Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
John Whaley Founder and CTO MokaFive Desktop Complexity Challenge System rollouts/ updates/ upgrades Application management PC/Mac/ BYOC Mobility & Remote.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
The future of Desktops Transform Your Desktop with Virtualization.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
Antony Jo The University of Montana. Virtualization  The process of abstraction; making something more abstract  Many types: Server Desktop Application.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms.
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2009 Trend Micro Inc. Paul Burton Pre-Sales Manager -NEUR How Trend Micro address virtualisation challenges Classification 7/13/
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Copyright © 2005 VMware, Inc. All rights reserved. VMware Virtualization Phil Anthony Virtual Systems Engineer
5205 – IT Service Delivery and Support
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Jacob Hjenner Country manager. Revenue ($M) EPS Total Revenue Adjusted EPS Year *Based on Consensus Estimates Access Collaboration Networking Virtualization.
CredoGov VDI Introduction James Gunn
Joey Snow | Senior Technical Evangelist Corey Hynes | Lead Technical Architect.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Selecting the Right Virtualization Technology Infrastructure Planning and Design Series.
Gordon Mangione VP, Emerging Virtualization Products Citrix Systems, Inc. Gordon Mangione VP, Emerging Virtualization Products Citrix Systems, Inc.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
1 ©2009 Desktone, Inc. All rights reserved. Desktops in the Cloud: It’s not Virtual Desktop Infrastructure (VDI) Danny Allan, Chief Solution Architect.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Why you should upgrade now!. Copyright © 2012 STORServer, All rights reserved. 2 STORServer uses Tivoli Storage Manager and it has been designed to address.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
An iterative approach to Desktop Virtualization By Mike Cave, Acting Chief Information Officer CA Department of Toxic Substances Control.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Live Migration Failover Clustering with Cluster Shared Volumes (CSV) Support for new Processor features Improved Performance Lower Power Costs Enhanced.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
V-Alliance Solution Overview Years of Business Success.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Desktop Virtualization Joshua Bradfield Dan Bacus Data Center Solutions Manager Sr. Engineer.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
User and Device Management
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
Application Migration Fritz Ohman Alphageek
System Center 2012 Configuration Manager Service Pack 1 Overview.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Boost VM Density with AV Designed for VDI
2016 Citrix presentation.
Access and Information Protection Product Overview October 2013
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
System Center Marketing
Microsoft Virtual Academy
Presentation transcript:

Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security

Copyright 2009 Trend Micro Inc. Datacenter-hosted virtual desktop infrastructure User Operating environment Virtual machine on an central server Accessed from existing hardware or a thin client Can be accessed from anywhere Home PC over VPN BYOC Analysts view: Gartner: “[VDI] will undergo an explosive growth...“ Enterprise strategy group: ”60% of enterprises have a VDI strategy“ Forrester: “three-quarters of firms now have client virtualization on their IT agenda for the next 12 months“

Copyright 2009 Trend Micro Inc. Reasons for VDI-adoption: Lower operational cost than physical hardware –Easier Deployment, Patching, Application Provisioning Extended desktop hardware lifecycles –Windows 7 adoption funds get reassigned to VDI Security and data protection –Data never leaves the data center Regulatory compliance (PCI, HIPAA, etc.) –More tightly controlled environment

Copyright 2009 Trend Micro Inc. VDI Risks Malware risk potential: Identical to physical desktops –Same operating systems –Same software –Same vulnerabilities –Same user activities => Same risk of exposing corporate and sensitive data New challenges, unique to VDI: –Identify endpoints virtualization status –Manage resource contention CPU Storage IOPs Network

Copyright 2009 Trend Micro Inc. Resource Contention The “9-AM problem” –Multiple users log in and get updates at the same time Scheduled scans –Adds significant load to the endpoint –Multiplied by number of VMs Cumulative system load Customers had to completely disable Security in their VDI environments!

Copyright 2009 Trend Micro Inc. OfficeScan 10.5 has VDI-intelligence Detects whether endpoints are physical or virtual –With VMware View –With Citrix XenDesktop Serializes updates and scans per VDI-host –Controls the number of concurrent scans and updates per VDI host –Maintains availability and performance of VDI host –Faster than concurrent approach Leverages Base-images to further shorten scan times –Pre-scans and white-lists VDI base-images –Prevents duplicate scanning of unchanged files on a VDI host –Further reduces impact on the VDI host

Copyright 2009 Trend Micro Inc. OfficeScan 10.5 has VDI-intelligence With OfficeScan 10.5, customers can run more than double the number of desktop images per host – without sacrificing security Investment in OfficeScan‘s VDI plug-in pays for itself: –In less than 3 months with 1000 users* –In less than 2 months with 2500 users* *: assuming average cost of $8000 per VDI server and the deployment of standard endpoint security Customers no longer have to choose between Security and Return On Investment

Copyright 2009 Trend Micro Inc. Integration with Citrix Receiver BYOC –Users bring their own computers –Ensure protection before granting access OfficeScan 10.5 –Deploys through Citrix Receiver –Secures endpoints as a self-service application –Easy provisioning of OfficeScan clients to enduser devices –Supports consumerization no trade-off in security

Copyright 2009 Trend Micro Inc. Windows 7 support Logo-certification as compatible with Windows 7 –Supports XP, Vista, Win7 –Windows POSReady, Windows Embedded Enterprise –Supports Server 2003, 2003R2, 2008 and 2008R2 Integrates with Windows 7 Action Center Support for 32 and 64 bit environments Easy migration from physical to virtual deployments accross versions of Windows

Copyright 2009 Trend Micro Inc. Local File Reputation AND Web Reputation Corporate Network Internet Local Smart Protection Network Server Query CRC/URL Immediate response FILE REPUTATION WEB REPUTATION Constant, real-time updates happen in the cloud Query CRC/URL Immediate response New: Local Web-reputation: Privacy mode Proxy mode Improves user experience New: Local Web-reputation: Privacy mode Proxy mode Improves user experience

Copyright 2009 Trend Micro Inc. Enterprise-class management Unified management for physical and virtual endpoints Increased management scalability –20,000 or more endpoints per management server (up from 8000) –Allows consolidation of management stations Improved Role-based administration –More granular –Controls applicable to the client-tree segregate customers/regions Improved Active Directory Integration –Sync changes to AD –Improved Security compliance reports

Copyright 2009 Trend Micro Inc. Summary Industry‘s first VDI-aware endpoint security solution –Optimized for physical and virtual desktops –Optimizes VDI Return on Investment –Pays for itself in 3 months or less Best security for Windows 7 Local Smart Protection Network Server –File Reputation and Web Reputation in the local cloud –Optimizes performance and privacy Management enhancements –Enables management server consolidation –More granular Role-based Administration –Leverages Active Directory

Copyright 2009 Trend Micro Inc. Questions & Answers