INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT



Similar documents
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

VIRTUALIZATION SECURITY IN THE REAL WORLD

VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

Proactively Secure Your Cloud Computing Platform

How To Protect Your Cloud From Attack

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Automated Protection on UCS with Trend Micro Deep Security

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

Host-based Intrusion Prevention System (HIPS)

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cloud and Data Center Security

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

McAfee Server Security

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

How To Protect A Virtual Desktop From Attack

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

Symantec Endpoint Protection Datasheet

Meeting the Challenges of Virtualization Security

Netzwerkvirtualisierung? Aber mit Sicherheit!

IBM Endpoint Manager for Core Protection

Symantec Endpoint Protection

End to End Security do Endpoint ao Datacenter

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Symantec Endpoint Protection

Comprehensive security platform for physical, virtual, and cloud servers

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Virtual Desktops Security Test Report

Proven LANDesk Solutions

Understanding & Improving Hypervisor Security

Server Virtualization A Game-Changer For SMB Customers

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

Fighting Advanced Threats

CA Host-Based Intrusion Prevention System r8.1

overview Enterprise Security Solutions

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Endpoint protection for physical and virtual desktops

VDI Security for Better Protection and Performance

Cloud Courses Description

Small and Midsize Business Protection Guide

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Virtualization Journey Stages

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Total Cloud Protection

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Bitdefender GravityZone Sales Presentation

Symantec Endpoint Protection

A progressive and integrated approach to protecting corporate networks

Agentless Security for VMware Virtual Data Centers and Cloud

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Symantec Protection Suite Small Business Edition

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Computer From A Malicious Virus

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Trend Micro Cloud Security for Citrix CloudPlatform

Quick Heal Exchange Protection 4.0

World-class security solutions for your business. Business Products. C a t a l o g u e

The Challenge of a Comprehensive Network Protection. Introduction

Trend Micro Deep Security

Symantec Messaging Gateway 10.5

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Cloud Courses Description

overview Enterprise Security Solutions

Endpoint protection for physical and virtual desktops

Extreme Networks Security Analytics G2 Vulnerability Manager

Security Intelligence Services.

Achieve Deeper Network Security

Symantec Endpoint Protection

Symantec Endpoint Protection

Transcription:

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM CENTRALIZED HW MANAGEMENT STABILITY DATA SECURITY

VIRTUALIZATION BENEFITS Operational efficiency Cost containment Speed to solution Performance Stability Centralized management What about security? 3

SECURITY IN VIRTUAL ENVIRONMENTS: TRUE OR FALSE?? FALSE VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS IN 2012, 60% OF VIRTUALIZED SERVERS WILL BE LESS SECURE THAN THE PHYSICAL SERVERS THEY REPLACE Gartner? FALSE CYBERCRIMINALS DON T TARGET VIRTUAL MACHINES MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012? FALSE MALWARE CAN T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES RESIDENT MALWARE CAN

VIRTUAL SECURITY UNDERSTANDING THE OPTIONS TRADITIONAL NO SECURITY (Agent-Based) NOT AN OPTION! AGENTLESS EASY TO DEPLOY/MANAGE FOR VMWARE GREAT PROTECTION /INEFFICIENT IMPLEMENTATION LIGHT AGENT FEATURE-RICH SECURITY 5

NO PROTECTION NOT AN OPTION VIRTUAL INFECTION AND SPREAD VIRTUAL EAVESDROPPING TARGET OF CYBERCRIMINALS MALWARE CAN SURVIVE TEAR-DOWN OF NON- PERSISTENT MACHINES 6

TRADITIONAL, AGENT-BASED SECURITY A full version of security software is loaded on each virtual machine Inefficient Resource Use: Redundant, full agents Redundant Signature Databases Results in: Excessive resource consumption Update storms Instant-on gaps Lower VM densities Denotes an instance of security software

AGENTLESS SECURITY One Security Virtual Appliance per host performs malware scanning Efficient: Installed and operational in under an hour No re-boot or maintenance mode required Eliminates: Excessive resource consumption Update and scan storms Instant-on gaps Results in: Higher VM Densities

BUT AGENTLESS HAS LIMITATIONS NOT AN OPTION FOR CITRIX OR MICROSOFT BASIC FILE-LEVEL PROTECTION ONLY 9

.AGENTLESS (VMWARE-ONLY) DOES NOT ACCOUNT FOR 42% OF THE MARKET 47% 24% 18%

THE ANSWER - LIGHT AGENT SECURITY A Security Virtual Appliance plus a lightweight security agent on each VM Includes advanced security features: Vulnerability monitoring Application control Web control Device control Advanced heuristics Protection for IM, mail and web traffic Eliminates: Excessive resource consumption Update and scan storms Instant-on gaps

THE LIGHT AGENT APPROACH OPTIMIZED PERFORMANCE THROUGH TIGHT HYPERVISOR INTEGRATION LIGHT AGENT ALLOWS IN-DEPTH INDIVIDUAL MACHINE SCANNING FOR MAXIMUM PROTECTION SEPARATE DEDICATED SECURITY VIRTUAL MACHINE HANDLES THE HEAVY WORK. VIRTUAL, PHYSICAL AND MOBILE - MANAGED THROUGH A SINGLE CONSOLE HIGHLY SCALABLE FROM SMB TO LARGE ENTERPRISE ORGANIZATIONS 12

WITH LIGHT AGENT.FILE LEVEL PROTECTION AWARD-WINNING ANTI-MALWARE ENGINE REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION 13

WITH LIGHT AGENT NETWORK LEVEL PROTECTION FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES 14

WITH LIGHT AGENT CONTROLS WEB CONTROL APPLICATION CONTROL DEVICE CONTROL

MANAGEMENT - KASPERSKY SECURITY CENTER SINGLE INTUITIVE CONSOLE PHYSICAL, VIRTUAL AND MOBILE ENVIRONMENT MANAGED TOGETHER COMBINED VIRTUAL AND PHYSICAL MACHINE ADMINISTRATION AND REPORTING SINGLE-PANE APPROACH CREATES EFFICIENCY & SAVINGS FOR STRETCHED IT RESOURCES SCALABLE TO THE MOST COMPLEX ENTERPRISE ENVIRONMENTS 16

FLEXIBLE LICENSING CHOOSE BETWEEN PER-MACHINE OR PER-CORE PER MACHINE BASED ON MAXIMUM NUMBER OF ACTIVATED VIRTUAL MACHINES RUNNING CONCURRENTLY PER CORE COVERS ALL HARDWARE CORES ACROSS THE ORGANIZATION /DATA CENTER. PER CORE - IDEAL FOR INFRASTRUCTURE AS A SERVICE (IAAS), WHERE VM COUNT FLUCTUATES A SINGLE LICENCE COVERS BOTH HYPER-V, XEN AND VMWARE (AGENTLESS) PLATFORMS 17

KSV LIGHT AGENT Summary We can now protect the top 3 virtualization provider platforms Light Agent introduces powerful new anti-malware features, as well as control components, allowing corporate policies to be enforced Multi-layered security technologies safeguard the virtual environment and corporate assets 18

KSV LIGHT AGENT IS: SIMPLIFIED MANAGEMENT PERFORMANCE ADVANCED FILE LEVEL PROTECTION NETWORK PROTECTION VIRTUAL MACHINE CONTROLS

QUESTIONS?