deep scurity

Upload: zza-zh

Post on 03-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Deep Scurity

    1/20

    Copyright 2011 Trend Micro Inc.

    Virtuali

    zation and Cloud Computing

    How to manage the risk?Available Aug 30, 2011

    Raimund Genes

    CTO Trend Micro

  • 7/28/2019 Deep Scurity

    2/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    3/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    4/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    5/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    6/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    7/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    8/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    9/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    10/20

    Copyright 2012 Trend Micro Inc.

    Infection Exfiltration(Sendspace)

    Informationto C&C

    http://blog.trendmicro.com/trojan-abuses-sendspace-a-closer-look/

  • 7/28/2019 Deep Scurity

    11/20

    Copyright 2012 Trend Micro Inc.

    Outside-in Model of Perimeter Defense

    Layer protection from outside in

    Keeps threats as far away as

    possible!

    Outside-In Security

  • 7/28/2019 Deep Scurity

    12/20

    Copyright 2012 Trend Micro Inc.

    Data Protection

    Data

    Self-Secured Workload

    Local Threat Intelligence

    When-Timeline Aware

    Who-Identity Aware Where-Location Aware

    What-Content Aware

    User-defined Access Policies

    Encryption

    Inside-out Security

    Inside-

    Out

    Security

    Endpoints Datacenters

  • 7/28/2019 Deep Scurity

    13/20

    Copyright 2012 Trend Micro Inc.

    Security Challenges Across theDynamic Datacenter

    Less visibility

    More external risks

    Security reduces

    performance

    Mixed workloads

    Glut of security

    products

    Less security

    Higher TCO

    VirtualPerformance & Threats

    CloudVisibility and Threats

    PhysicalManageability

  • 7/28/2019 Deep Scurity

    14/20

    Copyright 2012 Trend Micro Inc.

    IDS / IPS

    Web Application Protection

    Application Control

    Firewall

    Deep Packet Inspection

    Log

    Inspection

    Anti-Virus

    Detects and blocks known and

    zero-day attacks that target

    vulnerabilitiesShields web application

    vulnerabilities Provides increased visibility into,

    or control over, applications

    accessing the network

    Reduces attack surface.

    Prevents DoS & detects

    reconnaissance scans

    Detects malicious and

    unauthorized changes to

    directories, files, registry keys

    Optimizes the

    identification of important

    security events buried inlog entries

    Detects and blocks malware

    (web threats, viruses &

    worms, Trojans)

    Trend Micro Deep SecuritySystem, application and data security across:

    Protection is delivered via Agent and/or Virtual Appliance

    5 protection modules

    Integrity

    Monitoring

  • 7/28/2019 Deep Scurity

    15/20

    Copyright 2012 Trend Micro Inc.

    Key Challenge: Too many consoles, isolated

    policies

    Need: Consolidate disparate security

    products in 1 integrated agent & console

    Deep Security 7.5

    Firewall, IDS/IPS, File integrity

    monitoring and log inspection agent

    Deep Security 8 Added antivirus agent supporting both

    Windows and Linux environments

    Easy to use FIM with golden hosts &

    cloud-based event whitelisting

    Physical

    Windows, Linux,

    AIX, UNIX,

    Solaris

    Security for Physical ServersReduce Complexity

    Deep Security 8 is

    the server security

    platform that

    protects servers

    with ONE integrated

    agent & console

  • 7/28/2019 Deep Scurity

    16/20

    Copyright 2012 Trend Micro Inc.

    Security for Virtual ServersIncrease Efficiency

    Key Challenge: Consolidation limits due to

    performance & resource inefficiencyNeed: Integrate security at the hypervisor

    level via a virtual appliance

    Deep Security 7.5 Agentless firewall, IDS/IPS

    Agentless antivirus

    Deep Security 8 Agentless file integrity monitoring

    Hypervisor integrity via Intel TPM/TXT

    Web reputation services integration for

    improved VDI protection

    Virtual

    VMware vSphere

    vCenter, vDirector

    Deep Security 8 will

    lower barriers to

    adoption for FIM

    and enable greater

    security with zero

    added footprint

  • 7/28/2019 Deep Scurity

    17/20

    Copyright 2012 Trend Micro Inc.

    Key Challenge: Data security in the cloud

    Need: Enable path to private, public or

    hybrid cloud with added data security,

    management APIs and multi-tenancy

    support

    Deep Security 8 with SecureCloud 1.2

    Support for bare metal and virtual

    infrastructure without cloud API

    Deep Security 8.0 with SecureCloud 2

    Deep Security Manager integration

    FIPS 140-2 certification

    Key revocation, rotation & lifecycle mgmt

    Cloud

    Amazon, vCloud

    Security for Cloud ServersDeliver Agility

    Deep Security 8with SecureCloud 2

    will provide context-

    aware data security

    necessary for ALL

    cloud environments

  • 7/28/2019 Deep Scurity

    18/20

    Copyright 2012 Trend Micro Inc.

    Patient Medical RecordsCredit Card Payment

    InformationSensitive Research ResultsSocial Security Numbers

    Encryption with Policy-based

    Key Management

    Data is unreadable

    to unauthorized users

    Policy-based key management

    controls and automates key

    delivery

    Server validation authenticates

    servers requesting keys

    SecureCloud 2

    Total Cloud Protection withDeep Security 8 and SecureCloud 2System, application and data security in the cloud

    Deep Security 8

    Modular protection for

    servers and applications

    Self-Defending VM Security

    in the Cloud

    Agent on VM allows travel

    between cloud solutions

    One management portal for

    all modules

    Context

    Aware

  • 7/28/2019 Deep Scurity

    19/20

    Copyright 2012 Trend Micro Inc.

  • 7/28/2019 Deep Scurity

    20/20

    Copyright 2012 Trend Micro Inc.

    [email protected]