trend micro end to end security protection by steve quane

Upload: mk777

Post on 09-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    1/30

    1 Copyright 2010 EMC Corporation. All rights reserved.

    End to End Protection for

    Virtualised & Cloud Environments

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    2/30

    Copyright 2009 Trend Micro Inc.

    Why virtualization matters

    Speed and Business Impact

    Expertise and Performance

    Massive Cost Reduction

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    3/30

    Copyright 2009 Trend Micro Inc.

    15% 30% 70%

    85%

    Stage 1Consolidation

    DC Consolidation

    - Non-mission criticalbase applications

    - Standardized hypervisor- Simple VM Management

    Public and private cloud

    - Multi-hypervisor-Virtualized storage

    -Multi-tenancy-Workload Management

    -Dedicate or Burst to public

    Stage 3Private > Public Cloud

    Mission critical applications&

    Endpoint Control

    - Performance becomes critical-API and advanced

    management useVDI sampling

    -Enhanced Compliance controls

    Servers

    Desktops

    Stage 2Expansion & Desktop

    GET TECHIE

    Typical Customer Virtualization Evolution

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    4/30

    Copyright 2009 Trend Micro Inc.

    By far, the number one concern aboutcloud services is security .-- Frank Gens, IDC, Senior VP & Chief Analyst

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    5/30

    Copyright 2009 Trend Micro Inc. 5

    Phase 1 Security Challenge

    Perimeter- only (Outside -in) approach together

    with rapid virtualization have created less secureapplication environments

    Through 2012, 60% of virtualized servers will be less secure thanthe physical servers they replace.

    Addressing the Most Common Security Risks in Data Center Virtualization Projects Gartner, 25 January 2010

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    6/30

    Copyright 2009 Trend Micro Inc.

    Phase I: The virtual datacenter is verydynamic !

    6

    Hypervisor

    Inter-VMattacks PCI Mobility Cloud Computing

    New Challenges Require a New Security Architecture

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    7/30

    Copyright 2009 Trend Micro Inc.

    Virtual Machines Need Specialized Protection

    Same threats in virtualized servers

    as physical.

    New challenges:1. Instant-on/Dormant VMs

    2. Resource contention

    3. VM Sprawl

    4. Inter-VM traffic

    5. vMotion

    7

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    8/30

    Copyright 2009 Trend Micro Inc.

    Virtualization Security FoundationSecure the workload

    App3

    OS3

    VM3

    App1

    OS1

    VM1

    Hypervisor

    VM & NetworkSecurity Integration

    Self-secured workloadApp FW, IPS, AV

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    9/30

    Copyright 2009 Trend Micro Inc.

    Customers most common Phase I concern:Instant-on or unmanaged VMs & Patching

    Determines missing patches and existing vulnerabilities Operating System

    Common desktop applications

    Recommends set of lightweight, fast-to-deploy filters Virtually patches the vulnerabilities

    Zero-Day protection

    Reports on attempts to exploit vulnerabilities

    Removes filters as soon as the patch is deployed

    Virtual patch endpoints until patch is readyWithout exposing them to exploits

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    10/30

    Copyright 2009 Trend Micro Inc.

    Deep SecurityInside -out Protection Model for Physical,Virtual and Cloud Computing

    De-Militarized Zone (DMZ)

    Mission Critical ServersBusiness Servers

    FirewallIPS Firewall

    NIPSIPS

    Firewall

    File Integrity

    Monitoring

    Log Inspection

    IDS / IPS

    Trend Micro Deep Security Provides A Secure

    Container for Applications and Data

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    11/30

    Copyright 2009 Trend Micro Inc.

    15% 30% 70%

    85%

    Stage 1Consolidation

    DC Consolidation

    - Non-mission criticalbase applications

    - Standardized hypervisor- Simple VM Management

    Stage 2Expansion & Desktop

    Mission critical applications&

    Endpoint Control

    - Performance becomes critical-API and advanced

    management useVDI sampling

    -Enhanced Compliance controls

    Servers

    Desktops

    Hybrid andselected public cloud

    - Multi-hypervisor-Virtualized storage

    -Workload Management-Burst to public

    Stage 3Private > Public Cloud

    GET TECHIE

    Typical Customer Virtualization Evolution

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    12/30

    Copyright 2009 Trend Micro Inc. 12

    Phase 2: Security Challenge

    Virtually unaware traditional security

    architectures eliminate the benefits of VDI andvirtualized mission-critical applications

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    13/30

    Copyright 2009 Trend Micro Inc.

    Phase II Server Performance

    13

    App

    OS

    ESX Server

    App

    OS

    App

    OS

    VMsafe APIs

    Security VM

    Firewall

    IDS / IPSAnti-VirusIntegrity

    Monitoring

    Protect the VM by inspection of virtual components Unprecedented security for the app & data inside the VM Complete integration with, and awareness of, vMotion,

    Storage VMotion, HA, etc.

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    14/30

    Copyright 2009 Trend Micro Inc.

    Phase II: Securing virtual desktops (VDI)

    Malware risk potential: Identical to physical desktops Same operating systems Same software Same vulnerabilities Same user activities

    => Same risk of exposing corporate and sensitive data

    New challenges, unique to VDI: Identify endpoints virtualization status

    Manage resource contention CPU Storage IOPs Network

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    15/30

    Copyright 2009 Trend Micro Inc.

    FILEREPUTATION

    WEBREPUTATION

    Phase II: Cloud-client architecture

    Threat Collection

    Partners

    ISPs Routers Etc.

    Endpoint

    Gateway

    SaaS/Managed

    Cloud

    Management

    Off Network

    Messaging

    Threats

    EMAILREPUTATION

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    16/30

    Copyright 2009 Trend Micro Inc.

    CLOUD-CLIENT ARCHITECTURE Speeds protection

    In-the-cloud technologies are constantly updated Frees resources

    Offloads growing patterns to the cloud

    Phase II: Light and Lean ArchitectureSmart Protection Network

    GLOBAL THREAT INTELLIGENCE Correlated

    Integrates web, email, and file reputation databases Instant feedback

    Immediately updates using global feedback loops

    WEB

    FILE

    EMAIL

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    17/30

    Copyright 2009 Trend Micro Inc.

    The 9 -AM problem Multiple users log in and download updates at the same time

    AV-Storms, Scheduled scans Adds significant load to the endpoint Multiplied by number of VMs

    Cumulativesystem loadExisting Endpoint Security Induces

    Resource Contention and LimitsDesktop Virtualization Benefits

    Phase II: IT Environment ChangesChallenge: Resource Contention with VDI

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    18/30

    Copyright 2009 Trend Micro Inc.

    Phase II Security has to have VDI-Intelligence

    Detects whether endpoints are physical or virtual With VMware View With Citrix XenDesktop

    Serialize updates and scans per VDI-host Controls the number of concurrent scans and updates per VDI host Maintains availability and performance of the VDI host Faster than concurrent approach

    Leverages Base-Images to further shorten scan times Pre-scans and white-lists VDI base-images Prevents duplicate scanning of unchanged files on a VDI host Further reduces impact on the VDI host

    Can be done agentlessly as well

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    19/30

    Copyright 2009 Trend Micro Inc.

    OfficeScan 10.5 has VDI-intelligence

    With OfficeScan 10.5, you can run more than double the number of desktop images per host without sacrificingsecurity

    Investment in OfficeScans VDI plug -in pays for itself: In less than 3 months with 1000 users*

    In less than 2 months with 2500 users*

    *: assuming average cost of $8000 per VDI server and the deployment of standard endpoint secur

    You no longer have to choose betweenSecurity and Return On Investment

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    20/30

    Copyright 2009 Trend Micro Inc.

    Summary of Phase II Solutions

    Light and lean agents when deep visibilityis required Using cloud-client architecture

    Agent-less option for application & serverperformance Using virtualization APIs

    Architecture optimizes performance acrossentire infrastructure Processes are virtually -aware across CPU, network,

    and storage

    Trend Micro Confidential11/26/2010 20

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    21/30

    Copyright 2009 Trend Micro Inc.

    15% 30% 70%

    85%

    Stage 1Consolidation

    DC Consolidation

    - Non-mission criticalbase applications

    - Standardized hypervisor- Simple VM Management

    Stage 2Expansion & Desktop

    Mission critical applications&

    Endpoint Control

    - Performance becomes critical-API and advanced

    management useVDI sampling

    -Enhanced Compliance controls

    Servers

    Desktops

    Hybrid andselected public cloud

    - Multi-hypervisor-Virtualized storage

    -Workload Management-Burst to public

    Stage 3Private > Public Cloud

    GET TECHIE

    Typical Customer Virtualization Evolution

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    22/30

    Copyright 2009 Trend Micro Inc.

    Phase III: Virtualized Storage and Multi-tenancyCreates Data Protection Nightmares

    Classification 11/26/2010 22

    Perimeter

    Public andPrivate

    CloudDatacenter

    Strong perimeter securityNo shared CPU

    No shared networkNo shared storage

    Weak perimeter securityShared CPU

    Shared networkShared storage

    Traditional outside -in approach is inadequate in an

    inside -out cloud world full of strangers

    Hypervisor

    C o m p an

    y1

    A p p2

    A p p1

    A p p 3

    A p p1

    A p p2

    A p p 3

    A p p4

    A p p 5

    A p pn

    C o m p an

    y2

    C o m p an

    y 3

    C o m p an

    y4

    C o m p an

    y 5

    C o m p an

    yn

    Hypervisor

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    23/30

    Copyright 2009 Trend Micro Inc.

    The Public Cloud:Who Has Control? How Secure is the Data?

    Servers Virtualization &Private Cloud

    Public CloudPaaS

    Public CloudIaaS

    End-User (Enterprise)Service Provider

    Public CloudSaaS

    23Trend Micro Confidential 11/26/2010

    Hypervisor

    C o m p an

    y1

    A p p2

    A p p1

    A p p 3

    A p p1

    A p p2

    A p p 3

    A p p4

    A p p 5

    A p pn

    C o m p an

    y2

    C o m p an

    y 3

    C o m p an

    y4

    C o m p an

    y 5

    C o m p an

    yn

    Hypervisor

    Data

    Shared CPUShared networkShared storage

    Company

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    24/30

    Copyright 2009 Trend Micro Inc. 24

    Phase 3: Security Challenge

    How do I protect data in a virtualized and multi-tenant storage environment (private, hybrid, or

    public cloud) ?

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    25/30

    Copyright 2009 Trend Micro Inc.

    SecureCloud: Enterprise ControlledData Protection for the Cloud

    25

    Patent pending Trend Micro technology enablesenterprises to retain control of data in the cloud

    Trend Micro Confidential11/26/2010 25

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    26/30

    Copyright 2009 Trend Micro Inc. 26

    All Phases: Architecture Security ChallengeHow do I bring it all together in a manageable way

    across virtualized, private and public cloudenvironments?

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    27/30

    Copyright 2009 Trend Micro Inc.

    A New Security Architecture For A New EraAll environments should be considered un-trusted

    Usersaccess app

    Image ensures datais always encrypted

    and managed

    Host defendsitself from attack

    EncryptedData

    Encryption keyscontrolled by you

    DC1, LAN 1

    Cloud 2, LAN 1

    Data

    Cloud 1, LAN 2

    DC2, LAN 2

    Data

    Public CloudDatacenter

    Data

    Trend Micro Confidential11/26/2010 27

    BenefitsFacilitates movement between

    datacenter & cloudDelivers security compliancethrough encryptionEnables portability between serviceprovidersEnsures private data in public cloud

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    28/30

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    29/30

    Copyright 2009 Trend Micro Inc.

    ANSWER: YES, BUT ONLY WITH ABETTER -THAN-PHYSICAL CLOUD

    SECURITY ARCHITECTURE

    Back to the question: To Virtualize or not ?

    Trend Micro Confidential11/26/2010 29

    Speed and Business Impact

    Expertise and Performance

    Massive Cost Reduction

  • 8/8/2019 Trend Micro End to End Security Protection by Steve Quane

    30/30

    Copyright 2009 Trend Micro Inc.

    Thank you

    For visiting the Trend Micro Carnival