

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

VMware NSX Campaign. Partner Marketing. Program Overview and Campaign Deployment Guide

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

5 Best Practices to Protect Your Virtual Environment

VMware NSX A Perspective for Service Providers part 2

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

Securing Virtual Applications and Servers

Tufin Orchestration Suite

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

Protect Root Abuse privilege on Hypervisor (Cloud Security)

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

Secure your Virtual World with Cyberoam

Next-Generation Datacenter Security Implementation Guidelines

Simplifying IT with SDN & Virtual Application Networks

Software Defined Network (SDN)

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

How the Software-Defined Data Center Is Transforming End User Computing

Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

Proactively Secure Your Cloud Computing Platform

Virtual Machine in Data Center Switches Huawei Virtual System

2015 DevOps SECURITY GUIDE For continuous application delivery

Stephen Coty Director, Threat Research

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

whitepaper Cloud Servers: New Risk Considerations

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Software Defined Environments

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

The Benefits of SD-WAN with Integrated Branch Security

F5 and VMware. Realize the Virtual Possibilities.

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

Software-Defined Networks Powered by VellOS

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

VMware vcloud Networking and Security

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Software Defined Networks Virtualized networks & SDN

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE

Designing Virtual Network Security Architectures Dave Shackleford

Cloud and Data Center Security

1518 Best Practices in Virtualization & Cloud Security with Symantec

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

Breaking the Cyber Attack Lifecycle

VMware End User Computing

A Look at the New Converged Data Center

About the VM-Series Firewall

VMware EVO SDDC Overview WHITE PAPER

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Lecture 02b Cloud Computing II

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

Chapter 9 Firewalls and Intrusion Prevention Systems

VMware vcloud Networking and Security Overview

IT Convergence Solutions from Dell More choice, better outcomes. Mathias Ohlsén

Securing the Intelligent Network

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

Palo Alto Networks. Security Models in the Software Defined Data Center

This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Does your Citrix or Terminal Server environment have an Achilles heel?

Software Defined Networks

Protecting the un-protectable Addressing Virtualisation Security Challenges

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Securing Virtualization with Check Point and Consolidation with Virtualized Security

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

Transcription:

SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware

Why do breaches still occur? Today s data centers are protected by strong perimeter defense. But threats and exploits still infect servers. Lowpriority systems are often the target. Threats can lie dormant, waiting for the right moment to strike. 10110100110 101001010000010 1001110010100 Attacks spread inside the data center, where internal controls are often weak. Critical systems are targeted. Server-server traffic growth has outpaced client-server traffic. The attack spreads and goes unnoticed. Possibly after months of reconnaissance, the infiltration relays secret data to the attacker.

Breaches are still occurring because of a security model that evolved 15 years ago Orchestration & Software Management Software Software Software OS OS OS OS OS OS Software Operating System Compute Virtualization Compute Virtualization System System System System Compute CPU CPU CPU CPU Mainframe / Workstation Client Server Cloud Software Software Software Software System System System System Network Security Chip Chip Chip Same security model and tools Chip

The legacy security model emphasized perimeter security Perimeter-centric network security has proven insufficient Internet Data Center Perimeter

And is incompatible with a world where security is needed everywhere Adding more internal security requires placing more firewalls across workloads Physical Firewalls Cost prohibitive with complex configurations Internet Virtual Firewalls Slower performance, costly and complicated Data Center Perimeter

What s needed: a new architectural approach Software-Defined Data Center Applications Virtual Machines Virtual Networks Virtual Storage Data Center Virtualization Compute Capacity Network Capacity Storage Capacity Location Independence

The next-generation networking model Software Network and Security Services Now in the Hypervisor Load Balancing L3 Routing L2 Switching Firewalling/ACLs Hardware

Visibility Hypervisor is uniquely positioned to see everything Applications Virtual Infrastructure Physical Network Infrastructure Internet

Granular control becomes possible High throughput rates on a per-hypervisor basis Every hypervisor adds additional east-west firewalling capacity

Delivering better security automation Platform-based automation Automated provisioning and workload adds/moves/changes Accurate firewall policies follow workloads as they move Centralized management of single logical, distributed firewall

Delivering higher levels of data center security Micro-segmentation 1 Isolation and segmentation 2 Unit-level trust / least privilege 3 Ubiquity and centralized control

Simplifying network security Production Development Finance HR Web Security policies no longer tied to network topology Logical groups can be defined App Prevents threats from spreading DB

What does micro-segmentation look like applied beyond just application servers inside the data center?

Desktop and App Virtualization are the next logical steps Internet Data Center Perimeter Virtual Desktops mean centralization of activity within the data center.

With VDI your data center has a much larger security surface area A converged infrastructure means virtual desktops run on the same infrastructure as servers. Internet West East Data Center Perimeter

Network considerations for VDI environments With desktop virtualization, the network matters more than ever. Virtual desktops are a networked entity sitting inside your datacenter. By 2018, 75% of all data center traffic will be east-west in nature Desktop Virtualization scales up the volume of east-west traffic within the data center Multiple discrete flows for each VM: between users, servers, storage, other hosts, and WWW User desktops now sit amidst a much larger attack surface, inside the data center.

A matrix of policies is needed on centralized, choke-point firewalls for the correct security posture Finance HR Engineering

NSX simplifies VDI Engineering Marketing Finance HR Firewall and filter traffic based on logical groupings Simplified, programmable, automated application of network/security policy to desktop users/pools Service-chaining with AV and NGFW partners to deliver automated, policy-integrated AV / malware protection, NGFW, IPS, etc.

Virtual networking: fast, easy, and extensible Network HR Finance Email SharePoint Bob (HR) Jennifer (Finance) Human Resources Finance

Use case: VDI Situation OS no longer supported on several systems These systems need policy which restricts access to only email servers. Unsupported OS Group

What about micro-segmentation applied even closer to the user?

Our problem: it s not a 1:1 world anymore Enterprise Network Internet User

Our problem: it s not a 1:1 world anymore Enterprise Network VDI to VDI Desktop-to-desktop hacking inside the DC Internet User VDI to VM Desktop-to-server hacking inside the DC A converged infrastructure means virtual desktops run on the same infrastructure as servers. Bringing desktops into the data center opens up new risks for attack.

Our problem: it s not a 1:1 world anymore Enterprise Network Internet User All mobile apps can access enterprise network. All data center apps can be accessed.

Modern mobility: personal and managed

Modern mobility

Modern mobility

Evolving to intelligent networking Device-Level VPN Full Network Access

Intelligent networking App-Level VPN Full Network Access

Intelligent networking App-Level VPN Select Network Access

Intelligent networking and automation Firewall Port

Intelligent networking and automation Port

Better context, better tools, better visibility Users Apps Devices Systems Data Network Who is this person? Who is using what apps? Has the device been jail broken? Who has been accessing what? What class of data is this? Are they on cellular or Wi-Fi?

Imagine granular user security A personalized DMZ, tailored for each unique situation

Learn more Attend other sessions to learn how VMware is transforming security: Micro-segmentation: How to create a more secure Data Center Network Wednesday, 4:30pm, Briefing Center, North Hall WestJet s Security Architecture Made Simple We finally got it right! Thursday, 10:20am, Moscone West, Room 3004 Limiting the Spread of Threats: A Data Center for Every User Thursday, 10:20am, Moscone North, Room 130 Automating Security Workflows: The SDDC Approach Thursday, 11:30am, Moscone North, Room 130 Visit the VMware booth: South Hall (#1315) Learn more about micro-segmentation and Horizon: http://www.vmware.com/go/nsx http://www.vmware.com/go/horizon

Apply What You Have Learned Today Next week Review your organization s workflows for end user computing security In 3 months Assess your organization s ability to cope with changes and deal with threats inside the data center In 6 months Adopt a plan for providing finegrained security in the data center and on mobile devices

Thank you Geoff Huang Tony Paikeday