Automated Protection on UCS with Trend Micro Deep Security

Similar documents
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

How To Protect Your Cloud From Attack

Virtualization Journey Stages

Comprehensive security platform for physical, virtual, and cloud servers

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

End to End Security do Endpoint ao Datacenter

Total Cloud Protection

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Cloud and Data Center Security

Netzwerkvirtualisierung? Aber mit Sicherheit!

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Symantec Endpoint Protection

Devising a Server Protection Strategy with Trend Micro

Agentless Security for VMware Virtual Data Centers and Cloud

Endpoint protection for physical and virtual desktops

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Trend Micro MAS TRM Guidelines Compliance Solutions

McAfee Server Security

Trend Micro deep security 9.6

Devising a Server Protection Strategy with Trend Micro

Defending Against Data Beaches: Internal Controls for Cybersecurity

Modular Network Security. Tyler Carter, McAfee Network Security

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

PCI DSS 3.0 Compliance

Effective End-to-End Cloud Security

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Symantec Endpoint Protection

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Windows Server 2003 End of Support. What does it mean? What are my options?

Building a Business Case:

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Trend Micro Deep Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

VDI Security for Better Protection and Performance

IBM Endpoint Manager for Core Protection

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How Attackers are Targeting Your Mobile Devices. Wade Williamson

OVERVIEW. Enterprise Security Solutions

Symantec Endpoint Protection

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Protecting the un-protectable Addressing Virtualisation Security Challenges

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Endpoint Security and the Case For Automated Sandboxing

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Total Defense Endpoint Premium r12

Meeting the Challenges of Virtualization Security

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

PICO Compliance Audit - A Quick Guide to Virtualization

Network Security and the Small Business

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE

Integrated Protection for Systems. João Batista Territory Manager

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Trend Micro. Advanced Security Built for the Cloud

Proven LANDesk Solutions

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

End-user Security Analytics Strengthens Protection with ArcSight

Endpoint protection for physical and virtual desktops

McAfee MOVE / VMware Collaboration Best Practices

Symantec Endpoint Protection Datasheet

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

VIRTUALIZATION SECURITY IN THE REAL WORLD

Trend Micro Cloud Security for Citrix CloudPlatform

Average annual cost of security incidents

overview Enterprise Security Solutions

INTRODUCING isheriff CLOUD SECURITY

Superior protection from Internet threats and control over unsafe web usage

IBM Security Intrusion Prevention Solutions

How To Protect A Virtual Desktop From Attack

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Veranderende bedreigingen Security in het virtuele datacenter

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Transcription:

Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer

Agenda 1. Industrialization of Cyber threats The boomerang of Project Olympic Games 2. How To Win the War Against Cyber crime? Holistic Protection for UCS, more than just Anti-virus 3. Trend Micro Deep Security: why it is different? Integration in the UCS stack 4. Fully automated agentless protection for UCS Do not rely on Operations to (forget to) protect your VMs 5. Fully automated (virtual) patching for UCS Patching windows XP after April 8th 6. Reducing scan overhead

Trend Micro What We Do How We Do It Who We Are Recognized global leader in server, virtualization and cloud security Innovative security solutions Protecting the exchange of digital information for businesses and consumers 1,200 threats experts in 12 TrendLabs locations around the globe; 1492 R&D engineers $400M USD and 500 engineers invested over last 4 years to develop cloud-related solutions Global Threat Intelligence Eva Chen: CEO and Founder Co-founded: 1988 Offices: 36 Global Employees: 4942 Revenue: $1.2B USD Cash Assets: $1.65B USD Operating Income: $330M USD Headquarters: Tokyo Trend Micro is the largest independent security provider Protecting 48 of 50 top global corporations 3

Trend Micro 31% Top ratings for Virtualization Security Source: Worldwide Endpoint Security 2013-2017 Forecast and 2012, IDC 2013 Copyright 2013 Trend Micro Inc.

Industrialization of Cyber Threats

Damage caused by Cybercrime Today s Threat Landscape Evolution to Cybercrime CRIMEWARE Targeted Attacks Mobile Threats Intelligent Botnets Web Threats Spyware Vulnerabilities W orm Outbreaks Spam Mass Mailers Social Engineering Single Shot Malware BYOD Data Leakage Data Exfiltration Proximity Attacks 2001 2003 2004 2005 2007 2010 2011+ 6

Targeted Attacks =The new-normal - IDC A Cyber Intrusion Every 5 Minutes according to US-CERT Trend Micro finds over 90% of enterprise networks contain active malicious malware

Most Targeted Attacks Start with a Spear- Phishing Email

The Children of Stuxnet

Demo: Hacking Toolkits: Backtrack / Kali / Metasploit / Armitage

How long do Targeted Attacks stay hidden? Most companies breached in minutes but not discovered for months! Source: Verizon Data Breach Investigations Report 2012

How to win the war against Cyber-crime?

Holistic protection for UCS, much more than just A.V. Reduces attack surface. Prevents DoS & detects reconnaissance scans Tracks credibility of websites and safeguards users from malicious urls Optimizes the identification of important security events buried in log entries Firewall Web Reputation Log Inspection Intrusion Prevention Anti-Virus Integrity Monitoring Detects and blocks known and zero-day attacks that target vulnerabilities Detects and blocks malware (web threats, viruses & worms, Trojans) Detects malicious and unauthorized changes to directories, files, registry keys 14

Trend Micro Deep Security: why it is different

The journey to virtualization and the cloud: a story of Resource Contention Physical hardware 3 10% utilization (indicative) Virtualized 70 % utilization (indicative) Cloud 95 % utilization (indicative)

Virtualized Environments: enters security We need: Anti-Virus / Anti-Malware Host-based Intrusion Detection/Prevention Host Based Firewall Integrity Monitoring

Virtualized Environments: enters security We need: Anti-Virus / Anti-Malware Host-based Intrusion Detection/Prevention Host Based Firewall Integrity Monitoring

VMware s #1 Security Partner Improves Security by providing the most secure virtualization infrastructure, with APIs, and certification programs Improves Virtualization by providing security solutions architected to fully exploit the VMware platform Integration with vcenter Integration with VCD Multi-tenancy

Virtualized Environments: agentless protection scanning appliance Anti-Virus / Anti-Malware Host-based Intrusion Detection/Prevention Host Based Firewall Integrity Monitoring

Deep Security Integration in the UCS stack

In Breadth and in Depth Reduces attack surface. Prevents DoS & detects reconnaissance scans Tracks credibility of websites and safeguards users from malicious urls Optimizes the identification of important security events buried in log entries Firewall Web Reputation Log Inspection Intrusion Prevention Anti-Virus Integrity Monitoring Detects and blocks known and zero-day attacks that target vulnerabilities Detects and blocks malware (web threats, viruses & worms, Trojans) Detects malicious and unauthorized changes to directories, files, registry keys 25

Fully automated agent-less protection for UCS

Fully automated agent-less protection for UCS Policy-based Security Automation: New VMs in vcenter are automatically detected by Deep Security and Security Profiles are assigned Provisioning new VMs Reconfiguring agents Rollout patterns Patch agents Checkpoint : Can you keep up with yet another new VM that needs to be secured? Can work Policy/Template-based accross VMs, or do you need to babysit your VM s one by one? Do new VMs that are created in vcenter, automatically show up in your security product, or do you have to manually define them?

Demo: Real-time, Agentless, HIPS VMs from vcenter appear in DSM and are automatically protected without touching the VM

Demo: Agentless Anti-virus protection

Fully automated Virtual Patching for UCS

Cost-savings by Virtual Patching Typical patch cycle without Virtual Patching 12 x patching /year Monthly Security Patching Half-yearly Full Patching

Cost-savings by Virtual Patching Typical patch cycle without Virtual Patching 12 x patching /year Monthly Security Patching Half-yearly Full Patching Typical patch cycle with Virtual Patching 2 x patching /year Automated, ongoing Security Patching Half-yearly Full Patching

Demo: Virtual Patching to protect against Exploits

Reducing Scan overhead

no more I/O Storms Anti-virus storm caused by: automatic antivirus scans signature updates agent-updates Typical AV Console 3:00am Scan Agentless operation by itself is not enough, the system needs to know which VMs are on which hypervisor (vcenter integration) Anti-virus Storm Checkpoint : Are you comfortable with the performance of your VMs, or does it feel like they are suffocated by the required security measures? Are your hypervisors occasionaly brought to their knees by Anti-Virus storms?

Scan de-duplication 1 st AM scan 2nd AM scan (cached) Scan time ~ 20x faster Significant CPU Reduction Huge IO Volume Reduction

To remember: In Breadth and in Depth Lower scan overhead Fully automated Agentless protection Automated virtual Patching: Higher security + Lower costs

Questions and Answers

Virtual Patching / hacking demonstration

Hacking demonstration This machine only runs Anti-virus This machine is is (automatically) virtuallypatched by by Trend Micro Deep Security.

Demo: Real-time, Agentless, HIPS

Anti-virus alone is no match against attacks

This machine is (automatically) virtuallypatched by Trend Micro Deep Security.

Questions and Answers