SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Magic Words of VDI Security:
“Agentless” and “Aware”
David Girard, Senior Security Advisor – Trend Micro Canada


                                                     1




                                                             1
Virtualization Project                                            ?
Desktop       Server                            Cloud                    Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   2




                                                                                             2
Security Built for VMware
           The most comprehensive suite
                  of next-generation
           virtualization security solutions
Desktop      Server                           Cloud                      Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   3




                                                                                             3
Security Built for VMware

  IT Operations                  Security                                    Compliance



Consolidation rates        Protect data                                      Ensure
Operational efficiencies   & applications                                    compliance
Flexibility
Savings




                           10/4/2010   Copyright 2009 Trend Micro Inc.   4




                                                                                          4
Security Built for VMware

Desktop      Server                           Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc.   5




                                                                                            5
Key Issue:
Resource Contention

                                High impact : Employee’s arrival or schedule scans


 9:00am Scan
  Typical AV
   Console




 If several, or all, VMs start a full anti-malware scan at the same time, the underlying
 shared hardware will experience extreme load (memory, CPU, I/O), causing a
 slowdown of all virtual systems on the server.
 Large pattern file updates require significant memory and can impact, network and
 storage I/O resources.
                                Classification 10/4/2010   Copyright 2009 Trend Micro Inc.   6




                                                                                                 6
VDI Security option #1: OfficeScan
(First AV optimized for VDI)

           Trend Micro OfficeScan
           Protects virtual & physical endpoints
           • VDI Intelligence with VDI plug-in
           • Serializes updates and scans per VDI-host
           • Leverages base-images to further shorten scan times
           • Smart Scan limit Endpoints pattern updates since it is
             mostly in the cloud




                         10/4/2010   Copyright 2009 Trend Micro Inc.   7




                                                                           7
OfficeScan 10.5 has VDI-Intelligence


• Detects whether endpoints are physical or virtual
  – With VMware View
• Serializes updates and scans per VDI-host
  – Controls the number of concurrent scans and updates per VDI host
  – Maintains availability and performance of the VDI host
  – Faster than concurrent approach
• Leverages Base-Images to further shorten scan times
  – Pre-scans and white-lists VDI base-images
  – Prevents duplicate scanning of unchanged files on a VDI host
  – Further reduces impact on the VDI host



                                 Copyright 2009 Trend Micro Inc.




                                                                       8
OfficeScan 10.5 Integrates with vCenter




                    10/4/2010   Copyright 2009 Trend Micro Inc.   9




                                                                      9
CPU




      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 10




                                                                      10
CPU - Analysis
 • Only 10.5 can support 20+ desktop images with mixed user profile.
 • With no AV, average CPU utilization while 4 heavy and 16 light user
   script is running is 33%
 • With 10.5 with ALL 4 heavy and 16 light user machines scanning,
   CPU utilization is 41%. Very Impressive.
 • With powerful machines typically used in VDI environment CPU’s
   typically are not the breaking point.
 • With 20 desktop images, 10.5 adds marginal load to CPU where as
   other solutions can not even get to support baseline number of
   desktop images
 • With 10 desktop images, 10.5 adds only 11% CPU overhead
   compared to baseline (no AV and no scanning) versus Symantec
   which adds 29% CPU overhead , 10.1 which adds 50% CPU
   overhead and McAfee which is the worst which adds 83% CPU
   overhead
                          Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 11




                                                                                          11
IOPS (vDisk Utilization)




                  Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 12




                                                                                  12
IOPS - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has
   10.95 IOPS, Symantec has 9.02 IOPS and McAfee has
   whopping 22.39 IOPS
 • Trend Micro Office Scan 10.5 IOPS has small deviation of
   0.77 MB/s and 3.66 MB/s only from baseline and mixed
   20 user profile
 • Lets recap why 10.5 is so much better with IOPS
    • 10.5 Serializes updates and scans per VDI-host
    • Pre-scans and white-lists VDI base-images
    • Prevents duplicate scanning of unchanged files on a VDI host
                        Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 13




                                                                                        13
IOPS – How many Systems?

                                                                         • A VDI environment sized for 20
                                                                           desktop images with 4 heavy
                                                                           and 16 light users.
                                                                         • Keep IOPS between 6-8 and
                                                                           see how many desktop images
                                                                           can be supported with each AV
                                                                           deployment (Apples to Apples
                                                                           comparison)
                                                                         • All about return of investment

• If you deploy McAfee, you can deploy ONLY 2 desktop images in an
  environment which supports 20 images without AV
• If you deploy Symantec, you can deploy ONLY 4 desktop images in an
  environment which supports 20 images without AV
• If you deploy Trend 10.5, you can deploy ALL 20 desktop images
      Customers no longer have to choose
      between Security and Return On Investment
                              Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 14




                                                                                                            14
Memory




         Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 15




                                                                         15
Memory - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • Automatic Pool of 20 desktop images without AV in
   Mixed user Profile is consuming around 7.74 GB of
   Active Memory
 • Trend Micro Office scan 10.5 is putting an overhead of
   only 1.32 GB in maximum VDI Density environment.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 16




                                                                                      16
Scan Time with 10.5




   VDI Profile                  Other AV Solution                                        Trend Micro 10.5

   Mixed Maximum High Density   Approx 1-2 Hours                                         16 Minutes
   VDI Pool(4H &16 L)



   Mixed Low Density VDI Pool   Approx. 27- 49 minutes                                   2 Minutes
   (1H & 3 L)
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 17




                                                                                                            17
Scan Time - Analysis
 • Trend Micro Office scan 10.5 is performing Approx. 15 -
   25 times better in Mixed Low Density VDI pool and 4 -8
   times better in Mixed Maximum High Density VDI pool.

 • Trend Micro office scan 10.5 with its Smart Scan and VDI
   aware capability is consuming remarkably less scan time
   than other AV solutions.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 18




                                                                                      18
VDI Security option #2:
Deep Security

            Trend Micro Deep Security
            Protects virtualized endpoints & servers
            • First agent-less anti-malware solution
            • Hypervisor-based introspection
            • Eliminates “AV storms”




                         10/4/2010   Copyright 2009 Trend Micro Inc. 19




                                                                          19
Security Built for VMware

Desktop      Server                          Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 20




                                                                                           20
Key Issue:
Resource Contention



 9:00am Scan
  Typical AV
   Console




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 21




                                                                                21
Key Issue:
Instant On Gaps



                                        Active, with
          Active                    Dormant security
                                    out-of-date




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 22




                                                                                   22
Key Issue:
Mixed Trust Level VMs




          ERP   Email               Web                    Test                    CRM




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 23




                                                                                         23
Trend Micro Deep Security



 IDS / IPS                               Integrity                                       Log
                    Anti-Virus                                                                       Firewall
                                        Monitoring                                    Inspection




    Physical               Virtual                                             Cloud               Desktop/Laptop




Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0.
Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1


                                     10/4/2010   Copyright 2009 Trend Micro Inc. 24




                                                                                                                    24
Co-ordinated Approach
                              • Optimized protection
                              • Operational efficiency



Security virtual   Security
                                                                                       Agent-based
appliance            VM                                                                Security
  Efficiency                                                                            Protection
  Manageability                                                                         Mobility




                                      10/4/2010   Copyright 2009 Trend Micro Inc. 25




                                                                                                     25
Security Built for VMware

Desktop      Server                         Cloud                      Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 26




                                                                                           26
Issue #1:
Multi-tenancy




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 27




                                                                                27
Issue #2:
Data Access & Governance



                       10010011
                       01101100




                  10/4/2010   Copyright 2009 Trend Micro Inc. 28




                                                                   28
Issue #3:
Secure Storage Recycling


                               10011                                 10011
                               01110                                 01110
                               00101                                 00101




                   10/4/2010    Copyright 2009 Trend Micro Inc. 29




                                                                             29
Trend Micro Cloud Security
Solutions
Deep Security                 SecureCloud
• Anti-Virus                  • Encryption
• IDS/IPS                     • Policy-based key management
                              Private & Public
    • + Virtual Patching
    • + Web App Protection
                              Cloud Computing
                                       Flexibility & Confidence

• File Integrity Monitoring
• Log Inspection
• Firewall




                              10/4/2010   Copyright 2009 Trend Micro Inc. 30




                                                                               30
Security Built for VMware

Desktop       Server                            Cloud                   Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc. 31




                                                                                            31
Virtual Appliances
                                                                                 Virtual Appliance

       Application


       Operating
        System



       Hypervisor                                                                  Hypervisor



                     Hardware                                                                 Hardware




                                10/4/2010   Copyright 2009 Trend Micro Inc. 32




                                                                                                         32
Virtual Appliance Benefits

 Virtual Appliance
                        Costs
                                                                                70%
                        IT Flexibility
                                                                                 Per-User
                        Improve Business                                       Cost of Virtual
                        Continuity                                              Appliance




A solution that scale over time. Don’t need to buy a bigger physical
appliance. Just add more resources. Don’t need to buy an extra box
for pre-production environment, just fire a new VM or install on any
box that can run CentOS or Red Hat.

                              10/4/2010   Copyright 2009 Trend Micro Inc. 33




                                                                                                 33
Trend Micro
Security Virtual Appliances
  Virtual Appliance


                          Web Security
                          Email Security




Other Trend Micro Product are offered as a virtual appliance :
-Data Loss Prevention Server
-Threat Discovery Virtual Appliance (part of Threat Management Services (TMS)




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 34




                                                                                  34
Security Built for VMware
Deep Security    Deep Security                  Deep Security                     InterScan Web Security
     OR                                            AND                             InterScan Messaging
 OfficeScan                                     SecureCloud                              Security


  Desktop           Server                                Cloud                       Virtual Appliance*




                                             Encryption of the                      *VMware Certified
                                             virtual file system                       Appliances




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 35




                                                                                                           35
Security Built for VMware




          10/4/2010   Copyright 2009 Trend Micro Inc. 36




                                                           36
Trend Micro
Global leader in Internet content security and threat management.
Catalyst for faster adoption of virtualization.
Our Vision:
A world safe for exchanging digital information

Founded        • United States in 1988

Headquarters • Tokyo, Japan
Offices        • 23 countries
Employees      • 4,350
Leadership     • US $1 Billion annual revenue
               • 3rd largest security company                                              1,000+ Threat Research Experts
                                                                                                  10 labs. 24x7 ops
               • “Global 100 Most Sustainable Corporations”                                Real-time alerts for new threats
               • Top 3 in Messaging, Web and Endpoint security
               • Leader in virtualization & cloud computing
               security




                                                    Copyright 2009 Trend Micro Inc.
                                                                                      37




                                                                                                                              37
Questions?




                           Thank you, merci
New Threats Informations                                                                           For more informations:
http://blog.trendmicro.com/                                                                        Technical:
                                                                                                   david_girard@trendmicro.com
                                                                                                   514-629-1680

         User group                                                                                Sales:
Groupe d’utilisateurs                                                                              Michel_bouasria@trendmicro.com
Trend Micro du Québec                                                                              514-653-2257
http://www.linkedin.com/groups?gid=2296257                                                         Jean_houle@trendmicro.com
                                                                                                   514 893-1512
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 38




                                                                                                                                    38

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
xKinAnx
 

Was ist angesagt? (20)

InduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things ApplicationsInduSoft Web Studio and MQTT for Internet of Things Applications
InduSoft Web Studio and MQTT for Internet of Things Applications
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Secure Coding for Java
Secure Coding for JavaSecure Coding for Java
Secure Coding for Java
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Armitage – The Ultimate Attack Platform for Metasploit
Armitage – The  Ultimate Attack  Platform for Metasploit Armitage – The  Ultimate Attack  Platform for Metasploit
Armitage – The Ultimate Attack Platform for Metasploit
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
WAFs.pptx
WAFs.pptxWAFs.pptx
WAFs.pptx
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Virtualization Technology Overview
Virtualization Technology OverviewVirtualization Technology Overview
Virtualization Technology Overview
 
Microsoft Hyper-V explained
Microsoft Hyper-V explainedMicrosoft Hyper-V explained
Microsoft Hyper-V explained
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
 

Andere mochten auch

Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
guest83fa4c
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
Degrowth Conference
 
China fei
China feiChina fei
China fei
incomas
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
candipartridge
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
HablaGuate
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
Susan Daniels
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
soccrgrl62
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
Wendy Neave
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
guestbb440f9
 

Andere mochten auch (20)

Trend Micro Case Study
Trend Micro Case StudyTrend Micro Case Study
Trend Micro Case Study
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
 
Canadian Centre for Court Technology Presentation
Canadian Centre for Court Technology PresentationCanadian Centre for Court Technology Presentation
Canadian Centre for Court Technology Presentation
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA Iowa
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
 
16 abril
16 abril16 abril
16 abril
 
Festividades do meu país (Portugal)
Festividades do meu país  (Portugal)Festividades do meu país  (Portugal)
Festividades do meu país (Portugal)
 
China fei
China feiChina fei
China fei
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
 
...
......
...
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
 
How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?
 

Ähnlich wie TrendMicro

Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
Manas TI SA
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
selghaly
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
Digicomp Academy AG
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft Singapore
 

Ähnlich wie TrendMicro (20)

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteit
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminar
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
V mware view
V mware viewV mware view
V mware view
 

Mehr von 1CloudRoad.com

VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
1CloudRoad.com
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
1CloudRoad.com
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
1CloudRoad.com
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
1CloudRoad.com
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
1CloudRoad.com
 

Mehr von 1CloudRoad.com (19)

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
 
Virtensys
VirtensysVirtensys
Virtensys
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

TrendMicro

  • 1. Magic Words of VDI Security: “Agentless” and “Aware” David Girard, Senior Security Advisor – Trend Micro Canada 1 1
  • 2. Virtualization Project ? Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 2 2
  • 3. Security Built for VMware The most comprehensive suite of next-generation virtualization security solutions Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 3 3
  • 4. Security Built for VMware IT Operations Security Compliance Consolidation rates Protect data Ensure Operational efficiencies & applications compliance Flexibility Savings 10/4/2010 Copyright 2009 Trend Micro Inc. 4 4
  • 5. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 5 5
  • 6. Key Issue: Resource Contention High impact : Employee’s arrival or schedule scans 9:00am Scan Typical AV Console If several, or all, VMs start a full anti-malware scan at the same time, the underlying shared hardware will experience extreme load (memory, CPU, I/O), causing a slowdown of all virtual systems on the server. Large pattern file updates require significant memory and can impact, network and storage I/O resources. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 6 6
  • 7. VDI Security option #1: OfficeScan (First AV optimized for VDI) Trend Micro OfficeScan Protects virtual & physical endpoints • VDI Intelligence with VDI plug-in • Serializes updates and scans per VDI-host • Leverages base-images to further shorten scan times • Smart Scan limit Endpoints pattern updates since it is mostly in the cloud 10/4/2010 Copyright 2009 Trend Micro Inc. 7 7
  • 8. OfficeScan 10.5 has VDI-Intelligence • Detects whether endpoints are physical or virtual – With VMware View • Serializes updates and scans per VDI-host – Controls the number of concurrent scans and updates per VDI host – Maintains availability and performance of the VDI host – Faster than concurrent approach • Leverages Base-Images to further shorten scan times – Pre-scans and white-lists VDI base-images – Prevents duplicate scanning of unchanged files on a VDI host – Further reduces impact on the VDI host Copyright 2009 Trend Micro Inc. 8
  • 9. OfficeScan 10.5 Integrates with vCenter 10/4/2010 Copyright 2009 Trend Micro Inc. 9 9
  • 10. CPU Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 10 10
  • 11. CPU - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With no AV, average CPU utilization while 4 heavy and 16 light user script is running is 33% • With 10.5 with ALL 4 heavy and 16 light user machines scanning, CPU utilization is 41%. Very Impressive. • With powerful machines typically used in VDI environment CPU’s typically are not the breaking point. • With 20 desktop images, 10.5 adds marginal load to CPU where as other solutions can not even get to support baseline number of desktop images • With 10 desktop images, 10.5 adds only 11% CPU overhead compared to baseline (no AV and no scanning) versus Symantec which adds 29% CPU overhead , 10.1 which adds 50% CPU overhead and McAfee which is the worst which adds 83% CPU overhead Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 11 11
  • 12. IOPS (vDisk Utilization) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 12 12
  • 13. IOPS - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has 10.95 IOPS, Symantec has 9.02 IOPS and McAfee has whopping 22.39 IOPS • Trend Micro Office Scan 10.5 IOPS has small deviation of 0.77 MB/s and 3.66 MB/s only from baseline and mixed 20 user profile • Lets recap why 10.5 is so much better with IOPS • 10.5 Serializes updates and scans per VDI-host • Pre-scans and white-lists VDI base-images • Prevents duplicate scanning of unchanged files on a VDI host Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 13 13
  • 14. IOPS – How many Systems? • A VDI environment sized for 20 desktop images with 4 heavy and 16 light users. • Keep IOPS between 6-8 and see how many desktop images can be supported with each AV deployment (Apples to Apples comparison) • All about return of investment • If you deploy McAfee, you can deploy ONLY 2 desktop images in an environment which supports 20 images without AV • If you deploy Symantec, you can deploy ONLY 4 desktop images in an environment which supports 20 images without AV • If you deploy Trend 10.5, you can deploy ALL 20 desktop images Customers no longer have to choose between Security and Return On Investment Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 14 14
  • 15. Memory Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 15 15
  • 16. Memory - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • Automatic Pool of 20 desktop images without AV in Mixed user Profile is consuming around 7.74 GB of Active Memory • Trend Micro Office scan 10.5 is putting an overhead of only 1.32 GB in maximum VDI Density environment. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 16 16
  • 17. Scan Time with 10.5 VDI Profile Other AV Solution Trend Micro 10.5 Mixed Maximum High Density Approx 1-2 Hours 16 Minutes VDI Pool(4H &16 L) Mixed Low Density VDI Pool Approx. 27- 49 minutes 2 Minutes (1H & 3 L) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 17 17
  • 18. Scan Time - Analysis • Trend Micro Office scan 10.5 is performing Approx. 15 - 25 times better in Mixed Low Density VDI pool and 4 -8 times better in Mixed Maximum High Density VDI pool. • Trend Micro office scan 10.5 with its Smart Scan and VDI aware capability is consuming remarkably less scan time than other AV solutions. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 18 18
  • 19. VDI Security option #2: Deep Security Trend Micro Deep Security Protects virtualized endpoints & servers • First agent-less anti-malware solution • Hypervisor-based introspection • Eliminates “AV storms” 10/4/2010 Copyright 2009 Trend Micro Inc. 19 19
  • 20. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 20 20
  • 21. Key Issue: Resource Contention 9:00am Scan Typical AV Console Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 21 21
  • 22. Key Issue: Instant On Gaps Active, with Active Dormant security out-of-date Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 22 22
  • 23. Key Issue: Mixed Trust Level VMs ERP Email Web Test CRM Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 23 23
  • 24. Trend Micro Deep Security IDS / IPS Integrity Log Anti-Virus Firewall Monitoring Inspection Physical Virtual Cloud Desktop/Laptop Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0. Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1 10/4/2010 Copyright 2009 Trend Micro Inc. 24 24
  • 25. Co-ordinated Approach • Optimized protection • Operational efficiency Security virtual Security Agent-based appliance VM Security Efficiency Protection Manageability Mobility 10/4/2010 Copyright 2009 Trend Micro Inc. 25 25
  • 26. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 26 26
  • 27. Issue #1: Multi-tenancy Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 27 27
  • 28. Issue #2: Data Access & Governance 10010011 01101100 10/4/2010 Copyright 2009 Trend Micro Inc. 28 28
  • 29. Issue #3: Secure Storage Recycling 10011 10011 01110 01110 00101 00101 10/4/2010 Copyright 2009 Trend Micro Inc. 29 29
  • 30. Trend Micro Cloud Security Solutions Deep Security SecureCloud • Anti-Virus • Encryption • IDS/IPS • Policy-based key management Private & Public • + Virtual Patching • + Web App Protection Cloud Computing Flexibility & Confidence • File Integrity Monitoring • Log Inspection • Firewall 10/4/2010 Copyright 2009 Trend Micro Inc. 30 30
  • 31. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 31 31
  • 32. Virtual Appliances Virtual Appliance Application Operating System Hypervisor Hypervisor Hardware Hardware 10/4/2010 Copyright 2009 Trend Micro Inc. 32 32
  • 33. Virtual Appliance Benefits Virtual Appliance Costs 70% IT Flexibility Per-User Improve Business Cost of Virtual Continuity Appliance A solution that scale over time. Don’t need to buy a bigger physical appliance. Just add more resources. Don’t need to buy an extra box for pre-production environment, just fire a new VM or install on any box that can run CentOS or Red Hat. 10/4/2010 Copyright 2009 Trend Micro Inc. 33 33
  • 34. Trend Micro Security Virtual Appliances Virtual Appliance Web Security Email Security Other Trend Micro Product are offered as a virtual appliance : -Data Loss Prevention Server -Threat Discovery Virtual Appliance (part of Threat Management Services (TMS) 10/4/2010 Copyright 2009 Trend Micro Inc. 34 34
  • 35. Security Built for VMware Deep Security Deep Security Deep Security InterScan Web Security OR AND InterScan Messaging OfficeScan SecureCloud Security Desktop Server Cloud Virtual Appliance* Encryption of the *VMware Certified virtual file system Appliances 10/4/2010 Copyright 2009 Trend Micro Inc. 35 35
  • 36. Security Built for VMware 10/4/2010 Copyright 2009 Trend Micro Inc. 36 36
  • 37. Trend Micro Global leader in Internet content security and threat management. Catalyst for faster adoption of virtualization. Our Vision: A world safe for exchanging digital information Founded • United States in 1988 Headquarters • Tokyo, Japan Offices • 23 countries Employees • 4,350 Leadership • US $1 Billion annual revenue • 3rd largest security company 1,000+ Threat Research Experts 10 labs. 24x7 ops • “Global 100 Most Sustainable Corporations” Real-time alerts for new threats • Top 3 in Messaging, Web and Endpoint security • Leader in virtualization & cloud computing security Copyright 2009 Trend Micro Inc. 37 37
  • 38. Questions? Thank you, merci New Threats Informations For more informations: http://blog.trendmicro.com/ Technical: david_girard@trendmicro.com 514-629-1680 User group Sales: Groupe d’utilisateurs Michel_bouasria@trendmicro.com Trend Micro du Québec 514-653-2257 http://www.linkedin.com/groups?gid=2296257 Jean_houle@trendmicro.com 514 893-1512 Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 38 38