SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Magic Words of VDI Security:
“Agentless” and “Aware”
David Girard, Senior Security Advisor – Trend Micro Canada


                                                     1




                                                             1
Virtualization Project                                            ?
Desktop       Server                            Cloud                    Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   2




                                                                                             2
Security Built for VMware
           The most comprehensive suite
                  of next-generation
           virtualization security solutions
Desktop      Server                           Cloud                      Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   3




                                                                                             3
Security Built for VMware

  IT Operations                  Security                                    Compliance



Consolidation rates        Protect data                                      Ensure
Operational efficiencies   & applications                                    compliance
Flexibility
Savings




                           10/4/2010   Copyright 2009 Trend Micro Inc.   4




                                                                                          4
Security Built for VMware

Desktop      Server                           Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc.   5




                                                                                            5
Key Issue:
Resource Contention

                                High impact : Employee’s arrival or schedule scans


 9:00am Scan
  Typical AV
   Console




 If several, or all, VMs start a full anti-malware scan at the same time, the underlying
 shared hardware will experience extreme load (memory, CPU, I/O), causing a
 slowdown of all virtual systems on the server.
 Large pattern file updates require significant memory and can impact, network and
 storage I/O resources.
                                Classification 10/4/2010   Copyright 2009 Trend Micro Inc.   6




                                                                                                 6
VDI Security option #1: OfficeScan
(First AV optimized for VDI)

           Trend Micro OfficeScan
           Protects virtual & physical endpoints
           • VDI Intelligence with VDI plug-in
           • Serializes updates and scans per VDI-host
           • Leverages base-images to further shorten scan times
           • Smart Scan limit Endpoints pattern updates since it is
             mostly in the cloud




                         10/4/2010   Copyright 2009 Trend Micro Inc.   7




                                                                           7
OfficeScan 10.5 has VDI-Intelligence


• Detects whether endpoints are physical or virtual
  – With VMware View
• Serializes updates and scans per VDI-host
  – Controls the number of concurrent scans and updates per VDI host
  – Maintains availability and performance of the VDI host
  – Faster than concurrent approach
• Leverages Base-Images to further shorten scan times
  – Pre-scans and white-lists VDI base-images
  – Prevents duplicate scanning of unchanged files on a VDI host
  – Further reduces impact on the VDI host



                                 Copyright 2009 Trend Micro Inc.




                                                                       8
OfficeScan 10.5 Integrates with vCenter




                    10/4/2010   Copyright 2009 Trend Micro Inc.   9




                                                                      9
CPU




      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 10




                                                                      10
CPU - Analysis
 • Only 10.5 can support 20+ desktop images with mixed user profile.
 • With no AV, average CPU utilization while 4 heavy and 16 light user
   script is running is 33%
 • With 10.5 with ALL 4 heavy and 16 light user machines scanning,
   CPU utilization is 41%. Very Impressive.
 • With powerful machines typically used in VDI environment CPU’s
   typically are not the breaking point.
 • With 20 desktop images, 10.5 adds marginal load to CPU where as
   other solutions can not even get to support baseline number of
   desktop images
 • With 10 desktop images, 10.5 adds only 11% CPU overhead
   compared to baseline (no AV and no scanning) versus Symantec
   which adds 29% CPU overhead , 10.1 which adds 50% CPU
   overhead and McAfee which is the worst which adds 83% CPU
   overhead
                          Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 11




                                                                                          11
IOPS (vDisk Utilization)




                  Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 12




                                                                                  12
IOPS - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has
   10.95 IOPS, Symantec has 9.02 IOPS and McAfee has
   whopping 22.39 IOPS
 • Trend Micro Office Scan 10.5 IOPS has small deviation of
   0.77 MB/s and 3.66 MB/s only from baseline and mixed
   20 user profile
 • Lets recap why 10.5 is so much better with IOPS
    • 10.5 Serializes updates and scans per VDI-host
    • Pre-scans and white-lists VDI base-images
    • Prevents duplicate scanning of unchanged files on a VDI host
                        Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 13




                                                                                        13
IOPS – How many Systems?

                                                                         • A VDI environment sized for 20
                                                                           desktop images with 4 heavy
                                                                           and 16 light users.
                                                                         • Keep IOPS between 6-8 and
                                                                           see how many desktop images
                                                                           can be supported with each AV
                                                                           deployment (Apples to Apples
                                                                           comparison)
                                                                         • All about return of investment

• If you deploy McAfee, you can deploy ONLY 2 desktop images in an
  environment which supports 20 images without AV
• If you deploy Symantec, you can deploy ONLY 4 desktop images in an
  environment which supports 20 images without AV
• If you deploy Trend 10.5, you can deploy ALL 20 desktop images
      Customers no longer have to choose
      between Security and Return On Investment
                              Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 14




                                                                                                            14
Memory




         Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 15




                                                                         15
Memory - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • Automatic Pool of 20 desktop images without AV in
   Mixed user Profile is consuming around 7.74 GB of
   Active Memory
 • Trend Micro Office scan 10.5 is putting an overhead of
   only 1.32 GB in maximum VDI Density environment.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 16




                                                                                      16
Scan Time with 10.5




   VDI Profile                  Other AV Solution                                        Trend Micro 10.5

   Mixed Maximum High Density   Approx 1-2 Hours                                         16 Minutes
   VDI Pool(4H &16 L)



   Mixed Low Density VDI Pool   Approx. 27- 49 minutes                                   2 Minutes
   (1H & 3 L)
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 17




                                                                                                            17
Scan Time - Analysis
 • Trend Micro Office scan 10.5 is performing Approx. 15 -
   25 times better in Mixed Low Density VDI pool and 4 -8
   times better in Mixed Maximum High Density VDI pool.

 • Trend Micro office scan 10.5 with its Smart Scan and VDI
   aware capability is consuming remarkably less scan time
   than other AV solutions.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 18




                                                                                      18
VDI Security option #2:
Deep Security

            Trend Micro Deep Security
            Protects virtualized endpoints & servers
            • First agent-less anti-malware solution
            • Hypervisor-based introspection
            • Eliminates “AV storms”




                         10/4/2010   Copyright 2009 Trend Micro Inc. 19




                                                                          19
Security Built for VMware

Desktop      Server                          Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 20




                                                                                           20
Key Issue:
Resource Contention



 9:00am Scan
  Typical AV
   Console




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 21




                                                                                21
Key Issue:
Instant On Gaps



                                        Active, with
          Active                    Dormant security
                                    out-of-date




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 22




                                                                                   22
Key Issue:
Mixed Trust Level VMs




          ERP   Email               Web                    Test                    CRM




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 23




                                                                                         23
Trend Micro Deep Security



 IDS / IPS                               Integrity                                       Log
                    Anti-Virus                                                                       Firewall
                                        Monitoring                                    Inspection




    Physical               Virtual                                             Cloud               Desktop/Laptop




Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0.
Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1


                                     10/4/2010   Copyright 2009 Trend Micro Inc. 24




                                                                                                                    24
Co-ordinated Approach
                              • Optimized protection
                              • Operational efficiency



Security virtual   Security
                                                                                       Agent-based
appliance            VM                                                                Security
  Efficiency                                                                            Protection
  Manageability                                                                         Mobility




                                      10/4/2010   Copyright 2009 Trend Micro Inc. 25




                                                                                                     25
Security Built for VMware

Desktop      Server                         Cloud                      Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 26




                                                                                           26
Issue #1:
Multi-tenancy




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 27




                                                                                27
Issue #2:
Data Access & Governance



                       10010011
                       01101100




                  10/4/2010   Copyright 2009 Trend Micro Inc. 28




                                                                   28
Issue #3:
Secure Storage Recycling


                               10011                                 10011
                               01110                                 01110
                               00101                                 00101




                   10/4/2010    Copyright 2009 Trend Micro Inc. 29




                                                                             29
Trend Micro Cloud Security
Solutions
Deep Security                 SecureCloud
• Anti-Virus                  • Encryption
• IDS/IPS                     • Policy-based key management
                              Private & Public
    • + Virtual Patching
    • + Web App Protection
                              Cloud Computing
                                       Flexibility & Confidence

• File Integrity Monitoring
• Log Inspection
• Firewall




                              10/4/2010   Copyright 2009 Trend Micro Inc. 30




                                                                               30
Security Built for VMware

Desktop       Server                            Cloud                   Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc. 31




                                                                                            31
Virtual Appliances
                                                                                 Virtual Appliance

       Application


       Operating
        System



       Hypervisor                                                                  Hypervisor



                     Hardware                                                                 Hardware




                                10/4/2010   Copyright 2009 Trend Micro Inc. 32




                                                                                                         32
Virtual Appliance Benefits

 Virtual Appliance
                        Costs
                                                                                70%
                        IT Flexibility
                                                                                 Per-User
                        Improve Business                                       Cost of Virtual
                        Continuity                                              Appliance




A solution that scale over time. Don’t need to buy a bigger physical
appliance. Just add more resources. Don’t need to buy an extra box
for pre-production environment, just fire a new VM or install on any
box that can run CentOS or Red Hat.

                              10/4/2010   Copyright 2009 Trend Micro Inc. 33




                                                                                                 33
Trend Micro
Security Virtual Appliances
  Virtual Appliance


                          Web Security
                          Email Security




Other Trend Micro Product are offered as a virtual appliance :
-Data Loss Prevention Server
-Threat Discovery Virtual Appliance (part of Threat Management Services (TMS)




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 34




                                                                                  34
Security Built for VMware
Deep Security    Deep Security                  Deep Security                     InterScan Web Security
     OR                                            AND                             InterScan Messaging
 OfficeScan                                     SecureCloud                              Security


  Desktop           Server                                Cloud                       Virtual Appliance*




                                             Encryption of the                      *VMware Certified
                                             virtual file system                       Appliances




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 35




                                                                                                           35
Security Built for VMware




          10/4/2010   Copyright 2009 Trend Micro Inc. 36




                                                           36
Trend Micro
Global leader in Internet content security and threat management.
Catalyst for faster adoption of virtualization.
Our Vision:
A world safe for exchanging digital information

Founded        • United States in 1988

Headquarters • Tokyo, Japan
Offices        • 23 countries
Employees      • 4,350
Leadership     • US $1 Billion annual revenue
               • 3rd largest security company                                              1,000+ Threat Research Experts
                                                                                                  10 labs. 24x7 ops
               • “Global 100 Most Sustainable Corporations”                                Real-time alerts for new threats
               • Top 3 in Messaging, Web and Endpoint security
               • Leader in virtualization & cloud computing
               security




                                                    Copyright 2009 Trend Micro Inc.
                                                                                      37




                                                                                                                              37
Questions?




                           Thank you, merci
New Threats Informations                                                                           For more informations:
http://blog.trendmicro.com/                                                                        Technical:
                                                                                                   david_girard@trendmicro.com
                                                                                                   514-629-1680

         User group                                                                                Sales:
Groupe d’utilisateurs                                                                              Michel_bouasria@trendmicro.com
Trend Micro du Québec                                                                              514-653-2257
http://www.linkedin.com/groups?gid=2296257                                                         Jean_houle@trendmicro.com
                                                                                                   514 893-1512
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 38




                                                                                                                                    38

Más contenido relacionado

La actualidad más candente

Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_application
Umut IŞIK
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 

La actualidad más candente (20)

Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_application
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 

Destacado

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
guest83fa4c
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
Degrowth Conference
 
China fei
China feiChina fei
China fei
incomas
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
candipartridge
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
HablaGuate
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
Susan Daniels
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
soccrgrl62
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
Wendy Neave
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
guestbb440f9
 

Destacado (20)

Trend Micro Case Study
Trend Micro Case StudyTrend Micro Case Study
Trend Micro Case Study
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
 
Canadian Centre for Court Technology Presentation
Canadian Centre for Court Technology PresentationCanadian Centre for Court Technology Presentation
Canadian Centre for Court Technology Presentation
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA Iowa
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
 
16 abril
16 abril16 abril
16 abril
 
Festividades do meu país (Portugal)
Festividades do meu país  (Portugal)Festividades do meu país  (Portugal)
Festividades do meu país (Portugal)
 
China fei
China feiChina fei
China fei
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
 
...
......
...
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
 

Similar a TrendMicro

Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
Manas TI SA
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
selghaly
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
Digicomp Academy AG
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft Singapore
 

Similar a TrendMicro (20)

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteit
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminar
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
V mware view
V mware viewV mware view
V mware view
 

Más de 1CloudRoad.com

VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
1CloudRoad.com
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
1CloudRoad.com
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
1CloudRoad.com
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
1CloudRoad.com
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
1CloudRoad.com
 

Más de 1CloudRoad.com (19)

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
 
Virtensys
VirtensysVirtensys
Virtensys
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 

Último

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

TrendMicro

  • 1. Magic Words of VDI Security: “Agentless” and “Aware” David Girard, Senior Security Advisor – Trend Micro Canada 1 1
  • 2. Virtualization Project ? Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 2 2
  • 3. Security Built for VMware The most comprehensive suite of next-generation virtualization security solutions Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 3 3
  • 4. Security Built for VMware IT Operations Security Compliance Consolidation rates Protect data Ensure Operational efficiencies & applications compliance Flexibility Savings 10/4/2010 Copyright 2009 Trend Micro Inc. 4 4
  • 5. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 5 5
  • 6. Key Issue: Resource Contention High impact : Employee’s arrival or schedule scans 9:00am Scan Typical AV Console If several, or all, VMs start a full anti-malware scan at the same time, the underlying shared hardware will experience extreme load (memory, CPU, I/O), causing a slowdown of all virtual systems on the server. Large pattern file updates require significant memory and can impact, network and storage I/O resources. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 6 6
  • 7. VDI Security option #1: OfficeScan (First AV optimized for VDI) Trend Micro OfficeScan Protects virtual & physical endpoints • VDI Intelligence with VDI plug-in • Serializes updates and scans per VDI-host • Leverages base-images to further shorten scan times • Smart Scan limit Endpoints pattern updates since it is mostly in the cloud 10/4/2010 Copyright 2009 Trend Micro Inc. 7 7
  • 8. OfficeScan 10.5 has VDI-Intelligence • Detects whether endpoints are physical or virtual – With VMware View • Serializes updates and scans per VDI-host – Controls the number of concurrent scans and updates per VDI host – Maintains availability and performance of the VDI host – Faster than concurrent approach • Leverages Base-Images to further shorten scan times – Pre-scans and white-lists VDI base-images – Prevents duplicate scanning of unchanged files on a VDI host – Further reduces impact on the VDI host Copyright 2009 Trend Micro Inc. 8
  • 9. OfficeScan 10.5 Integrates with vCenter 10/4/2010 Copyright 2009 Trend Micro Inc. 9 9
  • 10. CPU Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 10 10
  • 11. CPU - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With no AV, average CPU utilization while 4 heavy and 16 light user script is running is 33% • With 10.5 with ALL 4 heavy and 16 light user machines scanning, CPU utilization is 41%. Very Impressive. • With powerful machines typically used in VDI environment CPU’s typically are not the breaking point. • With 20 desktop images, 10.5 adds marginal load to CPU where as other solutions can not even get to support baseline number of desktop images • With 10 desktop images, 10.5 adds only 11% CPU overhead compared to baseline (no AV and no scanning) versus Symantec which adds 29% CPU overhead , 10.1 which adds 50% CPU overhead and McAfee which is the worst which adds 83% CPU overhead Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 11 11
  • 12. IOPS (vDisk Utilization) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 12 12
  • 13. IOPS - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has 10.95 IOPS, Symantec has 9.02 IOPS and McAfee has whopping 22.39 IOPS • Trend Micro Office Scan 10.5 IOPS has small deviation of 0.77 MB/s and 3.66 MB/s only from baseline and mixed 20 user profile • Lets recap why 10.5 is so much better with IOPS • 10.5 Serializes updates and scans per VDI-host • Pre-scans and white-lists VDI base-images • Prevents duplicate scanning of unchanged files on a VDI host Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 13 13
  • 14. IOPS – How many Systems? • A VDI environment sized for 20 desktop images with 4 heavy and 16 light users. • Keep IOPS between 6-8 and see how many desktop images can be supported with each AV deployment (Apples to Apples comparison) • All about return of investment • If you deploy McAfee, you can deploy ONLY 2 desktop images in an environment which supports 20 images without AV • If you deploy Symantec, you can deploy ONLY 4 desktop images in an environment which supports 20 images without AV • If you deploy Trend 10.5, you can deploy ALL 20 desktop images Customers no longer have to choose between Security and Return On Investment Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 14 14
  • 15. Memory Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 15 15
  • 16. Memory - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • Automatic Pool of 20 desktop images without AV in Mixed user Profile is consuming around 7.74 GB of Active Memory • Trend Micro Office scan 10.5 is putting an overhead of only 1.32 GB in maximum VDI Density environment. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 16 16
  • 17. Scan Time with 10.5 VDI Profile Other AV Solution Trend Micro 10.5 Mixed Maximum High Density Approx 1-2 Hours 16 Minutes VDI Pool(4H &16 L) Mixed Low Density VDI Pool Approx. 27- 49 minutes 2 Minutes (1H & 3 L) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 17 17
  • 18. Scan Time - Analysis • Trend Micro Office scan 10.5 is performing Approx. 15 - 25 times better in Mixed Low Density VDI pool and 4 -8 times better in Mixed Maximum High Density VDI pool. • Trend Micro office scan 10.5 with its Smart Scan and VDI aware capability is consuming remarkably less scan time than other AV solutions. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 18 18
  • 19. VDI Security option #2: Deep Security Trend Micro Deep Security Protects virtualized endpoints & servers • First agent-less anti-malware solution • Hypervisor-based introspection • Eliminates “AV storms” 10/4/2010 Copyright 2009 Trend Micro Inc. 19 19
  • 20. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 20 20
  • 21. Key Issue: Resource Contention 9:00am Scan Typical AV Console Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 21 21
  • 22. Key Issue: Instant On Gaps Active, with Active Dormant security out-of-date Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 22 22
  • 23. Key Issue: Mixed Trust Level VMs ERP Email Web Test CRM Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 23 23
  • 24. Trend Micro Deep Security IDS / IPS Integrity Log Anti-Virus Firewall Monitoring Inspection Physical Virtual Cloud Desktop/Laptop Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0. Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1 10/4/2010 Copyright 2009 Trend Micro Inc. 24 24
  • 25. Co-ordinated Approach • Optimized protection • Operational efficiency Security virtual Security Agent-based appliance VM Security Efficiency Protection Manageability Mobility 10/4/2010 Copyright 2009 Trend Micro Inc. 25 25
  • 26. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 26 26
  • 27. Issue #1: Multi-tenancy Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 27 27
  • 28. Issue #2: Data Access & Governance 10010011 01101100 10/4/2010 Copyright 2009 Trend Micro Inc. 28 28
  • 29. Issue #3: Secure Storage Recycling 10011 10011 01110 01110 00101 00101 10/4/2010 Copyright 2009 Trend Micro Inc. 29 29
  • 30. Trend Micro Cloud Security Solutions Deep Security SecureCloud • Anti-Virus • Encryption • IDS/IPS • Policy-based key management Private & Public • + Virtual Patching • + Web App Protection Cloud Computing Flexibility & Confidence • File Integrity Monitoring • Log Inspection • Firewall 10/4/2010 Copyright 2009 Trend Micro Inc. 30 30
  • 31. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 31 31
  • 32. Virtual Appliances Virtual Appliance Application Operating System Hypervisor Hypervisor Hardware Hardware 10/4/2010 Copyright 2009 Trend Micro Inc. 32 32
  • 33. Virtual Appliance Benefits Virtual Appliance Costs 70% IT Flexibility Per-User Improve Business Cost of Virtual Continuity Appliance A solution that scale over time. Don’t need to buy a bigger physical appliance. Just add more resources. Don’t need to buy an extra box for pre-production environment, just fire a new VM or install on any box that can run CentOS or Red Hat. 10/4/2010 Copyright 2009 Trend Micro Inc. 33 33
  • 34. Trend Micro Security Virtual Appliances Virtual Appliance Web Security Email Security Other Trend Micro Product are offered as a virtual appliance : -Data Loss Prevention Server -Threat Discovery Virtual Appliance (part of Threat Management Services (TMS) 10/4/2010 Copyright 2009 Trend Micro Inc. 34 34
  • 35. Security Built for VMware Deep Security Deep Security Deep Security InterScan Web Security OR AND InterScan Messaging OfficeScan SecureCloud Security Desktop Server Cloud Virtual Appliance* Encryption of the *VMware Certified virtual file system Appliances 10/4/2010 Copyright 2009 Trend Micro Inc. 35 35
  • 36. Security Built for VMware 10/4/2010 Copyright 2009 Trend Micro Inc. 36 36
  • 37. Trend Micro Global leader in Internet content security and threat management. Catalyst for faster adoption of virtualization. Our Vision: A world safe for exchanging digital information Founded • United States in 1988 Headquarters • Tokyo, Japan Offices • 23 countries Employees • 4,350 Leadership • US $1 Billion annual revenue • 3rd largest security company 1,000+ Threat Research Experts 10 labs. 24x7 ops • “Global 100 Most Sustainable Corporations” Real-time alerts for new threats • Top 3 in Messaging, Web and Endpoint security • Leader in virtualization & cloud computing security Copyright 2009 Trend Micro Inc. 37 37
  • 38. Questions? Thank you, merci New Threats Informations For more informations: http://blog.trendmicro.com/ Technical: david_girard@trendmicro.com 514-629-1680 User group Sales: Groupe d’utilisateurs Michel_bouasria@trendmicro.com Trend Micro du Québec 514-653-2257 http://www.linkedin.com/groups?gid=2296257 Jean_houle@trendmicro.com 514 893-1512 Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 38 38