Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager



Similar documents
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Virtualization Journey Stages

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Cloud and Data Center Security

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Automated Protection on UCS with Trend Micro Deep Security

How To Protect Your Cloud From Attack

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

How To Protect A Virtual Desktop From Attack

PCI DSS 3.0 Compliance

Comprehensive security platform for physical, virtual, and cloud servers

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Agentless Security for VMware Virtual Data Centers and Cloud

Security in the Software Defined Data Center

Trend Micro Cloud Security for Citrix CloudPlatform

OVERVIEW. Enterprise Security Solutions

Trend Micro deep security 9.6

Bitdefender GravityZone Sales Presentation

Veranderende bedreigingen Security in het virtuele datacenter

Unified Threat Management, Managed Security, and the Cloud Services Model

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

VMware Integrated Partner Solutions for Networking and Security

Virtual Patching: a Proven Cost Savings Strategy

Trend Micro Deep Security

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Secure Cloud Computing

Business Values of Network and Security Virtualization

Trend Micro MAS TRM Guidelines Compliance Solutions

Virtual Patching: a Compelling Cost Savings Strategy

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Total Cloud Protection

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Modular Network Security. Tyler Carter, McAfee Network Security

Windows Server 2003 End of Support. What does it mean? What are my options?

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Secure Cloud-Ready Data Centers Juniper Networks

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Deep Security Vulnerability Protection Summary

Data Center Connector for vsphere 3.0.0

The Virtualization Practice

VDI Security for Better Protection and Performance

Protecting the un-protectable Addressing Virtualisation Security Challenges

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Trend Micro. Advanced Security Built for the Cloud

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Securing Virtualization with Check Point and Consolidation with Virtualized Security

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

I D C T E C H N O L O G Y S P O T L I G H T. S e c u r i t y i n t h e M i d m a r k et: Challenges of V i r t u a lization

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Effective End-to-End Cloud Security

Symantec Endpoint Protection

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

VIRTUALIZATION SECURITY IN THE REAL WORLD

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

overview Enterprise Security Solutions

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Network Security Solution. Arktos Lam

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Compare The Cost Of A Microsoft Private Cloud To A Vcloud With Vsphere And Vspheon

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

1518 Best Practices in Virtualization & Cloud Security with Symantec

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Securing the Virtualized Data Center With Next-Generation Firewalls

Transcription:

Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager

A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United States Tokyo, Japan 5,137 36 $1.2B USD New malware every ½ second Global Threat Intelligence - 1,200+ experts worldwide 96% of the top 50 global corporations. 100% of the top 10 automotive companies. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. 2

Gli attacchi mirati & Advanced Malware APT Una serie ripetuta di attacchi che hanno l obiettivo di penetrare all interno di Società, Organizzazioni usando differenti metodologie come Email con codice maligno allegato o utilizzando vulnerabilità presenti nei sistemi per rubare informazioni o compromettere i computer comunicando con l esterno per la compromissione totale della rete Advanced Persistent Attack Cco Utilizzando Vulnerabilità su Server pubblici, per penetrare all interno delle reti target direttamente dall esterno. Utilizzando tecniche di social engineering ed altre tecnologie, per penetrare all interno delle reti manipolando gli utenti stessi delle reti for fun for a justice for money spying agitation terrorism Copyright 2015 2012 Trend Trend Micro Micro Inc. Inc. 3

Evoluzione del Data Center Hybrid Cloud Public Cloud BYOPC Server Virtualization Physical Desktops & Servers Desktop Virtualization BYOD Private Cloud 4

Deep Security 9.5 PHYSICAL VIRTUAL CLOUD Intrusion Prevention Firewall Antimalware Web Reputation Integrity Monitoring Log Inspection 1. Agentless platform for VMware environments goes wider and deeper Latest VMware platform support Hypervisor integrity monitoring Improved performance & tuning 2. Extending datacenter security to public and hybrid clouds vcloud and AWS integration enables single pane of glass and unified policies across all workloads 3. Multi-tenant architecture for software-defined datacenters & providers Delegation and self-service for tenants Automated deployments of components for elastic scaling 5

Deep Security Platform Architecture Single Pane Scalable Redundant Deep Security Manager 1 Reports 5 Threat Intelligence Manager 2 Deep Security Agent 3 4 SecureCloud Deep Security Agent Modules: DPI & FW Anti-malware Integrity Monitoring Log Inspection Deep Security Virtual Appliance Modules: DPI & FW Anti-malware Integrity Monitoring Cloud Integration 6 6

Virtual patching Virtually creates the condition that security patches are applied Protects server from attacks on vulnerabilities Vulnerability discovered! Register public database Deep Security virtual patch release Official patch released from all vendors Time line Work by customer Apply virtual patch Official patch validation No need to panic and you can focus on your verification. Apply official patches Remove virtual patches Pain points this function can solve Virtual patch can be applied without stopping server No worries about impact on other systems (side-effects) Users can control patch schedule flexibly. Copyright 2015 2012 Trend Trend Micro Micro Inc. Inc. 7

Virtual Patching con Deep Security Raw Traffic 1 Stateful Firewall Allow known good Over 100 applications shielded including: Operating Systems Database servers Web app servers Deep packet inspection Filtered Traffic 2 3 4 Exploit Rules Stop known bad Vulnerability Rules Shield known vulnerabilities Smart Rules Shield unknown vulnerabilities and protect specific applications Mail servers FTP servers Backup servers Storage mgt servers DHCP servers Desktop applications Mail clients Web browsers Anti-virus Other applications 8

Agentless Architecture = CAPEX + OPEX Savings VM servers per host Agentless AV 75-100 Traditional AV 25 3-10X higher VDI VM consolidation ratios 0 10 20 30 40 50 60 70 80 3-year Savings on 1000 VDI VMs = $539,600 Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011 Saving estimate based on VMware ROI calculations 9

Deep Security for Defense-in-Depth & Compliance Addressing 7 PCI Regulations and 20+ Sub- Controls Including: Firewall Web Reputation Log Inspection Intrusion Prevention Anti-Virus Integrity Monitoring (1.) Network Segmentation (1.x) Firewall (5.x) Anti-virus (6.1) Virtual Patching* (6.6) Web App. Protection (10.6) Daily Log Review Physical Servers Virtual Servers Cloud Computing Endpoints & Devices (11.4) IDS / IPS (11.5) File Integrity Monitoring * Compensating Control 10

SDDC (Software Defined Datacenter) 11

Q&A GRAZIE!!!