SlideShare a Scribd company logo
1 of 29
Download to read offline
McAfee MOVE / Endpoint Security
    Marco Schultes




02.06.2011
Marco Schultes - netlogix Hausmesse LIVE/11   1
Was IST eigentlich McAfee MOVE?


    Management for
          Optimized Virtual
      Environments

                                  2
2
Aber warum optimiert?

Heutige (AntiVirus)-
Applikationen sind
nicht für virtuelle
Umgebungen
programmiert, nicht
„hypervisor aware“
und deshalb sehr
verschwenderisch
im Umgang mit
Ressourcen.


                        3
MOVE - die neue Plattform zur
Absicherung virtueller Umgebungen
„MOVE is a new strategic Platform and NOT a single Product“
                       HIPS
                      Plug-in              AV for
                                           Server
                                           Plug-in

            File
        Encryption                                   AV for
          Plug-in                McAfee
                                 MOVE                 VDI‘s
                                Platform             Plug-in


             Site
                                                 SIA
            Adivsor
                                               Partner
            Plug-in
                                Device         Plug-in
                                Control
                                Plug-in
                                                               4
AntiVirus Optimierung
Die Probleme des Administrators




                                  5
Problem #1 - Virtuelle Server
“Klassisches AV frisst CPU-Leistung”
                             Individuelle                        Konsolidierte
                                Server                              Server




CPU & I/O Utilization



   On-Access Scans          3-5% CPU-Last auf           30% mit 10 virtuellen Maschinen
                          individuellen Maschinen

   On-Demand Scans      50-70% Last auf individuellen         Drei gleichzeitige Scans
                                Maschinen                   können den Host in die Knie
                                                                      zwingen




                                                                                          6
Problem #2 - Virtuelle Server
“READ-ONLY Images”
                                Virtual     Virtual    Offline
                                Machine     Machine    Virtual
                                                       Image


• READ-ONLY & Offline            Apps        Apps      Apps

  Images können nicht
  gepatched werden                OS          OS        OS

  und keine DAT-
                                          Hypervisor
  Updates erhalten


                                                                 7
Problem #3 - Virtuelle Desktops
    “AV-Storming”

Organisatorische
  Probleme
•   Kapazitätsplanung
•   Zeitplanung
•   VM-Dichte auf dem
    Hypervisor
•   Verschiedene
    Management-Oberflächen




                                      8
McAfee MOVE-AV für Server und VDI
              VM                 VM                MOVE
                                                   Virtual Appliance
                  Applications    Applications
                     MOVE                              Off-load
                                      MOVE
                                                      Processing
                      OS               OS

                                      Hypervisor                ePO

                                                                            McAfee ePO

                                                        MOVE AV for VDI’s
   Client                               • On-Access Scanning (OAS)
                                        • On-Demand Scanning (ODS) (angekündigt)
Virtual Desktop
                                        • Updates nur auf MOVE Virtual Appliance nötig
          Client
                                                     MOVE AV for Virtual Servers
                                        • Scan basierend auf Hypervisor-Auslastung
       Virtual Desktop
                                        • On-Demand Scanning (ODS)
                                        • Offline Scanning (OVI)
                                        • On-Access Scanning (OAS) (angekündigt)
                                                                                         9
Features

Effizientes Security-Management
 – Volle ePO-Integration
 – Hypervisor-unabhängig (Vmware
     ESX / Citrix XenServer / MS HyperV
     (angekündigt)
 – Offline Virenscan
 – Hypervisor-lastabhängig
 – Security Dashboards/Reports per
     Hypervisor




                                          10
McAfee MOVE
Ein technischer Überblick




                            11
Optimiertes File Scanning
1.   Lokaler Scan Cache
2.   Globaler Scan Cache
3.   File scannen
4.   Artemis Anbindung

                      3
                      2

               1                                              4
                           abc   abc
                                                            Scan
                                                     abc
                                                     ac
                           def
                           gi
                                 def
                                 gi
                                                     def
                                                     def
                                                     g ii
                                                     g      Engine


                                       Hypervisor


                                                    Artemis
                                                                     12
Advanced File Caching
•   Reduziert den Scan Overhead
     – Durch effizienten Einsatz von Caches
     – Lokaler Scan Cache auf der VM
     – Globaler Scan Cache auf der Scan Engine



    ePO Server

                                                                                  Scan
                                   abc                  abc                abc
                                   def
                                   gi
                                                        def
                                                        gi
                                                                           abc
                                                                           def
                                                                           def
                                                                           g ii
                                                                           g
                                                                                  Engine



                                                              Hypervisor
      MOVE
                                         Cache Synchronization Protocol
      Server




                                                                                           13
Traditionelles AV vs. MOVE AV




                                14
McAfee Plattform-Test auf Citrix XenServer

                                 A/V within the guest                  Offloading A/V with MOVE

Memory Consumption                          60-120MB+                                   ~20MB
(per VM)

Peak CPU Usage (per                          80-100%                                     <10%
hypervisor)
VM Density                                       X                                        3X
Scanning Resource                               YES                                   NO
Utilization                                                             (Offloaded to Virtual Appliance)

DAT Update Resource                             YES                                   NO
Utilization                                                             (Offloaded to Virtual Appliance)

 The product plans, specifications and descriptions herein are provided for information only, subject to change
 without notice, results may vary and without warranty of any kind, express or implied
                                                                                                                  15
MOVE Agent in Action




                       16
MOVE Konfiguration




      Bis zu 2 Scan-Server können angegeben werden
            (virtuelle oder physikalische Server)

                                                     17
Security Dashboards / Reports




                                18
Hypervisor-aware Scheduler




                             19
Verhindert „AV Storming“




     Scan wird verhindert, da die Hypervisor-Auslastung zu hoch ist

                                                                      20
Zusammenfassung

     •   Erhöhen der virtuellen Server Security mit
         minimalen Performance-Auswirkungen

     •   Aktivieren von VDI Security bei gleichzeitig
         hoher VM Dichte pro Hypervisor

     •   (Zeit-)Einsparungen durch vereinfachtes
         zentrales Management über ePO

     •   Unabhängig vom Hypervisor
          – ESX / XenServer / Hyper-V




                                                        21
McAfee Data Protection




                         22
McAfee Data Protection

McAfee Data Loss Prevention                              McAfee Device Control
Full control and absolute                                Prevent unauthorized use
visibility over user behavior                            of removable media
                                 Data Loss   Device      devices
                                Prevention   Control

McAfee Total                                                     Integrated
Protection™                                                      technologies for
for Data                                                         total data
                                                                 protection
                                 Endpoint    Encrypted
                                Encryption   USB
McAfee Endpoint Encryption                               McAfee Encrypted USB
Full disk, mobile device, and                            Secure, portable external
file and folder encryption                               storage devices
coupled with strong
authentication
                                                                                     23
Data Breaches Don’t Discriminate

    “DuPont scientist downloaded                    “Royal London Mutual Insurance
     22,000 sensitive documents as he               Society loses eight laptops and the
     got ready to take a job with a                 personal details of 2,135 people”
     competitor…”

                                                        SC Magazine


“The FSA has fined              “Personal data of                   “ChoicePoint to pay
Nationwide £980,000             600,000 on lost                      $15 million over data
for a stolen laptop”            laptop”                              breach—Data broker sold
                                                                     info on 163,000 people”



                                                                                               24
Challenge
How best to protect confidential corporate data on mobile devices from loss, theft, or exposure
                                   to unauthorized parties?

    –     Laptops lost or stolen in airports, taxis and hotels cost companies an average of
          $49,2461

    –     36% of data breaches were due to lost or stolen laptop computers
            • Average cost is $6.75 million per breach2

    –     Best practices: “Ensure that portable data-bearing devices…are encrypted”2

    –     “Protected health information (PHI) is rendered unusable, unreadable, or
          indecipherable to unauthorized individuals if encrypted or destroyed”3

    –     Staying out of the news


    1   Ponemon
    2 Ponemon, 2009   Cost of a Data Breach
    3 HIPAA DHHS Guidance 2009                                                                    25
McAfee Endpoint Encryption
                            You need
                            •   Encryption for laptops, desktops, and mobile
                                devices with the flexibility to choose full disk or
                                file and folder encryption
   Data Loss     Device     •   Confidence in integrity of sensitive data when a
  Prevention     Control        device is lost or stolen
                            •   Safe Harbor protection
                            McAfee offers
                            •  Broad support for laptops, desktops, and mobile
                               devices
    Endpoint    Encrypted
   Encryption   USB         •   Full audit trails for compliance & auditing needs
                            •   Support for multiple strong authentication
                                methods
                            •   Certifications: FIPS 140-2, Common Criteria Level
                                4 (highest level for software products), BITS,
                                CSIA, etc.


                                                                                  26
Solution: Full Disk Encryption

Why encrypt?
   – Every disk drive in an organization eventually leaves said organization
      • Natural retirement/replacement
      • Loss
      • Theft
   – Knowing what sensitive information is on a given drive is difficult
      • Avoids having to classify data to decide what to protect
   – Applications use a myriad of “hidden” temp files that contain your data


Data protection made easy
   – Simple to deploy
   – Nearly transparent user experience



                                                                               27
Solution: Full Disk Encryption

Full Disk Encryption
• No data access without proper authentication
• Complete, proven protection against loss and theft
• Extensible complement to other data protection technologies
  like file encryption, encrypted USB drives, and DLP


How does it work?
• Disk drive is fully encrypted, sector A through sector Z
• As new information is created, it is encrypted
  on-the-fly
• A unique, per-device recovery token is used to
  handle normal “lost password” situations



                                                                28
Security Details Matter
CC EAL 4 and FIPS 140-2 Level 2 validation
     – Proves the security level by an independent body
AES 256-bit encryption
     – Encryption on-the-fly using strong algorithms
Up to three-factor authentication
     – McAfee Endpoint Encryption offers a strong pre-
         boot authentication
     – Support for various smart cards, USB tokens
         and biometric devices
ePO compliance reporting and deployment
     – Identify non-encrypted machines
     – Deploy using McAfee ePO
Business continuity
     – McAfee Endpoint Encryption offers offline
         challenge-response recovery
     – Reduce costs using our local user self-recovery
         (questions + answers)

                                                          29

More Related Content

What's hot

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 

What's hot (20)

Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 

Similar to McAfee MOVE & Endpoint Security

Transcending Computing Environment Boundaries: Seamless Computing Environmen...
Transcending  Computing Environment Boundaries: Seamless Computing Environmen...Transcending  Computing Environment Boundaries: Seamless Computing Environmen...
Transcending Computing Environment Boundaries: Seamless Computing Environmen...
HCL Infosystems
 
SF DevOps: Introducing Vagrant
SF DevOps: Introducing VagrantSF DevOps: Introducing Vagrant
SF DevOps: Introducing Vagrant
Mitchell Hashimoto
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App Virtualization
AppZero
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
Harold Wong
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private Cloud
AppZero
 
Презентация RDS & App-V, VDI
Презентация RDS & App-V, VDIПрезентация RDS & App-V, VDI
Презентация RDS & App-V, VDI
Виталий Стародубцев
 
i//:squared Business Continuity Event
i//:squared Business Continuity Eventi//:squared Business Continuity Event
i//:squared Business Continuity Event
Jonathan Allmayer
 
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Anton Arhipov
 
VMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A TutorialVMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A Tutorial
Richard McDougall
 

Similar to McAfee MOVE & Endpoint Security (20)

Transcending Computing Environment Boundaries: Seamless Computing Environmen...
Transcending  Computing Environment Boundaries: Seamless Computing Environmen...Transcending  Computing Environment Boundaries: Seamless Computing Environmen...
Transcending Computing Environment Boundaries: Seamless Computing Environmen...
 
SF DevOps: Introducing Vagrant
SF DevOps: Introducing VagrantSF DevOps: Introducing Vagrant
SF DevOps: Introducing Vagrant
 
Decrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App VirtualizationDecrease TCO w/ Server-side App Virtualization
Decrease TCO w/ Server-side App Virtualization
 
It camp veeam presentation (no videos)
It camp veeam presentation (no videos)It camp veeam presentation (no videos)
It camp veeam presentation (no videos)
 
Symantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft EnvironmentsSymantec Delivers 30x Faster Failover For Microsoft Environments
Symantec Delivers 30x Faster Failover For Microsoft Environments
 
Build the foundation for Private Cloud
Build the foundation for Private CloudBuild the foundation for Private Cloud
Build the foundation for Private Cloud
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Cybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for science
 
Overview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBMOverview of VMware & VMware Education from IBM
Overview of VMware & VMware Education from IBM
 
Презентация RDS & App-V, VDI
Презентация RDS & App-V, VDIПрезентация RDS & App-V, VDI
Презентация RDS & App-V, VDI
 
Brief about Windows Azure Platform
Brief about Windows Azure Platform Brief about Windows Azure Platform
Brief about Windows Azure Platform
 
i//:squared Business Continuity Event
i//:squared Business Continuity Eventi//:squared Business Continuity Event
i//:squared Business Continuity Event
 
Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!Virtualization Manager 5.0 – Now with Hyper-V Support!
Virtualization Manager 5.0 – Now with Hyper-V Support!
 
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel Improve your Developer Experiece using the WAS Liberty Profile with JRebel
Improve your Developer Experiece using the WAS Liberty Profile with JRebel
 
PHP in the Cloud
PHP in the CloudPHP in the Cloud
PHP in the Cloud
 
To the cloud...
To the cloud...To the cloud...
To the cloud...
 
VMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A TutorialVMware Performance for Gurus - A Tutorial
VMware Performance for Gurus - A Tutorial
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0
 
VMware vSphere 5 seminar
VMware vSphere 5 seminarVMware vSphere 5 seminar
VMware vSphere 5 seminar
 
Veeamvpower
VeeamvpowerVeeamvpower
Veeamvpower
 

More from netlogix

FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOP
netlogix
 
Building a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache SolrBuilding a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache Solr
netlogix
 

More from netlogix (20)

TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0
 
FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOP
 
Astaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren ITAstaro Security Wall - Sechs Schritte zur sicheren IT
Astaro Security Wall - Sechs Schritte zur sicheren IT
 
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
Webspecial LIVE/11: eCommerce mit TYPO3, TYPO3 5.0 und FLOW3
 
SMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per HandySMS PASSCODE: Authentifizierung per Handy
SMS PASSCODE: Authentifizierung per Handy
 
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...EMA  - Enterprise Managed Archive: globales Informationsmanagement clever gel...
EMA - Enterprise Managed Archive: globales Informationsmanagement clever gel...
 
XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"XenDesktop 5 und das letzte "Puzzleteil"
XenDesktop 5 und das letzte "Puzzleteil"
 
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
Ein Hypervisor alleine macht nicht glücklich: Interessante Add-Ons zu VMware ...
 
Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010Next Generation Unified Communications mit Microsoft Lync 2010
Next Generation Unified Communications mit Microsoft Lync 2010
 
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Servicenetlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
netlogix Care: Cloudbasierte, proaktive Systemüberwachung als Managed Service
 
Microsoft System Center Day 2011
Microsoft System Center Day 2011Microsoft System Center Day 2011
Microsoft System Center Day 2011
 
Microsoft System Center - Lizenzierung
Microsoft System Center - LizenzierungMicrosoft System Center - Lizenzierung
Microsoft System Center - Lizenzierung
 
Building a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache SolrBuilding a large eCommerce application with Extbase, Fluid and Apache Solr
Building a large eCommerce application with Extbase, Fluid and Apache Solr
 
Citrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die NeuerungenCitrix XenServer 5.6: Die Neuerungen
Citrix XenServer 5.6: Die Neuerungen
 
DataCore Speichervirtualisierung
DataCore SpeichervirtualisierungDataCore Speichervirtualisierung
DataCore Speichervirtualisierung
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Trapeze WLAN-Lösung
Trapeze WLAN-LösungTrapeze WLAN-Lösung
Trapeze WLAN-Lösung
 
EMA Email Archive Appliance
EMA Email Archive ApplianceEMA Email Archive Appliance
EMA Email Archive Appliance
 
Data Domain Backup & Recovery
Data Domain Backup & RecoveryData Domain Backup & Recovery
Data Domain Backup & Recovery
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

McAfee MOVE & Endpoint Security

  • 1. McAfee MOVE / Endpoint Security Marco Schultes 02.06.2011 Marco Schultes - netlogix Hausmesse LIVE/11 1
  • 2. Was IST eigentlich McAfee MOVE? Management for Optimized Virtual Environments 2 2
  • 3. Aber warum optimiert? Heutige (AntiVirus)- Applikationen sind nicht für virtuelle Umgebungen programmiert, nicht „hypervisor aware“ und deshalb sehr verschwenderisch im Umgang mit Ressourcen. 3
  • 4. MOVE - die neue Plattform zur Absicherung virtueller Umgebungen „MOVE is a new strategic Platform and NOT a single Product“ HIPS Plug-in AV for Server Plug-in File Encryption AV for Plug-in McAfee MOVE VDI‘s Platform Plug-in Site SIA Adivsor Partner Plug-in Device Plug-in Control Plug-in 4
  • 5. AntiVirus Optimierung Die Probleme des Administrators 5
  • 6. Problem #1 - Virtuelle Server “Klassisches AV frisst CPU-Leistung” Individuelle Konsolidierte Server Server CPU & I/O Utilization On-Access Scans 3-5% CPU-Last auf 30% mit 10 virtuellen Maschinen individuellen Maschinen On-Demand Scans 50-70% Last auf individuellen Drei gleichzeitige Scans Maschinen können den Host in die Knie zwingen 6
  • 7. Problem #2 - Virtuelle Server “READ-ONLY Images” Virtual Virtual Offline Machine Machine Virtual Image • READ-ONLY & Offline Apps Apps Apps Images können nicht gepatched werden OS OS OS und keine DAT- Hypervisor Updates erhalten 7
  • 8. Problem #3 - Virtuelle Desktops “AV-Storming” Organisatorische Probleme • Kapazitätsplanung • Zeitplanung • VM-Dichte auf dem Hypervisor • Verschiedene Management-Oberflächen 8
  • 9. McAfee MOVE-AV für Server und VDI VM VM MOVE Virtual Appliance Applications Applications MOVE Off-load MOVE Processing OS OS Hypervisor ePO McAfee ePO MOVE AV for VDI’s Client • On-Access Scanning (OAS) • On-Demand Scanning (ODS) (angekündigt) Virtual Desktop • Updates nur auf MOVE Virtual Appliance nötig Client MOVE AV for Virtual Servers • Scan basierend auf Hypervisor-Auslastung Virtual Desktop • On-Demand Scanning (ODS) • Offline Scanning (OVI) • On-Access Scanning (OAS) (angekündigt) 9
  • 10. Features Effizientes Security-Management – Volle ePO-Integration – Hypervisor-unabhängig (Vmware ESX / Citrix XenServer / MS HyperV (angekündigt) – Offline Virenscan – Hypervisor-lastabhängig – Security Dashboards/Reports per Hypervisor 10
  • 12. Optimiertes File Scanning 1. Lokaler Scan Cache 2. Globaler Scan Cache 3. File scannen 4. Artemis Anbindung 3 2 1 4 abc abc Scan abc ac def gi def gi def def g ii g Engine Hypervisor Artemis 12
  • 13. Advanced File Caching • Reduziert den Scan Overhead – Durch effizienten Einsatz von Caches – Lokaler Scan Cache auf der VM – Globaler Scan Cache auf der Scan Engine ePO Server Scan abc abc abc def gi def gi abc def def g ii g Engine Hypervisor MOVE Cache Synchronization Protocol Server 13
  • 14. Traditionelles AV vs. MOVE AV 14
  • 15. McAfee Plattform-Test auf Citrix XenServer A/V within the guest Offloading A/V with MOVE Memory Consumption 60-120MB+ ~20MB (per VM) Peak CPU Usage (per 80-100% <10% hypervisor) VM Density X 3X Scanning Resource YES NO Utilization (Offloaded to Virtual Appliance) DAT Update Resource YES NO Utilization (Offloaded to Virtual Appliance) The product plans, specifications and descriptions herein are provided for information only, subject to change without notice, results may vary and without warranty of any kind, express or implied 15
  • 16. MOVE Agent in Action 16
  • 17. MOVE Konfiguration Bis zu 2 Scan-Server können angegeben werden (virtuelle oder physikalische Server) 17
  • 18. Security Dashboards / Reports 18
  • 20. Verhindert „AV Storming“ Scan wird verhindert, da die Hypervisor-Auslastung zu hoch ist 20
  • 21. Zusammenfassung • Erhöhen der virtuellen Server Security mit minimalen Performance-Auswirkungen • Aktivieren von VDI Security bei gleichzeitig hoher VM Dichte pro Hypervisor • (Zeit-)Einsparungen durch vereinfachtes zentrales Management über ePO • Unabhängig vom Hypervisor – ESX / XenServer / Hyper-V 21
  • 23. McAfee Data Protection McAfee Data Loss Prevention McAfee Device Control Full control and absolute Prevent unauthorized use visibility over user behavior of removable media Data Loss Device devices Prevention Control McAfee Total Integrated Protection™ technologies for for Data total data protection Endpoint Encrypted Encryption USB McAfee Endpoint Encryption McAfee Encrypted USB Full disk, mobile device, and Secure, portable external file and folder encryption storage devices coupled with strong authentication 23
  • 24. Data Breaches Don’t Discriminate “DuPont scientist downloaded “Royal London Mutual Insurance 22,000 sensitive documents as he Society loses eight laptops and the got ready to take a job with a personal details of 2,135 people” competitor…” SC Magazine “The FSA has fined “Personal data of “ChoicePoint to pay Nationwide £980,000 600,000 on lost $15 million over data for a stolen laptop” laptop” breach—Data broker sold info on 163,000 people” 24
  • 25. Challenge How best to protect confidential corporate data on mobile devices from loss, theft, or exposure to unauthorized parties? – Laptops lost or stolen in airports, taxis and hotels cost companies an average of $49,2461 – 36% of data breaches were due to lost or stolen laptop computers • Average cost is $6.75 million per breach2 – Best practices: “Ensure that portable data-bearing devices…are encrypted”2 – “Protected health information (PHI) is rendered unusable, unreadable, or indecipherable to unauthorized individuals if encrypted or destroyed”3 – Staying out of the news 1 Ponemon 2 Ponemon, 2009 Cost of a Data Breach 3 HIPAA DHHS Guidance 2009 25
  • 26. McAfee Endpoint Encryption You need • Encryption for laptops, desktops, and mobile devices with the flexibility to choose full disk or file and folder encryption Data Loss Device • Confidence in integrity of sensitive data when a Prevention Control device is lost or stolen • Safe Harbor protection McAfee offers • Broad support for laptops, desktops, and mobile devices Endpoint Encrypted Encryption USB • Full audit trails for compliance & auditing needs • Support for multiple strong authentication methods • Certifications: FIPS 140-2, Common Criteria Level 4 (highest level for software products), BITS, CSIA, etc. 26
  • 27. Solution: Full Disk Encryption Why encrypt? – Every disk drive in an organization eventually leaves said organization • Natural retirement/replacement • Loss • Theft – Knowing what sensitive information is on a given drive is difficult • Avoids having to classify data to decide what to protect – Applications use a myriad of “hidden” temp files that contain your data Data protection made easy – Simple to deploy – Nearly transparent user experience 27
  • 28. Solution: Full Disk Encryption Full Disk Encryption • No data access without proper authentication • Complete, proven protection against loss and theft • Extensible complement to other data protection technologies like file encryption, encrypted USB drives, and DLP How does it work? • Disk drive is fully encrypted, sector A through sector Z • As new information is created, it is encrypted on-the-fly • A unique, per-device recovery token is used to handle normal “lost password” situations 28
  • 29. Security Details Matter CC EAL 4 and FIPS 140-2 Level 2 validation – Proves the security level by an independent body AES 256-bit encryption – Encryption on-the-fly using strong algorithms Up to three-factor authentication – McAfee Endpoint Encryption offers a strong pre- boot authentication – Support for various smart cards, USB tokens and biometric devices ePO compliance reporting and deployment – Identify non-encrypted machines – Deploy using McAfee ePO Business continuity – McAfee Endpoint Encryption offers offline challenge-response recovery – Reduce costs using our local user self-recovery (questions + answers) 29