SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Me!


Tuesday, November 27, 12
Tuesday, November 27, 12
My
                                  Friends


                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                  Friends
                                                   My	
  Stuff!

                                  My Apps
                           My                My
                           Life     My      Work
                                   Stuff




Tuesday, November 27, 12
My
                                    Friends
                                                     My	
  Stuff!

                                    My Apps
                           Threat
                             My
                             Life     My
                                               My
                                              Work
                                     Stuff




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust




   Bromium Confidential

Tuesday, November 27, 12
v We have to enter domains of unfathomable trust
   v Our systems cannot protect us from unknown threats




   Bromium Confidential

Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
Tuesday, November 27, 12
Tuesday, November 27, 12
Protect the system
                           core by isolating it
                               completely




Tuesday, November 27, 12
Decouple execution        Protect the system
  dependencies into mutually   core by isolating it
       distrustful tasks           completely




Tuesday, November 27, 12
Decouple execution         Protect the system
  dependencies into mutually    core by isolating it
       distrustful tasks            completely



    Control communication
   between all tasks and with
       the outside world




Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access
   to data & resources, based
       on “least privilege”

Tuesday, November 27, 12
Decouple execution          Protect the system
  dependencies into mutually     core by isolating it
       distrustful tasks             completely



    Control communication
   between all tasks and with
       the outside world



   Restrict each task’s access        Never trust
   to data & resources, based    information from an
       on “least privilege”       untrustworthy task

Tuesday, November 27, 12
Tuesday, November 27, 12
p        C
                                      ktoation   Pa onf
                                    s              tc ig
                                De aliz              hi &
                                   tu                  ng
                               Vir




                           D ev                            t
                            at en                        in y
                            Pr

                              a t                      Po rit
                               Lo io
                                 ss n               nd cu
                                                   E e
                                                     S




Tuesday, November 27, 12
10

Tuesday, November 27, 12
Tiny code base for
                               Bromium
       maximum security        Microvisor   I/O MMU (VT-d)

                                            TXT & TPM based
                                            hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                    10

Tuesday, November 27, 12
Bromium Micro-virtualization

       Isolate vulnerable                             Lightweight, fast,
    tasks within a single                             hidden, with an
       Windows desktop                                unchanged native UX

       Tiny code base for
                                    Bromium
       maximum security             Microvisor        I/O MMU (VT-d)

                                                      TXT & TPM based
                                                      hardware root of trust
                  Hardware
              Virtualization
                      (VT-x)




                                          10

Tuesday, November 27, 12
Tuesday, November 27, 12
Windows	
  and	
  IT	
  
       provisioned	
  apps	
  
          are	
  trusted



                                  Apps OS	
  Libs Kernel




Tuesday, November 27, 12
The	
  Microvisor	
  isolates	
  
                                vulnerable	
  tasks	
  from	
  
                               Windows,	
  each	
  other	
  &	
  
                                key	
  system	
  resources

                                                       Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor
                                                                             Each	
  vulnerable	
  task	
  is	
  
                                                                              instantly	
  isolated	
  in	
  a	
  
                                                                             micro-­‐VM,	
  invisible	
  to	
  




                                                          Hypercall	
  API
                           Apps OS	
  Libs Kernel                                      the	
  user




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Micro-­‐VMs	
  have	
  
     “least	
  privilege”	
                                 Microvisor
      access	
  to	
  files,	
  
   networks	
  &	
  devices,	
  
    and	
  execute	
  CoW




                                                                  Hypercall	
  API
                                   Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Microvisor




                           Apps OS	
  Libs Kernel




Tuesday, November 27, 12
Tuesday, November 27, 12

Weitere ähnliche Inhalte

Andere mochten auch

Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4producmultimedia3
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en públicoEmagister
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Andris Soroka
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна ГраусоваSergey Korobov
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXLuis Rodríguez
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 

Andere mochten auch (12)

nandini.resume
nandini.resumenandini.resume
nandini.resume
 
Gr9Presentation
Gr9PresentationGr9Presentation
Gr9Presentation
 
Comunicación educativa de calidad 4
Comunicación educativa de calidad 4Comunicación educativa de calidad 4
Comunicación educativa de calidad 4
 
Claves para hablar en público
Claves para hablar en públicoClaves para hablar en público
Claves para hablar en público
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
Digitālā Ēra 2016 - Uldis Salenieks BM Trada - ISO 27001 starptautiskais stan...
 
Английский для жизни Яна Граусова
Английский для жизни Яна ГраусоваАнглийский для жизни Яна Граусова
Английский для жизни Яна Граусова
 
Campaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOXCampaña #ExpedienteX de FOX
Campaña #ExpedienteX de FOX
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
CV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_RoyCV_Tapta_Kanchan_Roy
CV_Tapta_Kanchan_Roy
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 

Mehr von Gigaom

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanGigaom
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceGigaom
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsGigaom
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionGigaom
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryGigaom
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Gigaom
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Gigaom
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovGigaom
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Gigaom
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Gigaom
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherGigaom
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadGigaom
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Gigaom
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathGigaom
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellGigaom
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteGigaom
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013Gigaom
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013Gigaom
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013Gigaom
 

Mehr von Gigaom (20)

Structure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe WeinmanStructure 2014 - The strategic value of the cloud - Joe Weinman
Structure 2014 - The strategic value of the cloud - Joe Weinman
 
Structure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - RackspaceStructure 2014 - The right and wrong way to scale - Rackspace
Structure 2014 - The right and wrong way to scale - Rackspace
 
Structure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey resultsStructure 2014 - The future of cloud computing survey results
Structure 2014 - The future of cloud computing survey results
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad Competition
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshop
 
Structure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - BatteryStructure 2014 - Cloud trends - Battery
Structure 2014 - Cloud trends - Battery
 
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
Structure Data 2014: HOW MICRODATA CAN SAY A LOT ABOUT MACROECONOMICS, David ...
 
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
Structure Data 2014: QLIK SPONSOR WORKSHOP: ANALYTICS THE WAY NATURE INTENDED...
 
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit BendovStructure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
Structure Data 2014: FIVE MYTHS ABOUT BIG DATA, Amit Bendov
 
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
Structure Data 2014: AMID BILLIONS OF METRICS, YOUR SOFTWARE IS TRYING TO TEL...
 
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA, Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
Structure Data 2014: SISENSE SPONSOR WORKSHOP: ON BEER, CHIPS AND DATA,
 
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari GesherStructure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
Structure Data 2014: INVERTING 80/20: BEYOND BESPOKE BIG DATA, Ari Gesher
 
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris HaddadStructure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
Structure Data 2014: TRACKING A SOCCER GAME WITH BIG DATA, Chris Haddad
 
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
Structure Data 2014: TECH AGAINST HUMAN TRAFFICKING AND ILLICIT NETWORKS, Jus...
 
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrathStructure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
Structure Data 2014: DATA DRIVEN DESIGN AT FORMULA ONE SPEED, Geoff McGrath
 
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve RussellStructure Data 2014: IS VIDEO BIG DATA?, Steve Russell
Structure Data 2014: IS VIDEO BIG DATA?, Steve Russell
 
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan WaiteStructure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
Structure Data 2014: BIG DATA ANALYTICS RE-INVENTED, Ryan Waite
 
How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013How Data is Remaking E-commerce - from Roadmap 2013
How Data is Remaking E-commerce - from Roadmap 2013
 
25 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 201325 Favorite Experiences in Tech - from Roadmap 2013
25 Favorite Experiences in Tech - from Roadmap 2013
 
How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013How Moore’s Law is Influencing Design - from Roadmap 2013
How Moore’s Law is Influencing Design - from Roadmap 2013
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

SECURE EVERYTHING from Structure 2012

  • 5. My Friends My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 6. My Friends My  Stuff! My Apps My My Life My Work Stuff Tuesday, November 27, 12
  • 7. My Friends My  Stuff! My Apps Threat My Life My My Work Stuff Tuesday, November 27, 12
  • 11. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 12. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 14. v We have to enter domains of unfathomable trust Bromium Confidential Tuesday, November 27, 12
  • 15. v We have to enter domains of unfathomable trust v Our systems cannot protect us from unknown threats Bromium Confidential Tuesday, November 27, 12
  • 16. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 17. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 20. Protect the system core by isolating it completely Tuesday, November 27, 12
  • 21. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Tuesday, November 27, 12
  • 22. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Tuesday, November 27, 12
  • 23. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access to data & resources, based on “least privilege” Tuesday, November 27, 12
  • 24. Decouple execution Protect the system dependencies into mutually core by isolating it distrustful tasks completely Control communication between all tasks and with the outside world Restrict each task’s access Never trust to data & resources, based information from an on “least privilege” untrustworthy task Tuesday, November 27, 12
  • 26. p C ktoation Pa onf s tc ig De aliz hi & tu ng Vir D ev t at en in y Pr a t Po rit Lo io ss n nd cu E e S Tuesday, November 27, 12
  • 28. Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 29. Bromium Micro-virtualization Isolate vulnerable Lightweight, fast, tasks within a single hidden, with an Windows desktop unchanged native UX Tiny code base for Bromium maximum security Microvisor I/O MMU (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x) 10 Tuesday, November 27, 12
  • 31. Windows  and  IT   provisioned  apps   are  trusted Apps OS  Libs Kernel Tuesday, November 27, 12
  • 32. The  Microvisor  isolates   vulnerable  tasks  from   Windows,  each  other  &   key  system  resources Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12
  • 33. Microvisor Each  vulnerable  task  is   instantly  isolated  in  a   micro-­‐VM,  invisible  to   Hypercall  API Apps OS  Libs Kernel the  user Tuesday, November 27, 12
  • 34. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 35. Micro-­‐VMs  have   “least  privilege”   Microvisor access  to  files,   networks  &  devices,   and  execute  CoW Hypercall  API Apps OS  Libs Kernel Tuesday, November 27, 12
  • 36. Microvisor Apps OS  Libs Kernel Tuesday, November 27, 12