SlideShare a Scribd company logo
1 of 34
Download to read offline
Securing Your Journey to the Cloud
Rami Naccache – Sr. Presales Engineer
Trend Micro Middle East
Data Center Evolution:
Physical. Virtual. Cloud.
1
15/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Desktops & Servers
Desktop
Virtualization
Server
Virtualization
Private
Cloud
Hybrid Cloud
Public
Cloud
Mobile
BYOPC
Journey to the Cloud
Where is Your Data?
25/13/2013 Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Empower the business:
Improve business agility by providing quick and
intuitive access to the right information, tools
and applications
Mitigate the risk:
Protect sensitive information to maintain brand
and comply with regulations,
while controlling costs
CIO
Branch
Offices
Main Campus
Mobile Workers
Fixed
Telecommuters
Internet
Data
Center
SaaS
IaaS
Private
Public
ENDPOINT
Infection via Social Engineering
Heavy User Touch Environment
Consumerization is key trend
SERVER
Infection via Threat Injection
Locked Down Mission-Critical Env.
Virtualization/Cloud is key trend
Journey to the Cloud
Endpoint and Server Security Diverging
Virtual CloudPhysical
Cross-platform Security
One Security Model is Possible
across Physical, Virtual, and Cloud Environments
• New platforms don’t change the threat landscape
• Each platform has unique security risks
• Integrated security is needed across all platforms
55/13/2013 Copyright 2013 Trend Micro Inc.
Platform-specific Security Risks
One Security Model is Possible
across Physical, Virtual, and Cloud Environments
Visibility & Threats
• Less visibility
• More external risks
Performance & Threats
• Security degrades
performance
• New VM-based threats
Manageability
• Glut of security products
• Less security
• Higher TCO
Virtual CloudPhysical
Increase Efficiency Deliver AgilityReduce Complexity
Integrated Security
Single Management Console
65/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Consolidate Physical Security
Reduce Complexity
Advanced Reporting
Module
Single Management
Console
Firewall
HIPS /
Virtual
Patching
File Integrity
MonitoringAntivirus
Log
Inspection
Web
Application
Protection
One Server Security Platform
Reduce Complexity
85/13/2013 Copyright 2013 Trend Micro Inc.
Virtual
Server and Desktop Virtualization Security
Increase Efficiency
Typical AV
Console
3:00am Scan
Antivirus Storm
Automatic security scans overburden the system
Virtualization Security
Challenge: Resource Contention
105/13/2013 Copyright 2013 Trend Micro Inc.
Reactivated and cloned VMs can have out-of-date security
Dormant
 
Virtualization Security
Challenge: Instant-on Gaps
Active

Reactivated with
out dated security Cloned
   
115/13/2013 Copyright 2013 Trend Micro Inc.
Attacks can spread across VMs
Virtualization Security
Challenge: Inter-VM Attacks / Blind Spots
125/13/2013 Copyright 2013 Trend Micro Inc.
Virtualization Security
VM sprawl inhibits compliance
Challenge: Complexity of Management
Patch
agents
Rollout
patterns
Provisioning
new VMs
Reconfiguring
agents
135/13/2013 Copyright 2013 Trend Micro Inc.
• Antivirus
• Integrity Monitoring
Agentless Security for VMware — Antivirus and more
VM VM VM
The Old Way
Security
Virtual
Appliance
VM VM VM
With Agentless Security
VM
• Intrusion Prevention
• Virtual Patching
• Firewall
• Web Application Protection
Virtualization Security
What is the Solution?
A Dedicated Security Virtual Appliance
VM VM VM VMVM VM
Maximizes Performance and ROI
145/13/2013 Copyright 2013 Trend Micro Inc.
Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011;
Saving estimate based on VMware ROI calculations
0 10 20 30 40 50 60 70 80
TraditionalAV
AgentlessAV
VM’s per host
75
25 3X higher VDI VM consolidation ratios
3-year Savings on 1000 VDI VMs = $539,600
Virtualization Security
Increased ROI with Agentless Security
Example: Agentless Antivirus
155/13/2013 Copyright 2013 Trend Micro Inc.
Security
Virtual
Appliance
VM VM VM
With Agentless Security
VM
Virtualization Security
What is the Solution?
Layered, Virtualization-Aware Security in One Platform
VM VM VM VMVM VM
Protect your efforts to consolidate servers,
enable VDI, and support consumerization
Integrated Modules:
• Antivirus
• Integrity Monitoring
• Intrusion Prevention
• Web Application Protection
• Application Control
• Firewall
• Log Inspection
Simplified
Management
Higher
Density
Optimized
Resources
Stronger
Security
165/13/2013 Copyright 2013 Trend Micro Inc.
vShield
Endpoint
Security
Virtual
Appliance
Other
VMware
APIs
Security agent
on individual VMs
Integrates
with
vCenter
Antivirus
Agentless
Agentless
IDS / IPS
Web Application Protection
Application Control
Firewall
Log Inspection
Agent-based
Virtualization Security
Integrity Monitoring
vSphere
Virtual
Environment
Virtualization Security
Fitting into the VMware Ecosystem
175/13/2013 Copyright 2013 Trend Micro Inc.
 Hypervisor-integrated agentless antivirus released in Nov. 2010
 1000 agentless security customers in the first year
 Over 250,000 VMs are licensed for agentless antivirus
 Agentless FIM released in 2012
 Multiple agentless security modules now available
 Largest customer purchase is 8,000 VMs
 Most dense deployment is 300 VMs/host
“Deep Security provides a robust set of tools to add to your toolbox.
The realized performance improvement is visible to the naked eye.”
- Ed Haletky, Virtualization Practice (www.virtualizationpractice.com)
Virtualization Security
Trend Micro Market Momentum
Agentless Security
185/13/2013 Copyright 2013 Trend Micro Inc.
AM Scan Performance
5/13/2013 19Copyright 2013 Trend Micro Inc.
1st AM
scan
2nd AM
scan
(cached)
Scan time ~ 20x faster
Significant DSVA CPU
Reduction
Huge IO Volume
Reduction
Cloud Computing
Cloud Deployments and Security
Deliver Agility
Additional Resources
• Scalability
• Cost savings
Provides
business agility
Data Access
• Anytime, anywhere
• Device flexibility
Supports BYOD and
consumerization
Security is the
#1 cloud adoption inhibitor
Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011
Cloud Security
Why Companies Turn to the Cloud
215/13/2013 Copyright 2013 Trend Micro Inc.
Who is responsible for security?
• With IaaS the customer is responsible for VM-level security
• With SaaS or PaaS the service provider is responsible for security
Public Cloud
PaaS
Public Cloud
IaaS
Servers Virtualization &
Private Cloud
End-User (Enterprise) Service Provider
Public Cloud
SaaS
Cloud Security
Cloud Models: Who Has Control?
22Copyright 2013 Trend Micro Inc.5/13/2013
Cloud Security
Challenge: Multi-tenancy / Mixed Trust Level VMs
Shared resources creates
a mixed trust level environment
235/13/2013 Copyright 2013 Trend Micro Inc.
Cloud Security
Challenge: Data Access and Governance
Cloud data can provide less visibility and control
10010011
01101100
245/13/2013 Copyright 2013 Trend Micro Inc.
10011
01110
00101
Cloud Security
Challenge: Data Destruction
When data is moved, unsecured data remnants can remain
10011
01110
00101
10011
0
00101
255/13/2013 Copyright 2013 Trend Micro Inc.
Patient Medical Records
Credit Card Payment
Information
Sensitive Research ResultsSocial Security Numbers
• Unreadable for
unauthorized users
• Control of when and
where data is accessed
• Server validation
• Custody of keys
Encryption
with Policy-based
Key Management
Cloud Security
Modular Protection
• Self-defending VM security
• Agentless and agent-based
• One management portal for
all modules, all deployments
vSphere & vCloud
Cloud Security
What is the Solution? Workload and Data Protection
Integration ensures servers have up-to-date
security before encryption keys are released
VM VM VM VMVM VM VM VMVM VM VM VM
Data Center Private Cloud Public Cloud
VMware vCloud
VMware
vSphere
Encryption throughout your cloud journey—
data protection for physical, virtual & cloud
1 Cloud Security
Fitting Encryption into a VMware Ecosystem
Enterprise Key
Key Service
Console
Encryption
Solution
275/13/2013 Copyright 2013 Trend Micro Inc.
Physical
Database
Storage
Virtual
Web
Server
Mail
Server
Web
Server
Enterprise
Providers
Deep Security
Web
Access
Securing Workloads
Physical, Private, and Public Clouds
VM
VMware Virtualization
Security
Virtual
Appliance
VM VM VM VM
• Agentless security
• Layered server security
• Encryption for vSphere
Private Cloud
• Agentless security
• Layered server security
Security
Virtual
Appliance
VM VM VM
Public Cloud
Server security console
• Shared policy profile
• Virtual patching
VM
VM VM VMVM
• Encryption for vCloud
• Compliance support
(FIM, Encryption, etc.)
Encryption console
• Shared policy profile
• Key ownership
• Agent-based security
• Layered server security
• Encryption for leading cloud providers
• Compliance support
(FIM, Encryption, etc.)
VM
Virtualization and Cloud Security
One Security Model
295/13/2013 Copyright 2013 Trend Micro Inc.
Trend Micro Confidential-NDA Required
Extending to cloud scale
• Resource-pooling – independent tenant policies/data for
shared, multi-tenant clouds
• Elasticity – Automated deployment of components to cloud scale
• Self-service – Policies can be delegated by cloud admin to tenants
through self-service GUI
Same architecture can be deployed as security-as-a-service by IaaS
public cloud providers, or within enterprise ITaaS for private clouds.
―Cloud Workloads Security‖ as a Service
Support for Multi-Tenant clouds
5/13/2013 31Copyright 2013 Trend Micro Inc.
Virtualization and Cloud Security
Leading Industry Success Stories
Trend
Micro
Worldwide Endpoint Security
Revenue Share by Vendor, 2010
Source: IDC, 2011
Trend Micro
Source: 2011 Technavio – Global Virtualization
Security Management Solutions
Source: 2012 Technavio – Global
Cloud Security Software Market
Trend Micro is No.1 in Server, Virtualization, & Cloud Security
Why is Trend Micro an Expert?
#1 in Cloud Security
#1 in Virtualization
Security
#1 in Server
Security
Trend
Micro
Trend
Micro
Virtual CloudPhysical
Virtualization and Cloud Security
One Security Model is Possible
• Reduce Your Cost of Operations
• Reduce Your Investment in Management
• Increase Application Stability and Performance
• Achieve Compliance in Virtual and Cloud Environments
• Get Higher Virtualization and Cloud ROI
• Safely Use Private, Public, and Hybrid Clouds
335/13/2013 Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
www.cloudjourney.com

More Related Content

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CW13 Securing Your Journey to the Cloud by Rami Naccache

  • 1. Securing Your Journey to the Cloud Rami Naccache – Sr. Presales Engineer Trend Micro Middle East Data Center Evolution: Physical. Virtual. Cloud. 1 15/13/2013 Copyright 2013 Trend Micro Inc.
  • 2. Physical Desktops & Servers Desktop Virtualization Server Virtualization Private Cloud Hybrid Cloud Public Cloud Mobile BYOPC Journey to the Cloud Where is Your Data? 25/13/2013 Copyright 2013 Trend Micro Inc.
  • 3. Copyright 2013 Trend Micro Inc. Empower the business: Improve business agility by providing quick and intuitive access to the right information, tools and applications Mitigate the risk: Protect sensitive information to maintain brand and comply with regulations, while controlling costs CIO
  • 4. Branch Offices Main Campus Mobile Workers Fixed Telecommuters Internet Data Center SaaS IaaS Private Public ENDPOINT Infection via Social Engineering Heavy User Touch Environment Consumerization is key trend SERVER Infection via Threat Injection Locked Down Mission-Critical Env. Virtualization/Cloud is key trend Journey to the Cloud Endpoint and Server Security Diverging
  • 5. Virtual CloudPhysical Cross-platform Security One Security Model is Possible across Physical, Virtual, and Cloud Environments • New platforms don’t change the threat landscape • Each platform has unique security risks • Integrated security is needed across all platforms 55/13/2013 Copyright 2013 Trend Micro Inc.
  • 6. Platform-specific Security Risks One Security Model is Possible across Physical, Virtual, and Cloud Environments Visibility & Threats • Less visibility • More external risks Performance & Threats • Security degrades performance • New VM-based threats Manageability • Glut of security products • Less security • Higher TCO Virtual CloudPhysical Increase Efficiency Deliver AgilityReduce Complexity Integrated Security Single Management Console 65/13/2013 Copyright 2013 Trend Micro Inc.
  • 8. Advanced Reporting Module Single Management Console Firewall HIPS / Virtual Patching File Integrity MonitoringAntivirus Log Inspection Web Application Protection One Server Security Platform Reduce Complexity 85/13/2013 Copyright 2013 Trend Micro Inc.
  • 9. Virtual Server and Desktop Virtualization Security Increase Efficiency
  • 10. Typical AV Console 3:00am Scan Antivirus Storm Automatic security scans overburden the system Virtualization Security Challenge: Resource Contention 105/13/2013 Copyright 2013 Trend Micro Inc.
  • 11. Reactivated and cloned VMs can have out-of-date security Dormant   Virtualization Security Challenge: Instant-on Gaps Active  Reactivated with out dated security Cloned     115/13/2013 Copyright 2013 Trend Micro Inc.
  • 12. Attacks can spread across VMs Virtualization Security Challenge: Inter-VM Attacks / Blind Spots 125/13/2013 Copyright 2013 Trend Micro Inc.
  • 13. Virtualization Security VM sprawl inhibits compliance Challenge: Complexity of Management Patch agents Rollout patterns Provisioning new VMs Reconfiguring agents 135/13/2013 Copyright 2013 Trend Micro Inc.
  • 14. • Antivirus • Integrity Monitoring Agentless Security for VMware — Antivirus and more VM VM VM The Old Way Security Virtual Appliance VM VM VM With Agentless Security VM • Intrusion Prevention • Virtual Patching • Firewall • Web Application Protection Virtualization Security What is the Solution? A Dedicated Security Virtual Appliance VM VM VM VMVM VM Maximizes Performance and ROI 145/13/2013 Copyright 2013 Trend Micro Inc.
  • 15. Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011; Saving estimate based on VMware ROI calculations 0 10 20 30 40 50 60 70 80 TraditionalAV AgentlessAV VM’s per host 75 25 3X higher VDI VM consolidation ratios 3-year Savings on 1000 VDI VMs = $539,600 Virtualization Security Increased ROI with Agentless Security Example: Agentless Antivirus 155/13/2013 Copyright 2013 Trend Micro Inc.
  • 16. Security Virtual Appliance VM VM VM With Agentless Security VM Virtualization Security What is the Solution? Layered, Virtualization-Aware Security in One Platform VM VM VM VMVM VM Protect your efforts to consolidate servers, enable VDI, and support consumerization Integrated Modules: • Antivirus • Integrity Monitoring • Intrusion Prevention • Web Application Protection • Application Control • Firewall • Log Inspection Simplified Management Higher Density Optimized Resources Stronger Security 165/13/2013 Copyright 2013 Trend Micro Inc.
  • 17. vShield Endpoint Security Virtual Appliance Other VMware APIs Security agent on individual VMs Integrates with vCenter Antivirus Agentless Agentless IDS / IPS Web Application Protection Application Control Firewall Log Inspection Agent-based Virtualization Security Integrity Monitoring vSphere Virtual Environment Virtualization Security Fitting into the VMware Ecosystem 175/13/2013 Copyright 2013 Trend Micro Inc.
  • 18.  Hypervisor-integrated agentless antivirus released in Nov. 2010  1000 agentless security customers in the first year  Over 250,000 VMs are licensed for agentless antivirus  Agentless FIM released in 2012  Multiple agentless security modules now available  Largest customer purchase is 8,000 VMs  Most dense deployment is 300 VMs/host “Deep Security provides a robust set of tools to add to your toolbox. The realized performance improvement is visible to the naked eye.” - Ed Haletky, Virtualization Practice (www.virtualizationpractice.com) Virtualization Security Trend Micro Market Momentum Agentless Security 185/13/2013 Copyright 2013 Trend Micro Inc.
  • 19. AM Scan Performance 5/13/2013 19Copyright 2013 Trend Micro Inc. 1st AM scan 2nd AM scan (cached) Scan time ~ 20x faster Significant DSVA CPU Reduction Huge IO Volume Reduction
  • 20. Cloud Computing Cloud Deployments and Security Deliver Agility
  • 21. Additional Resources • Scalability • Cost savings Provides business agility Data Access • Anytime, anywhere • Device flexibility Supports BYOD and consumerization Security is the #1 cloud adoption inhibitor Sources: 1) Security Catalyst. Barometer Assessment: Final Report, Oct 14, 2011; 2) Trend Micro Survey, May 2011 Cloud Security Why Companies Turn to the Cloud 215/13/2013 Copyright 2013 Trend Micro Inc.
  • 22. Who is responsible for security? • With IaaS the customer is responsible for VM-level security • With SaaS or PaaS the service provider is responsible for security Public Cloud PaaS Public Cloud IaaS Servers Virtualization & Private Cloud End-User (Enterprise) Service Provider Public Cloud SaaS Cloud Security Cloud Models: Who Has Control? 22Copyright 2013 Trend Micro Inc.5/13/2013
  • 23. Cloud Security Challenge: Multi-tenancy / Mixed Trust Level VMs Shared resources creates a mixed trust level environment 235/13/2013 Copyright 2013 Trend Micro Inc.
  • 24. Cloud Security Challenge: Data Access and Governance Cloud data can provide less visibility and control 10010011 01101100 245/13/2013 Copyright 2013 Trend Micro Inc.
  • 25. 10011 01110 00101 Cloud Security Challenge: Data Destruction When data is moved, unsecured data remnants can remain 10011 01110 00101 10011 0 00101 255/13/2013 Copyright 2013 Trend Micro Inc.
  • 26. Patient Medical Records Credit Card Payment Information Sensitive Research ResultsSocial Security Numbers • Unreadable for unauthorized users • Control of when and where data is accessed • Server validation • Custody of keys Encryption with Policy-based Key Management Cloud Security Modular Protection • Self-defending VM security • Agentless and agent-based • One management portal for all modules, all deployments vSphere & vCloud Cloud Security What is the Solution? Workload and Data Protection Integration ensures servers have up-to-date security before encryption keys are released
  • 27. VM VM VM VMVM VM VM VMVM VM VM VM Data Center Private Cloud Public Cloud VMware vCloud VMware vSphere Encryption throughout your cloud journey— data protection for physical, virtual & cloud 1 Cloud Security Fitting Encryption into a VMware Ecosystem Enterprise Key Key Service Console Encryption Solution 275/13/2013 Copyright 2013 Trend Micro Inc.
  • 29. VM VMware Virtualization Security Virtual Appliance VM VM VM VM • Agentless security • Layered server security • Encryption for vSphere Private Cloud • Agentless security • Layered server security Security Virtual Appliance VM VM VM Public Cloud Server security console • Shared policy profile • Virtual patching VM VM VM VMVM • Encryption for vCloud • Compliance support (FIM, Encryption, etc.) Encryption console • Shared policy profile • Key ownership • Agent-based security • Layered server security • Encryption for leading cloud providers • Compliance support (FIM, Encryption, etc.) VM Virtualization and Cloud Security One Security Model 295/13/2013 Copyright 2013 Trend Micro Inc.
  • 30. Trend Micro Confidential-NDA Required Extending to cloud scale • Resource-pooling – independent tenant policies/data for shared, multi-tenant clouds • Elasticity – Automated deployment of components to cloud scale • Self-service – Policies can be delegated by cloud admin to tenants through self-service GUI Same architecture can be deployed as security-as-a-service by IaaS public cloud providers, or within enterprise ITaaS for private clouds. ―Cloud Workloads Security‖ as a Service Support for Multi-Tenant clouds
  • 31. 5/13/2013 31Copyright 2013 Trend Micro Inc. Virtualization and Cloud Security Leading Industry Success Stories
  • 32. Trend Micro Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Trend Micro Source: 2011 Technavio – Global Virtualization Security Management Solutions Source: 2012 Technavio – Global Cloud Security Software Market Trend Micro is No.1 in Server, Virtualization, & Cloud Security Why is Trend Micro an Expert? #1 in Cloud Security #1 in Virtualization Security #1 in Server Security Trend Micro Trend Micro
  • 33. Virtual CloudPhysical Virtualization and Cloud Security One Security Model is Possible • Reduce Your Cost of Operations • Reduce Your Investment in Management • Increase Application Stability and Performance • Achieve Compliance in Virtual and Cloud Environments • Get Higher Virtualization and Cloud ROI • Safely Use Private, Public, and Hybrid Clouds 335/13/2013 Copyright 2013 Trend Micro Inc.
  • 34. Copyright 2013 Trend Micro Inc. www.cloudjourney.com