SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Security Designed for the Software-Defined
Data Center
3/14/2014 Confidential | Copyright 2013 Trend Micro Inc.
Bill McGee
SVP and General Manager, Cloud and Data Center Security
Trend Micro
March 13, 2014
Copyright 2014 Trend Micro Inc.
2
Have you simply
“lifted-and- shifted”
your traditional security to
your software-defined
data center?
Copyright 2014 Trend Micro Inc.
3
Many organizations are experiencing the following…
• Minutes to deploy a server…weeks to secure it
• Virtually scale beyond physical limits… until you hit
your security limit
• Servers that share resources…security that consumes it
Attackers
Potential Risks
• Vulnerability in server exploited
to introduce malicious code
• Company must restrict
access to certain applications
• Admin makes changes to
known good configuration
• Hacker attempts a SQL
injection attack
• Brute force authentication
attack is executed
Software-defined data center changes the game
The opportunity:
Automate and
optimize security as
part of your data
center operations
Copyright 2014 Trend Micro Inc. 5
Security principles remain the same;
APPROACH to security must change
CONTEXT Workload and application-aware
SOFTWARE Security that evolves with the data center
PLATFORM Single platform for data center and cloudSiloed
Generic
Hardware
ADAPTIVE Intelligent, dynamic policy enforcement
Automated provisioning specific to platform
Static
3/14/2014Copyright 2014 Trend Micro Inc. 6
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 7
Extend to cloud with confidence
Provisioning securely within a dynamic data center
How do you:
• Secure the VM the moment it is provisioned?
• Apply the right policies to that VM?
• Reduce the time to provision without
compromising on security?
• Securely bring up/down/move your VMs?
Copyright 2014 Trend Micro Inc. 8
Provisioning
Infrastructure
vCenter, AD,
vCloud and
AWS
SAP
Exchange
Servers
Oracle
Web
Servers
Web
Server
Automate security as part of your operations
• Gain visibility into environment using
vCenter and vCloud Director integration
• Recommend and apply policies
automatically - specific to your data
center
• Automatically scale up and
down as required—with no
security gaps
19
Rules
15
Rules
73
Rules
8
Rules
28
Rules
Copyright 2014 Trend Micro Inc. 9
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 11
Extend to cloud with confidence
Management Challenge: Keeping up-to-date
How do you:
• Quickly and easily identify an issue?
• Keep up to date with patches?
• Manage multiple controls as you execute your
strategy for your data center and cloud?
Copyright 2014 Trend Micro Inc. 12
Protect even before you patch
• Protect against
vulnerability exploits
before patches available
• Save money avoiding
costly emergency patching
• Patch at your convenience
Vulnerability Disclosed or
Exploit Available
Patch
Available
Complete
Deployment
Test
Soak
Exposure
Begin
Deployment
PatchedTrend Micro Virtual Patching
Copyright 2014 Trend Micro Inc. 14
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 15
Extend to cloud with confidence
Optimized for your virtual environments
Network Usage
Scan Speed
CPU/Memory Usage
IOPS
Storage
ESXi
SAN
Copyright 2014 Trend Micro Inc. 17
Proven impact on data center resources
18
Scan
Cache
*All results based on internal testing using VMware View simulators
Up to 20X Faster*
Full Scans
Up to 5X Faster
Realtime Scans
Up to 2X Faster
VDI Login
Copyright 2014 Trend Micro Inc. 18
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 19
Extend to external or public cloud with confidence
Public Cloud: Affects every organization
Public cloud extension of Private Cloud by I.T. (Bursting)
Business groups Bypass IT to use Public Cloud
Private Cloud forced to take on attributes of
Public Cloud (ITaaS)
Copyright
2013 Trend20
Security in the cloud is a Shared Responsibility
Partner Eco-System
• Operating Systems
• Application
• Security Groups
• OS Firewalls
• Anti-Virus
• Account Management
• Storage Encryption
• Facilities
• Physical Security
• Physical Infrastructure
• Virtualized Infrastructure
Customer
Domain
AWSDomain
Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Edge
Locations
Availability Zones
Regions
Enterprise Applications
Enterprise Operation Systems
Cloud Deployment Dynamics
Instance Awareness
• Dynamic real-time security
visibility and response
Complexity
• Supporting multi-region
and global deployments
Scale & Automation
• Elastic services and
applications managed with
new tools Data Protection
• Protection of all data across
boot & data volumes
Purchasing
• Ability to purchase
security aligned to cloud
models
Common Management & Reporting
Security platform for the modern data center
3/14/2014Copyright 2014 Trend Micro Inc. 25
Data Center
Physical Virtual Private Cloud Public Cloud
• Address security across ALL your environments
• Comprehensive security to address varying risk
Log
Inspection
Anti-
Malware
Intrusion
Prevention
Host
Firewall
Integrity
Monitoring
100% of the
top 10 automotive
companies.
96% of the top
50 global
corporations.
100% of the
top 10 telecom
companies.
80% of the top
10 banks.
90% of the top
10 oil companies.
Global Threat Intelligence
New malware every ½ second
CEO
Founded
Headquarters
Employees
Offices
2012 Sales
Eva Chen
1988, United States
Tokyo, Japan
5,137
36
$1.2B USD
A world safe for exchanging
digital information
Copyright 2014 Trend Micro Inc. 26
Thank you!
Copyright 2014 Trend Micro Inc.

Más contenido relacionado

La actualidad más candente

Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesVMware
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure SentinelRobert Crane
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure StackPT Datacomm Diangraha
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9Amazon Web Services
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
CipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 

La actualidad más candente (20)

Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
Migrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal AgenciesMigrating to the Cloud: Lessons Learned from Federal Agencies
Migrating to the Cloud: Lessons Learned from Federal Agencies
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
CipherGraph Networks: Introduction
CipherGraph Networks: IntroductionCipherGraph Networks: Introduction
CipherGraph Networks: Introduction
 
Cloud security
Cloud securityCloud security
Cloud security
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 

Destacado

PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenPMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenMediehuset Ingeniøren Live
 
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelSådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelMediehuset Ingeniøren Live
 
Workpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerWorkpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerMediehuset Ingeniøren Live
 
Digital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringDigital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringMediehuset Ingeniøren Live
 
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenInsight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenMediehuset Ingeniøren Live
 
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutModarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutMediehuset Ingeniøren Live
 
Dansk projektledelse: IPMA certificering af projektledere
Dansk projektledelse:  IPMA certificering af projektledereDansk projektledelse:  IPMA certificering af projektledere
Dansk projektledelse: IPMA certificering af projektledereMediehuset Ingeniøren Live
 
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierDen agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierMediehuset Ingeniøren Live
 
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Mediehuset Ingeniøren Live
 
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mediehuset Ingeniøren Live
 
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Mediehuset Ingeniøren Live
 

Destacado (18)

Debugging 2013- Sune Vuorela
Debugging 2013- Sune VuorelaDebugging 2013- Sune Vuorela
Debugging 2013- Sune Vuorela
 
Debugging 2013- Michael Rasmussen
Debugging 2013- Michael RasmussenDebugging 2013- Michael Rasmussen
Debugging 2013- Michael Rasmussen
 
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr PedersenPMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
 
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten FangelSådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
 
Debugging 2013- Jesper Brouer
Debugging 2013- Jesper BrouerDebugging 2013- Jesper Brouer
Debugging 2013- Jesper Brouer
 
Workpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsningerWorkpoint: Kundetilpassede SharePoint-løsninger
Workpoint: Kundetilpassede SharePoint-løsninger
 
Digital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell PlaneringDigital project management - Magnus Holmlid, Visuell Planering
Digital project management - Magnus Holmlid, Visuell Planering
 
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-SørensenInsight live om IT-sikkerhed - Thomas Lund-Sørensen
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
 
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk InstitutModarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
 
Thomas Hansen - information management
Thomas Hansen - information management Thomas Hansen - information management
Thomas Hansen - information management
 
Dansk projektledelse: IPMA certificering af projektledere
Dansk projektledelse:  IPMA certificering af projektledereDansk projektledelse:  IPMA certificering af projektledere
Dansk projektledelse: IPMA certificering af projektledere
 
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, MetierDen agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
 
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
 
Pitch slides datacenter 2014 færdige
Pitch slides datacenter 2014 færdigePitch slides datacenter 2014 færdige
Pitch slides datacenter 2014 færdige
 
Dit CV din fremtid
Dit CV din fremtidDit CV din fremtid
Dit CV din fremtid
 
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
 
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
 
Agenda rum 204 2014
Agenda rum 204 2014Agenda rum 204 2014
Agenda rum 204 2014
 

Similar a Datacenter 2014: Trend Micro - Bill MCGee

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...Amazon Web Services
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 

Similar a Datacenter 2014: Trend Micro - Bill MCGee (20)

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 

Último

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 

Último (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 

Datacenter 2014: Trend Micro - Bill MCGee

  • 1. Security Designed for the Software-Defined Data Center 3/14/2014 Confidential | Copyright 2013 Trend Micro Inc. Bill McGee SVP and General Manager, Cloud and Data Center Security Trend Micro March 13, 2014
  • 2. Copyright 2014 Trend Micro Inc. 2 Have you simply “lifted-and- shifted” your traditional security to your software-defined data center?
  • 3. Copyright 2014 Trend Micro Inc. 3 Many organizations are experiencing the following… • Minutes to deploy a server…weeks to secure it • Virtually scale beyond physical limits… until you hit your security limit • Servers that share resources…security that consumes it
  • 4. Attackers Potential Risks • Vulnerability in server exploited to introduce malicious code • Company must restrict access to certain applications • Admin makes changes to known good configuration • Hacker attempts a SQL injection attack • Brute force authentication attack is executed
  • 5. Software-defined data center changes the game The opportunity: Automate and optimize security as part of your data center operations Copyright 2014 Trend Micro Inc. 5
  • 6. Security principles remain the same; APPROACH to security must change CONTEXT Workload and application-aware SOFTWARE Security that evolves with the data center PLATFORM Single platform for data center and cloudSiloed Generic Hardware ADAPTIVE Intelligent, dynamic policy enforcement Automated provisioning specific to platform Static 3/14/2014Copyright 2014 Trend Micro Inc. 6
  • 7. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 7 Extend to cloud with confidence
  • 8. Provisioning securely within a dynamic data center How do you: • Secure the VM the moment it is provisioned? • Apply the right policies to that VM? • Reduce the time to provision without compromising on security? • Securely bring up/down/move your VMs? Copyright 2014 Trend Micro Inc. 8
  • 9. Provisioning Infrastructure vCenter, AD, vCloud and AWS SAP Exchange Servers Oracle Web Servers Web Server Automate security as part of your operations • Gain visibility into environment using vCenter and vCloud Director integration • Recommend and apply policies automatically - specific to your data center • Automatically scale up and down as required—with no security gaps 19 Rules 15 Rules 73 Rules 8 Rules 28 Rules Copyright 2014 Trend Micro Inc. 9
  • 10. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 11 Extend to cloud with confidence
  • 11. Management Challenge: Keeping up-to-date How do you: • Quickly and easily identify an issue? • Keep up to date with patches? • Manage multiple controls as you execute your strategy for your data center and cloud? Copyright 2014 Trend Micro Inc. 12
  • 12. Protect even before you patch • Protect against vulnerability exploits before patches available • Save money avoiding costly emergency patching • Patch at your convenience Vulnerability Disclosed or Exploit Available Patch Available Complete Deployment Test Soak Exposure Begin Deployment PatchedTrend Micro Virtual Patching Copyright 2014 Trend Micro Inc. 14
  • 13. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 15 Extend to cloud with confidence
  • 14. Optimized for your virtual environments Network Usage Scan Speed CPU/Memory Usage IOPS Storage ESXi SAN Copyright 2014 Trend Micro Inc. 17
  • 15. Proven impact on data center resources 18 Scan Cache *All results based on internal testing using VMware View simulators Up to 20X Faster* Full Scans Up to 5X Faster Realtime Scans Up to 2X Faster VDI Login Copyright 2014 Trend Micro Inc. 18
  • 16. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 19 Extend to external or public cloud with confidence
  • 17. Public Cloud: Affects every organization Public cloud extension of Private Cloud by I.T. (Bursting) Business groups Bypass IT to use Public Cloud Private Cloud forced to take on attributes of Public Cloud (ITaaS) Copyright 2013 Trend20
  • 18. Security in the cloud is a Shared Responsibility Partner Eco-System • Operating Systems • Application • Security Groups • OS Firewalls • Anti-Virus • Account Management • Storage Encryption • Facilities • Physical Security • Physical Infrastructure • Virtualized Infrastructure Customer Domain AWSDomain Foundation Services Compute Storage Database Networking AWS Global Infrastructure Edge Locations Availability Zones Regions Enterprise Applications Enterprise Operation Systems
  • 19. Cloud Deployment Dynamics Instance Awareness • Dynamic real-time security visibility and response Complexity • Supporting multi-region and global deployments Scale & Automation • Elastic services and applications managed with new tools Data Protection • Protection of all data across boot & data volumes Purchasing • Ability to purchase security aligned to cloud models
  • 20. Common Management & Reporting Security platform for the modern data center 3/14/2014Copyright 2014 Trend Micro Inc. 25 Data Center Physical Virtual Private Cloud Public Cloud • Address security across ALL your environments • Comprehensive security to address varying risk Log Inspection Anti- Malware Intrusion Prevention Host Firewall Integrity Monitoring
  • 21. 100% of the top 10 automotive companies. 96% of the top 50 global corporations. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. Global Threat Intelligence New malware every ½ second CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United States Tokyo, Japan 5,137 36 $1.2B USD A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 26
  • 22. Thank you! Copyright 2014 Trend Micro Inc.