Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.

Slides:



Advertisements
Similar presentations
Privileged Identity Management ISV Partner Alliance Value.
Advertisements

ISV Partner Alliance Value Settings Management User State Virtualization for Microsoft® System Center.
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
ISV Partner Alliance Value Policy Policy Management for Microsoft® System Center.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Proactive monitoring for Blackberry, Oracle, SWIFT and VMware with System Center Operations Manager 2007 to 2012 R2 ISV Partner Alliance Value.
“It’s going to take a month to get a proof of concept going.” “I know VMM, but don’t know how it works with SPF and the Portal” “I know Azure, but.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Unified Logs and Reporting for Hybrid Centralized Management
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
SQL Server 2008 for Hosting Key Questions to Address How can SQL Server save your costs? How can SQL Server help you increase customer base? How can.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
Microsoft delivers a complete datacenter solution with Windows Server 2012 R2 out-of-the-box Cloud OS Development Management Identity Virtualization.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Norman SecureSurf Protect your users when surfing the Internet.
3 STEPS TO SECURING YOUR HYPER-V INFRASTRUCTURE by Virtualization Evangelist David Davis.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Multi-tenancy and private, public/hybrid cloud operations automation Cloud On Your Terms ISV Partner Alliance Value.
EnterpriseAlert ® Reliable, Auditable Notifications, and Mobile Response for Rapid Incident Management Best in-class Performance ISV Partner Alliance Value.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
An Open PaaS stack that enables any organization to transform their existing Windows infrastructure into a self-service cloud application platform ISV.
ISV Partner Alliance Value Assets and Inventory - Resource Optimization for Microsoft® System Center.
HOW TO SECURE AN ENTIRE HYPER-V NETWORK by Virtualization Evangelist David Davis.
PRESIDIO.COM MARCH  Presidio Overview  What’s New in VDP and VDPA  VDPA Features  Backup and Restore Job Creation  Q&A.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Cross Platform From the Metal Up ISV Partner Alliance Value Self-service storage provisioning.
CSI-E Computer Security Investigator – Enterprise.
Hyper-V Security Tips: Protect yourself from vulnerabilities that you never knew existed Symon PerrimanAlex Karavanov VP, Business DevelopmentDirector.
Making Managed Services Easier Presenter: Greg Henderson Director, International.
MDC-B350: Part 1 Room: You are in it Time: Now What we introduced in SP1 recap How to setup your datacenter networking from scratch What’s new in R2.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
Cross Platform From the Metal Up ISV Partner Alliance Value VMware monitoring, management and capacity planning.
1 1 Hosted Network Security EarthLink Complete™ Data.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Microsoft Virtual Academy Module 8 Managing the Infrastructure with VMM.
HOW TO ACHIEVE HIGH AVAILABILITY AND PROTECTION FROM EXTERNAL THREATS FOR FREE MICROSOFT HYPER-V SERVER Max Kolomyeytsev StarWind Virtual SAN Product Manager.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Microsoft and Symantec
Michael Miller Senior Director Real-Time Collaboration Products Oracle Collaboration Suite 10g Oracle Corporation.
Plesk 8 for Linux/UNIX Server Automation SWSOFT GLOBAL HOSTING SUMMIT 2006 Todd L. Crumpler May 30-June 1, 2006.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Introduction to Barracuda IM Firewall
Critical Security Controls
Global Brand Governance Made Possible by Microsoft Azure-Hosted Responsive Websites MINI-CASE STUDY “It was crucial that the Americas, Europe, and Asia.
Hybrid Management and Security
Securing the Network Perimeter with ISA 2004
Virtualization & Security real solutions
Information Security Session October 24, 2005
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
In the Cloud, Inspection Checklists and Auditing Can Be Managed with a Smartphone or Tablet MINI-CASE STUDY “We needed the ability to be able to host our.
Logicom Cloud Marketplace
Comodo Dome Data Protection
Presentation transcript:

Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value

ISV Partner Alliance Value 5nine Software 2 Product Description Primary Capability: Security for Windows Server 2012, Windows Server 2012 R2, Hyper-V and Windows 8 Additional Capability: Delivers Anti-Virus, Virtual Firewall and Intrusion Detection in a single Software License Product Description: 5nine Security Plugin for System Center VMM The first and only agentless security solution for Windows Server, Hyper-V and Windows 8. Provides complete security for small business to the largest enterprise deployments. System Center Integration: Fully integrated through SC VMM extensions-plugins.aspx Website: Global Sales Contact: Cost Licensing: $24.99 per Virtual Server (1 year subscription) Support: Next Steps Support TypeYesNoCostAvailability Self-Help (Web, Forums) XNone6AM – 6PM PT Assisted: Web/Mail XNone6AM – 6PM PT Assisted: PhoneXNone6AM – 6PM PT Assisted: On-siteXN/A

ISV Partner Alliance Value 5nine Software - Architecture 3 Architecture OverviewResources Management Server and Management Applications Management Application is a set of components along with a corresponding centralized repository (database) that can be deployed on a dedicated machine/VM to provide the following functionality: Define / manage a set of network traffic rules/policies (collection of rules and such) that can be applied to the managed entities based on certain criteria or manually. Apply, monitor and enforce the rules/policies on managed VMs and Hosts. Collect the audit events/logs from the managed entities. Control Agentless Anti-Virus and Anti-Malware Management functions for IDS Host Management Agent The host management consists of the user mode service effectively implementing/installing WFP provider on the host machine as well as kernel mode drivers implementing vSwitch WPF callout filtering and vSwitch filtering extension driver implementing virtual Firewalling, QoS functionality such as throttling/deep packet inspection, IDS, etc. Anti-Malware host based agent utilizes proprietary Library providing access to VHD(x) and host file system, memory and boot sectors using CBT (change block tracking) driver for fast incremental full scans. White paper 1: com/Docs/5nine_ Security_Manager _White_Paper.pdf White Paper 2: com/Docs/Why_A gentless_Security_ Is_the_Best_Choic e.pdf

ISV Partner Alliance Value 5nine Software - Deployment 4 Deployment OverviewResources 1.5nine Security Plugin for SC VMM installs on each Physical Host 2.All Virtual Machines connected to the Physical host are secured 3.Installation and Setup takes only Minutes Helpful Resources: 5nine Security Plugin for SC VMM 5nine-security-manager-extensions- plugins.aspx Getting Started Guide MM_Plugin_QSG.pdf White paper 1: com/Docs/5nine_ Security_Manager _White_Paper.pdf White Paper 2: com/Docs/Why_A gentless_Security_ Is_the_Best_Choic e.pdf

ISV Partner Alliance Value 5nine Software - Case Studies Title: Virtual Firewall and Anti-Malware for WS 2012/Hyper-V VPS’s. Summary: Providing Secure Multi-Tenancy, Virtual Firewalling and Agentless Anti-Malware for VPS’s with Financial Applications and large databases with attached storage. VM’s are on WS 2012/Hyper-V Situation: Several VPS’s that belong to different customers are hosted on same WS 2012 cluster. They needed to ensure secure multi- tenancy, traffic is blocked between RDP accessed VM’s and customers required fast AV/AM scans with no application performance impact. Solution: 5nine Agentless Security Plugin (Virtual Firewall and Anti- Malware) for SC VMM or standalone 5nine Security manager using extensibility of WS 2012/Hyper-V v-Switch Benefit: MSP-Secured customers in Multi-Tenant environment and delivered fastest AV/AM scans with no performance impact to customers VPS/VM application performance. For More Information: Title: Securing SQL VPS’s hosted on WS 2012/Hyper-V Cluster Summary: Providing Secure Multi-Tenancy, Virtual Firewalling and Agentless Anti-Malware protection of MS SQL VPS’s hosted on WS 2012/Hyper-V Situation: Several SQL VPS’s that belong to different customers are hosted on same WS 2012 cluster. There were several attempts to hack these SQL VPS’s so Mobile Tech needed strong protection. Solution: 5nine Agentless Security Plugin (Virtual Firewall & Anti- Malware) for SC VMM, or standalone 5nine Security Manager utilizing extensibility of WS 2012/Hyper-V v-Switch blocks unauthorized access to SQL Server VPS ports as 5nine Virtual firewall programmatically limits access for only certain customer IP addresses/ranges. Benefit: Secured customers in Multi-Tenant environment For More Information: Case Study #1 – Reseller Choice Case Study #2 – Mobile Tech Customer Quote: - " Use of our Hyper-V high end VPS offering for the clients who host large size sensitive financial data requires high level of security and compliance. Use of 5nine agentless Virtual Firewall and Anti-Malware, utilizing extensibility of Windows Server 2012 Hyper-V switch provides such security measures " – Rob Conley, President and CEO of Reseller Choice 5 Customer Quote: "Use of 5nine Security Manager for Windows Server/Hyper-V helped us to prevent malicious attempts to hack SQL server port allowing by IP- only access to that port for SQL VPS thus blocking all outside exploits. QLS servers are hosted for our customers on Windows Server/Hyper-V Platform" – Michael Davidson, CEO MobileTech

Partner Alliance – Depth ISV 5nine Software – Security Revenue for WS 2012 & Hyper-V 6 Incentives Sales Incentives: Aggressive Margins and strong Services Revenue Deployment Incentives Adding 5nine Security Manager to a Windows Server 2012, Windows Server 2012 R2 or Hyper-V new or existing customer sale results in an additional 15% Margin and lead flow from 5nine Software to System Integrator Opportunity sizing: -Average deal size including the ISV solution +/- $50,000 -Average services revenue from deploying +/- $20,000 Resources: Sales Access to 5nine Sales Resources for co-selling. Systems Integrator writes the deal and receives full commission. Deployment 5nine Resources for deployment best practices are available but Systems Integrator delivers all services. Support 5nine Performs tier 1, 2, and 3 support free of charge for Systems Integrator customers. Coverage by Country – Support and Sales personnel Sales and Support Resources are available from 5nine Software United States, Europe and Asia Pacific Regions