SlideShare a Scribd company logo
1 of 27
vShield
VMware® vShield is a suite of security virtual appliances built for protecting virtualized datacenters from attacks and misuse vShield Components vShield Manager vShield Zones vShield App vShield Edge vShield End Point
vShield Manager The vShield Manager is the centralized network management component of vShield suite and is installed from OVA as a virtual machine by using the vSphere Client. Using the vShield Manager user interface, administrators install, configure, and maintain vShield components
vShield Zones ,[object Object]
vShield AppvShield App is an interior, vNIC‐level firewall that allows you to create access control policies regardless of network topology. A vShield App monitors all traffic in and out of an ESX host, including between virtual machines in the same port group. vShield App includes traffic analysis and container‐based policy creation. ,[object Object],vShield Edge provides network edge security and gateway services to isolate the virtual machines in a port group, vDS port group, or Cisco® Nexus 1000V. Common deployments of vShield Edge include in the DMZ, VPN Extranets, and multi‐tenant Cloud environments where the vShield Edge provides perimeter security for Virtual Datacenters (VDCs). ,[object Object],vShield Endpoint delivers an introspection‐based antivirus solution. vShield Endpoint uses the hypervisor to scan guest virtual machines from the outside without a bulky agent
vShield Zones
Firewall Rules
vShield App vShield App is an interior, vNIClevel firewall that allows you to create access control policies regardless of network topology. A vShield App monitors all traffic in and out of an ESX host, including between virtual machines in the same port group. vShield App includes traffic analysis and container‐based policy creation.
vShield App VMware vShield App, part of the VMware vShield family of virtualization security products, protects as applications in the virtual datacenter from network based threats. vShield App gives organizations deep visibility into network communications between virtual machines and enables granular policy enforcement with security groups. The solution also eliminates the hardware and policy sprawl associated through traditional measures, resulting in a cost-effective solution that helps customers to go beyond the limitations of physical security.
Key Benfits  Increase visibility and control over network communications between virtual machines.  Eliminate the need for dedicated hardware and VLANs to separate security groups from one another.  Optimize hardware resource utilization while      maintaining strong security.  Simplify compliance with comprehensive logging of all virtual machine network activity.
Vshield App enables Granular Policy Enforcement Using Security Groups
vShield Edge vShield Edge provides network edge security and gateway services to isolate the virtual machines in a port group, vDS port group, or Cisco® Nexus 1000V. Common deployments of vShield Edge include in the DMZ, VPN Extranets, and multi‐tenant Cloud environments where the vShield Edge provides perimeter security for Virtual Datacenters (VDCs).
Consolidate edge security hardware:  Provision edge security services, including firewall and VPN, using existing vSphere resources, eliminating the need for hardware-based solutions.
Ensure performance and availability of web services: Efficiently manage inbound web traffic across virtual machine clusters with web load balancing capabilities
Accelerate IT compliance:  Get increased visibility and control over security at the network edge, with the logging and auditing controls you need to demonstrate compliance with internal policies and external regulatory requirements
vShield End Point vShield Endpoint delivers an introspection‐based antivirus solution. vShield Endpoint uses the hypervisor to scan guest virtual machines from the outside without a bulky agent
Streamline antivirus and anti-malware deployment:  Deploy enterprise antivirus engine and signature file to a single security virtual machine instead of each and every individual virtual machine on a vSphere host
Improve virtual machine performance: Securely achieve higher consolidation ratios by the same offload mechanism as described above
Prevent antivirus storms and bottlenecks: Prevent antivirus storms and bottlenecks associated with multiple simultaneous antivirus and anti-malware scans and updates
Protect antivirus security software from attack: Deploy and run the antivirus and anti-malware client software in a hardened security virtual machine to prevent targeted attacks

More Related Content

What's hot

Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
Ulf Mattsson
 

What's hot (16)

The Cloud Done Right
The Cloud Done RightThe Cloud Done Right
The Cloud Done Right
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security - CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
How Secure is Azure?
How Secure is Azure?How Secure is Azure?
How Secure is Azure?
 
Pattern For Ws Security
Pattern For Ws SecurityPattern For Ws Security
Pattern For Ws Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Innovating with cloud based technologies
Innovating with cloud based technologies Innovating with cloud based technologies
Innovating with cloud based technologies
 
Week13
Week13Week13
Week13
 
Lession 4
Lession 4Lession 4
Lession 4
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
A Migration Imperative With Windows 10 Enterprise-Grade Security
A Migration Imperative With Windows 10 Enterprise-Grade SecurityA Migration Imperative With Windows 10 Enterprise-Grade Security
A Migration Imperative With Windows 10 Enterprise-Grade Security
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 

Similar to vShield Suite

Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
ASBIS SK
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
sagaroceanic11
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch Overzicht
Arjan Hendriks
 

Similar to vShield Suite (20)

Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Colt Enterprise vCloud
Colt Enterprise vCloudColt Enterprise vCloud
Colt Enterprise vCloud
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMware
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
 
Гибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадратеГибридное облако - эффективность в квадрате
Гибридное облако - эффективность в квадрате
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch Overzicht
 
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

vShield Suite

  • 2. VMware® vShield is a suite of security virtual appliances built for protecting virtualized datacenters from attacks and misuse vShield Components vShield Manager vShield Zones vShield App vShield Edge vShield End Point
  • 3. vShield Manager The vShield Manager is the centralized network management component of vShield suite and is installed from OVA as a virtual machine by using the vSphere Client. Using the vShield Manager user interface, administrators install, configure, and maintain vShield components
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. vShield App vShield App is an interior, vNIClevel firewall that allows you to create access control policies regardless of network topology. A vShield App monitors all traffic in and out of an ESX host, including between virtual machines in the same port group. vShield App includes traffic analysis and container‐based policy creation.
  • 14. vShield App VMware vShield App, part of the VMware vShield family of virtualization security products, protects as applications in the virtual datacenter from network based threats. vShield App gives organizations deep visibility into network communications between virtual machines and enables granular policy enforcement with security groups. The solution also eliminates the hardware and policy sprawl associated through traditional measures, resulting in a cost-effective solution that helps customers to go beyond the limitations of physical security.
  • 15. Key Benfits Increase visibility and control over network communications between virtual machines. Eliminate the need for dedicated hardware and VLANs to separate security groups from one another. Optimize hardware resource utilization while maintaining strong security. Simplify compliance with comprehensive logging of all virtual machine network activity.
  • 16. Vshield App enables Granular Policy Enforcement Using Security Groups
  • 17. vShield Edge vShield Edge provides network edge security and gateway services to isolate the virtual machines in a port group, vDS port group, or Cisco® Nexus 1000V. Common deployments of vShield Edge include in the DMZ, VPN Extranets, and multi‐tenant Cloud environments where the vShield Edge provides perimeter security for Virtual Datacenters (VDCs).
  • 18.
  • 19. Consolidate edge security hardware: Provision edge security services, including firewall and VPN, using existing vSphere resources, eliminating the need for hardware-based solutions.
  • 20. Ensure performance and availability of web services: Efficiently manage inbound web traffic across virtual machine clusters with web load balancing capabilities
  • 21. Accelerate IT compliance: Get increased visibility and control over security at the network edge, with the logging and auditing controls you need to demonstrate compliance with internal policies and external regulatory requirements
  • 22. vShield End Point vShield Endpoint delivers an introspection‐based antivirus solution. vShield Endpoint uses the hypervisor to scan guest virtual machines from the outside without a bulky agent
  • 23.
  • 24. Streamline antivirus and anti-malware deployment: Deploy enterprise antivirus engine and signature file to a single security virtual machine instead of each and every individual virtual machine on a vSphere host
  • 25. Improve virtual machine performance: Securely achieve higher consolidation ratios by the same offload mechanism as described above
  • 26. Prevent antivirus storms and bottlenecks: Prevent antivirus storms and bottlenecks associated with multiple simultaneous antivirus and anti-malware scans and updates
  • 27. Protect antivirus security software from attack: Deploy and run the antivirus and anti-malware client software in a hardened security virtual machine to prevent targeted attacks