The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V



Similar documents
The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

How To Protect Your Cloud From Attack

Cloud and Data Center Security

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

5 Best Practices to Protect Your Virtual Environment

VDI Security for Better Protection and Performance

Trend Micro Deep Security

Virtualization Journey Stages

Total Cloud Protection

Secure Cloud-Ready Data Centers Juniper Networks

Securing the private cloud

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Agentless Security for VMware Virtual Data Centers and Cloud

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Netzwerkvirtualisierung? Aber mit Sicherheit!

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Securing Virtualization with Check Point and Consolidation with Virtualized Security

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Effective End-to-End Cloud Security

Securing the Intelligent Network

Meeting the Challenges of Virtualization Security

PICO Compliance Audit - A Quick Guide to Virtualization

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Bitdefender GravityZone Sales Presentation

VMware Integrated Partner Solutions for Networking and Security

Cisco Advanced Services for Network Security

VIRTUALIZATION SECURITY IN THE REAL WORLD

End-user Security Analytics Strengthens Protection with ArcSight

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Trend Micro. Advanced Security Built for the Cloud

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Top 10 Reasons Enterprises are Moving Security to the Cloud

74% 96 Action Items. Compliance

Protect Root Abuse privilege on Hypervisor (Cloud Security)

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

Building A Secure Microsoft Exchange Continuity Appliance

Network Performance + Security Monitoring

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Vulnerability Management

Symantec Endpoint Protection

Security Virtual Infrastructure - Cloud

Did you know your security solution can help with PCI compliance too?

Scalability in Log Management

AppGuard. Defeats Malware

How To Protect Your Network From Attack From A Network Security Threat

VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Unified Threat Management, Managed Security, and the Cloud Services Model

Network Packet Monitoring Optimizations in Data Centre

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Database Security, Virtualization and Cloud Computing

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Comprehensive security platform for physical, virtual, and cloud servers

McAfee Server Security

Virtualization Essentials

How To Protect Virtualized Data From Security Threats

Intelligent, Scalable Web Security

Injazat s Managed Services Portfolio

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Chapter 11 Cloud Application Development

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Automated Protection on UCS with Trend Micro Deep Security

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

SOFTWARE DEFINED NETWORKING

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Superior protection from Internet threats and control over unsafe web usage

Virtual Patching: a Proven Cost Savings Strategy

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Transcription:

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

#1 Hyper-V Security The first agentless Security, Virtual Firewall, Anti-Malware and Compliance Solution built for Windows Server 2012 Hyper-V

Today s Reality The March to 100% Virtualization 2010 2012 2014est. Virtual Servers 25% Virtual Servers 52% Virtual Servers 75% Sources: Gartner 2010, Forrester 2012 and 2014 2

Driving Exponential Growth for Virtualization Security Global Virtualization Security Management Solutions Market 2011-2015 (US $ million) 2500 2300 2000 1500 1,574 1000 500 460 693 1,044 0 2011 2012 2013 2014 2015 Source: Technavio. April 2012 Global Virtualization Security Management Solutions Market 2011-2015 3

Windows Server Hyper-V: Growing Market Acceptance New Virtualization Servers (2012) Other 28% 36% 36% Source: Gartner 4

Microsoft Exponentially Accelerates This Movement New Hyper-V Release: Democratizes Virtualization and Cloud Updated Way Windows Server 2012 5

Virtualization Changes the Game for Security/Compliance New Level of Risk and Exposure High-density Servers larger impact if compromised VM Sprawl instant provisioning, offline machines: more exposure points Intra-VM Traffic creates blind spots, threats bypass perimeter Dynamic IT Loads Live Migration, ever-changing security posture 6

Virtualization Requires a New Approach To Security Old Way: agent-based New Way: agentless VM VM VM VM VM VM Windows Server Hyper-V Host Window Server Hyper-V Host Windows Server 2012 Hyper-V Extensible Switch Security Manager AV/AM Overhead provisioning, managing and updating multiple agents Consumes resources, reduces performance Creates AV storms No need to manage and update multiple agents and signature databases No degradation of performance, maximize consolidation ratios Fast, incremental scans Eliminates AV storms 7

You Should Not Have To Drive up IT costs Install agents that consume valuable resources Have the headache of deploying and managing agents on every VM and different guest OS Reduce your consolidation ratio Perform simultaneous scans which drain resources and cause anti-virus storms that impact performance Be forced to install agents to maintain QoS and control intra-vm traffic 8

Today s Need: Additional Layer of Hyper-V Protection Leverage Hyper-V Extensible Switch Additional Security and Compliance Capabilities Agentless, incremental scan AM caching Orchestrate scans Set thresholds to avoid AV storms Centralized management Proactive real-time monitoring Application level protection Isolate VM s: security policies Multi-tenant protection Network virtualization support Control and protect intra-vm traffic Stateful, deep packet inspection Security follows VMs during Live Migration Granular QoS Aggregate, analyze, audit logs Manage Risk, Improve Protection, Ensure Compliance 9

The Answer: 5nine The first and only agentless anti-malware and filter-in security solution for Windows Server 2012 Hyper-V 10

Introducing 5nine Software Virtualization Security Management Company Market Maker: built from ground-up for Windows Server Hyper-V Agentless for virtualization and cloud #1 Hyper-V Security First and only agentless anti-malware and filter-in security solution for Windows Server 2012 Hyper-V Global coverage Trusted by over 20K users worldwide: SMB, Enterprises, Hosted Delivering a new level of protection and compliance for Windows Server Hyper-V Powerful, yet easy-to-use 11

5nine Hyper-V Enterprise, SMB, Hosting customers Forward-thinking executives 12

Partnership with Microsoft Deep technology collaboration Built from ground-up for Microsoft Windows Hyper-V Certified extension for the Windows Server 2012 Hyper-V Extensible Switch First and only agentless anti-malware and filter-in security solution for Windows Server 2012 Hyper-V New level of protection and compliance for Microsoft Windows Hyper-V 13

Why Forward-Thinking Execs Choose 5nine Security Built Multi-Layered for Windows Protection for Server Hyper-V Your VM s Relieve Admin Headache Maximize Hyper-V Investment Native: built from the ground-up for Windows Hyper-V Optimized for Windows Hyper-V Leverage Hyper-V Host vswitch and Windows Filtering Agentless security approach Additional layer of protection and compliance Integrated firewall, anti-virus/antimalware, intrusion detection system Isolate and secure VM s by ID, names, org unit, user Support network virtualization and multi-tenant security Spot threats proactively Centralized management and control of security and compliance Administration of policies, rules, filters Log and analysis with full audit Powerful, yet easyto-use Armed for the unexpected Lightweight agentless approach Maximize your consolidation ratio and density Won t consume valuable Windows Hyper-v resources: no degradation of performance Supports Hyper-V Windows12, 2008R2: aligned with Hyper-V economics Intensified Effort: Manage Security, Risk and Compliance 14

Multi-Layered, Native Windows Hyper-V Security Solution Anti-Virus/ Anti-Malware Agentless: no degradation All versions of guest O/S supported by Windows Hyper-V Fast, incremental scan Orchestrate scans and set thresholds across VM s Staggered scanning Caching across VM s Centralized management Virtual Firewall Application-level protection against a wide range of exploits Isolate VM s: manage security programmatically per VM Control and protect inbound, outbound, intra-vm traffic Multi-Tenant protection and support of network virtualization Stateful, deep packet inspection Granular QoS Aggregate, analyze, audit logs Intrusion Detection Industrial-strength Pro-active, real-time threat monitoring (detect, warn, block) Block application-level attacks Behavioral: build baseline for known attacks 15

How 5nine Works VM VM VM Management VM or Server VM VM VM VM Window Server Hyper-V Host Windows Server 2012 Hyper-V Extensible Switch Security Manager IDS AV/AM Centralized, administration of policies, filters, rules Agentless deployment Incremental scan using snapshot Inbound/outbound traffic throttling Log, analysis, audit Isolate, harden and secure every VM, secure intra-vm traffic Live Migration support Protection and compliance by VM, user, application, organizational unit 16

How 5nine Works: Windows Server 2012 Hyper-V Extensible Switch 5nine Security Manager Uses Hyper-V Extensible Switch Components VM1 VM NIC Root Partition BFE Service Firewall Filtering Engine Callout Extension Protocol WFP Extensions Extension Miniport Physical NIC VM2 VM NIC 5nine Security manager: purpose-built to leverage Hyper-V extensible switch components to filter network traffic and perform anti-malware protection Windows Filter Platform (WFP) Extensions can inspect, drop, modify, and insert packets using WFP APIs Windows Antivirus and Firewall software uses WFP for traffic filtering Legend: 5nine components = 17

IT Impact Windows Server 2012 Hyper-V: Journey to Cloud IT-as-a- Service Secure and Protect Cloud Assets Hybrid Manage Business Risk Deliver Security Service Levels Virtualization Private/Public Contain Security Admin Costs Access, Privacy, Data Protection Compliance and Regulatory Controls in Cloud Time 18

Benefits for any size Hyper-V customer SMB Move from reactive to proactive AV/AM protection and security Do more with less: minimize IT security burden Lowest cost, no degradation of performance Enterprise Compliance and risk management: collect more data - accessible and auditable Fundamentally restructuring the IT cost structure for security and compliance Protect private cloud and enable smooth shift to IT-as-a-Service Hosting Providers First and only agentless architecture for better deployment and performance Multi-tenancy with full protection of public cloud Security and compliance by customer 19

Benefits Across the Organization IT Executive Highest protection of Hyper-V environment Cut IT Security OPEX Ensure business continuity, manage risk IT Security No surprises Defense in-depth Pro-active security Reduce compliance risk IT Infrastructure & Ops Simple to deploy Automated: no headaches Operational dexterity Visibility with new tools to manage, control, fix Powerful, yet easy-to-use Enterprise Architect Optimized for Hyper-V Clean-sheet design: native Supports multiple O/S Leverages Hyper-V extensions 20

The Market is Responding More and more companies are looking to Windows Server Hyper-V virtualization. 5nine Security Manager with Anti-Malware and Virtual Firewall is designed to help our mutual customers address the important security and compliance considerations that are part of every virtualization deployment." Ian Carlson, Director, Windows Server and Management "Scalability and thus ROI of virtualization projects have been restricted by the intensity of security applications. Traditional anti-virus solutions were designed so customers had to run an instance of the security agent in each guest. All of these instances quickly add up to significant performance issues, with painful cost implications. In the new 5nine Security Manager, Sophos Anti- Virus can perform expensive security tasks centrally on the host, significantly enhancing performance while maintaining protection. James Lyne, Director of Technology We are extremely excited to have this OEM agreement with 5nine Software. 5nine new virtual firewall and anti-malware solution will control network traffic between virtual machines, detect and block malicious attacks, and perform fast anti-virus scans, thus improving the security of a Hyper-V virtualized environment. HEROware has appliance version of 5nine Security. Lynn Shourds, CTO 21

Funded Initiatives 5nine Benefits Multiple Funded Initiatives Initiative Immediate Impact Cloud Computing Server Consolidation Virtualization Cost Control IT-as-a-Service Compliance Securely manage cloud assets Protect virtual machines New level of protection optimized for VM s Eliminate excessive admin burden, maximize host/cluster density Manage service levels, quality of service Collect more data, accessible and auditable: PCI, etc. 22

In Conclusion The march to 100% virtualization Traditional approach to security won t work for virtualization 2010 2012 2014 VM VM VM New Way: agentless Window Server Hyper-V Host Hyper-V Switch Extension Security Manager AV/AM The answer: first security and compliance built for Windows Server Hyper-V www.5nine.com Try and buy 23

www.5nine.com 24

Positioning Background

Positioning Strategy Target Markets Buyer Types Hyper-V Installed Base SMB Enterprise Hosting Hyper-V Champion IT Executives: Head of IT, CIO, CISO IT Infrastructure and Ops IT Security Problem Solved Key Differentiators Virtualization requires a new approach to security. Traditional security built for another era. Only Native Hyper-V Security Complete Suite: Mgr, FW, AM, IDS Agentless approach Orchestration, incremental scanning Log and analysis, bandwidth throttling Pro-active detection Centralized mgt and control, rules, filters 26

Positioning Framework Issue Issue Benefit (Pillar) Benefit (Pillar) Differentiated Feature Traditional security doesn t work for virtualization (convergence, intra-vm traffic, sprawl, dynamic loads) First Purpose-Built Security for Hyper-V Native: built from the ground up for Hyper-V Hyper-V security is not good enough for today s security and compliance needs Multi-Layered Protection for Your VM s Integrated Firewall, Antivirus/Anti-Malware, Intrusion Detection System Security is an IT admin burden Relieve the Admin Headache Centralized administration IT budget pressures Maximize your Hyper-V investment Agentless approach, Economical investment 27

Extra Slides

Security and Compliance to Fit your Environment Agent-based when you need it Agentless Combination (do both) Agent VM VM VM VM VM VM VM VM VM 5nine Windows Server Hyper-V Security Management 29

5nine Hyper-V enterprise customers Forward-thinking executives 30

5nine Hyper-V SMB customers Forward-thinking executives 31

5nine Windows Server Hyper-V Hosting Customers Forward-thinking executives 32

Two Very Different Choices Security Company Focus: Hyper-V Security and Compliance Target Buyer: SMB, Enterprise, Hosting Agentless AV/AM Incremental Scan Router Company Security is an After-Thought Target Buyer: Juniper Customers, Big Data Ctr. Not Available: Agent Not Available 33