24
1 Phone: 650-681-8100 / email: [email protected] 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040 Rishi Bhargava Sr. Director, Product Management, Datacenter & Server Security, McAfee James Greene Product Marketing, Intel Hemma Prafullchandra CTO and SVP Products, HyTrust © 2012, HyTrust, Inc. www.hytrust.com Virtualizing More While Improving Risk Posture From Bare Metal to End Point

Virtualizing More While Improving Risk Posture – From Bare Metal to End Point

  • Upload
    hytrust

  • View
    492

  • Download
    2

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. Virtualizing More While Improving Risk Posture From Bare Metal to End PointRishi Bhargava Sr. Director, Product Management, Datacenter & Server Security, McAfeeJames Greene Product Marketing, IntelHemma Prafullchandra CTO and SVP Products, HyTrust 2012, HyTrust, Inc. www.hytrust.com 1975 W. El Camino Real, Suite 203, Mountain View, CA 94040 Phone: 650-681-8100 / email: [email protected] 1

2. AgendaIntroductionsOverview: Setting the StageSolutions: Intel HyTrust McAfeeDiscussion Topics/Q&ASummary 2012, HyTrust, Inc. www.hytrust.com 2 3. Setting the Stage: Security and Compliance Will Be Key toVirtualizing the Next 50% of the Data Center 100% Cost Savings Compliance RiskDiscussion% of Workloads VirtualizedEnterprise Platform Growth depends onvirtualizing missioncritical workloads Extensive Production Virtualization platformprovides basicLimited Productionsecurity: OK for non- Mission-Critical Workloads critical workloads Develop/Test Tier 1/2 workloadshave higher security,compliance needsNon-Mission-Critical Workloads Purpose-built solutions 0%neededNon-Compliant Limited ComplianceCompliantBest-Practice 2012, HyTrust, Inc. www.hytrust.com 3 4. Audience PollWhat are your virtualization priorities for 2012?(Pick Top Priority) Maximize performance and availability with sophisticated monitoring Continue to increase consolidation ratios Better management of existing virtual environments Standardization of hypervisors and/or platforms Become compliant and/or other organizational mandates (i.e. 25% quota forFederal organizations) Only maintain at this point 2012, HyTrust, Inc. www.hytrust.com 2011, HyTrust, Inc. www.hytrust.com 4 5. 4 Must Haves For a Secure Cloud EnvironmentVirtualInfrastructureIntel TXT 2012, HyTrust, Inc. www.hytrust.com5 6. Audience PollWhat security concern ranks highest in importance in yourvirtualized environments in 2012? Lack of automation (admin is brought in for every update and change) Self service for line of businesses to access/manage their virtual machines Strength of security policies and processes around access and change controls Insider threat either malicious or errant Logging and reporting tools for audit and/or forensics purposes All of the above 2012, HyTrust, Inc. www.hytrust.com 2011, HyTrust, Inc. Inc. www.hytrust.com6 2012, HyTrust, www.hytrust.com 7. Intel Security Focus Security & Trust Built-In Identity Detection &Securing Data Recovery and Protection &Prevention ofand AssetsEnhancedFraud Deterrence Malware PatchingHardened Foundation for Computing7 8. Intel Technologies: Server SecurityEncrypt IsolateEnforceIntel AES-NI Intel VT & IntelIntel TXTTXTprotects VM isolationdelivers built-in and provides a more establishes trustedencryption acceleration secure platform status, foundation tofor better data launchcontrol migration basedprotectionon security policy VM 1 VM 2VM 1 VM 1 VM 2 VMM?? VMM Establishing the Foundation for More Secure Computing8 9. Intel Trusted Execution TechnologyIntel TXT: Hardware Root ofTrust Enables isolation and tamperdetection in boot process Measured/Verified BIOS andHypervisor or OS Complements runtime IntelprotectionsChipset TPM Reduces support andremediation costsBIOS FlashVT VMM/OS(MLE) Hardware based trustprovides visibility andverification useful incompliance, enforcement Intel TXT: Enforce Control On The Platform9www.intel.com/go/txt 10. Intel TXT Use Models Trusted Pools 2 1 Hardware enforced detection of launch components reduces malware threat Trusted Launch 1Verified platformintegrity 2 Enforce control of VMs based Internet on platform trust (and more) to better protect data 3 Hardware support for compliance reportingCompliance Support enhancing 3auditability of cloud environment Powerful Benefits: Protection, Visibility and Control*Other names and brands may be claimed as the property of others10www.intel.com/go/txt 11. HyTrust Appliance Provides Necessary Controls to Confidently Virtualize Mission-Critical ApplicationsSecures the administration of thehypervisor & virtual infrastructure: Enforces consistent access andauthorization policies covering allaccess methods Provides granular, user-specific,audit-quality logs Enables strong, multi-factorauthentication Verifies platform integrity, ensuring thehypervisor is hardened and the virtualinfrastructure is trustedProvides complete visibility into and control over who accesses the infrastructure, theintegrity of the infrastructure, and the validity of the changes requested. 2012, HyTrust, Inc. www.hytrust.com11 12. Technology Leaders Partner With HyTrust forComprehensive SolutionsHyTrust is part of Intels HyTrust event reporting and HyTrust provides HyTrust is part of CAtrusted cloud architecture TXT-based trust status Access Control fornative integration withbased on TXT being integrated with SecurID and enVision Virtual EnvironmentsMcAfee ePOHyTrust provides HyTrust is the platform HyTrust is "go to" partnerHyTrust reporting andcombined reporting security solution - for vSphere security andcontrols being integratedwith Trends Deepaccess control andcompliancewith Symantec CCSSecurity product auditing - for vBlock 2012, HyTrust, Inc. www.hytrust.com12 13. McAfee Data Center SolutionsGTI McAfee ePO SEIMSecurity ManagementServer Security Network Security 13 14. McAfee Data CenterServer Security Solutions14 15. MOVE-AV Benefits OPTIMIZES McAfee security for1 virtualized environments STANDARDIZES security across all2 major hypervisors ENSURES best security management3 and delivery for virtualized environmentsSecurity Intelligence for Virtualization15 Confidential 16. Optimizes McAfee Anti-Virus VM VMMOVE McAfee ePO Appliance MOVE MOVE MA MA MA OSOSOSHypervisor Features Offloads On-Access Scanning Enhanced scan avoidance Memory protectionDatacenter Quarantine GTI file reputation VSE license for virtual machines16 17. 2. Standardizes Security Across Hypervisors VM VMMOVE McAfee ePO Appliance MOVE MOVE MA MA MA OS OSOSVMware ESX Citrix XenServer FeaturesMicrosoft Hyper-V* Hypervisor-agnostic Hypervisor-aware scan scheduling Increased hypervisor capacityDatacenter Offline security for inactive servers ePO management17*Not supported for MOVE Scheduler 18. Discussion topic:Accelerating time-to-value from your security initiativesAudience: What works and doesnt work in your organizations security office?18 19. Discussion topic:Secure Cloud Architecture begins with Hardware Root ofTrust Physical Equipment Virtualization platform Virtualized physical equipment Managementserver/appliance/portal/services ManagementIntel TXT 19 20. Discussion topic:Drive higher efficiencies and consolidation ratios throughvirtualization-optimized security solutions for the guestand virtual infrastructure 20 21. Discussion topic:Provide corporate with visibility and enable a state ofcontinuous complianceAudience: How are you producing these insights for your management teams now? 21 22. Summary Together provide more comprehensive virtualization security Put Intel Cloud Builders reference solutions to work: makes it easier todeploy and optimize cloud infrastructurewww.intel.com/cloudbuilders Automatically enforce use of trusted compute pools for sensitiveworkloads in private, hybrid of public clouds. Highly regulated andsecurity conscious organizations can demand use of trusted computepools!www.hytrust.com For more information on McAfees MOVE offering visithttp://www.mcafee.com/us/products/move-anti-virus.aspx22 23. Resources Links Intel TXT http://www.intel.com/go/txt Intel Cloud Builders http://www.intel.com/cloudbuilders McAfee http://www.mcafee.com/us/products/endpoint-protection/index.aspx HyTrust Appliance and Video Demos http://www.hytrust.com/resources/product HyTrust Case Studies and Resources http://www.hytrust.com/resources/case-studies 2012, HyTrust, Inc. www.hytrust.com 23 24. Thank You 2012, HyTrust, Inc. www.hytrust.com 24