1 Bitdefender 2013 Bitdefender 2014 “What business are we really in?” 1.Theodore Levitt.

Slides:



Advertisements
Similar presentations
1 Bitdefender 2013 Virtualization Security Understanding The Impact.
Advertisements

1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Bitdefender GravityZone SME Security Solution
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
VMware Update 2009 Daniel Griggs Solutions Architect, Virtualization Servers & Storage Solutions Practice Dayton OH.
1Copyright 2011 FUJITSU Zero Clients Maximum Savings, Maximum Flexibility.
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Virtualization for Cloud Computing
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Norman Endpoint Protection Advanced security made easy.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
VMware vSphere 4 Introduction. Agenda VMware vSphere Virtualization Technology vMotion Storage vMotion Snapshot High Availability DRS Resource Pools Monitoring.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
CredoGov VDI Introduction James Gunn
Joey Snow | Senior Technical Evangelist Corey Hynes | Lead Technical Architect.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
[Name / Title] [Date] Effective Threat Protection Strategies.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 7 2/23/2015.
May l Washington, DC l Omni Shoreham Nick Dobrovolskiy VP Parallels Open Platform May 19 th, 2008 Introducing Parallels Server.
PRESIDIO.COM MARCH  Presidio Overview  What’s New in VDP and VDPA  VDPA Features  Backup and Restore Job Creation  Q&A.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
KASPERSKY ENDPOINT SECURITY
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Classification 10/3/2015 Worry-Free Business Security 5.0.
ITServices Virtualization Terry Black January 2013.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
Introducing Kaspersky Security for Virtualization Peter Beardmore Sr. Director of Product Marketing.
The Changing World of Endpoint Protection
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Infrascale Company Overview. About Infrascale Los Angeles, CA Venture backed Managed Service Providers 12 global data centers Eversync Solutions.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Server Virtualization & Disaster Recovery Ryerson University, Computer & Communication Services (CCS), Technical Support Group Eran Frank Manager, Technical.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
© 2009 VMware Inc. All rights reserved Diagram & Icon Library - Community 2 of 3 April 2012 Copyright © 2012 VMware, Inc. All rights reserved. This product.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
Blue Lane Technologies Best of Breed IPS April 29, 2008 Interop 2008.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Extending Auto-Tiering to the Cloud For additional, on-demand, offsite storage resources 1.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Virtual IT Partner TOOLS. 2 Toolset Overview Provides a unified approach to the most common and needed management tools needed in IT Saves money by consolidating.
PHD Virtual Technologies “Reader’s Choice” Preferred product.
Boost VM Density with AV Designed for VDI
Ilija Jovičić Sophos Consultant.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Hybrid Management and Security
Ransomware & Security for Virtualization
Customized Solutions to your needs
Virtualization & Security real solutions
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Cloud Security for Endpoints
Secure once, run anywhere Simplify your security with Sophos
Logicom Cloud Marketplace
Presentation transcript:

1 Bitdefender 2013 Bitdefender “What business are we really in?” 1.Theodore Levitt

2 Bitdefender 2013 Bitdefender DATA Endpoint protection * APPS Operating system Traditional antimalware Signature based scanning and protection Heuristic detection Firewalll Advanced antimalware HIPS – host based intrusion prevention Web protection Application whitelisting Vulnerability Management Assessment Patch Management Anti-malware with advanced server support Specialized servers (e.g. ) virtual server environments Endpoint security Data Security Encryption Device control DLP - data loss prevention MDM – mobile application management

3 Bitdefender 2013 Bitdefender ENDPOINT SECURITY is our business

4 Bitdefender 2013 Bitdefender Understanding The Impact of Virtualization Security

5 Bitdefender 2013 E-Threats behind the Curtains Teens and Geeks –Attention-Driven –Loner Profile Cyber-criminals –Profit-Driven –Highly Organized High Profile Attacks –Social Engineering –Mass Mailers Stealth Attacks –Spyware/Adware –Automated Variant Creation and Morphing –Persistent Threats Lost productivity –Clogged Systems and Networks –Help Desk and Data Loss Costs Cyber-crime –Identity Theft and Online Fraud –Highly Targeted Corporate Information Attacks WHO? HOW? WHAT?

6 Bitdefender 2013 Magnitude of the Problem/Opportunity “ Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.” According to Gartner “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ” According to AV-Test’s Andreas Marx Source: AV-Test Labs ( Around 1.5M unique malware samples are discovered every month! Source: av-test.org – New Malware Growth

7 Bitdefender 2013 Virtualization market drivers and adoption X Traditional Antimalware

8 Bitdefender 2013 Antivirus Impact: 200 MB of memory per VM 200+ MB of disk per VM The antimalware agent adds : Scan Engines – Signatures - Databases… to each VM

9 Bitdefender 2013 Creating The Perfect Storm Each with its own I/O Stream Physical Server Can Support Virtual Desktops Virtual Desktops 8-12 Virtual Servers Virtual Servers 1

10 Bitdefender 2013 Creating The Perfect Storm Scan Simultaneous Update AV STORM

11 Bitdefender 2013 Capacity Impact: VS SecurityCapacity Impact #1

12 Bitdefender 2013 Security Gaps: Boot latency & Boot time gaps System are vulnerable to attacks during AV loading, updates and during backup recovery Impact #2

13 Bitdefender 2013 Lack of intelligent co-ordination o Integrate with virtualization management o Non-existent VMs remain o Serialize full system scans o Policy applied to groups Impact #3

14 Bitdefender 2013 Secure Virtual Appliance the Impact: Security & Capacity Remote Scanning New Security Strategies

15 Bitdefender 2013 Secure Virtual Appliance Deduplicate and Centralize +30% saving on CPU impact +10% saving on Memory impact

16 Bitdefender 2013 Traditional AV VS. BD Tools) - impact on host  Host running 72 virtual machines  Local cache and server cache used At least 10% saving on Memory impact At least 30% saving on CPU impact

17 Bitdefender 2013 Approach: VMware integration  VMware vShield Endpoint  VMware vCenter integration  BD Tools  “Agentless”?

18 Bitdefender 2013 Approach: Bitdefender Technology o Any hypervisor o SVA redundancy o Performance and simplicity

19 Bitdefender 2013 Comparison of Approaches ElementVMware vShield EndpointBitdefender Technology Centralize, deduplicate Inspection through VMware API’s Inspection using security vendor technology Hypervisor requirements ESXi (vSphere) environment with vShield Endpoint license, vShield Manager installed ESXi, Xen, Hyper-V, KVM, etc., and any mix thereof Endpoint footprint vShield Endpoint driver embedded in VMware Tools. Optional BD Tools (GUI, memory & process scanning) BD Tools (GUI, memory & process scanning) Virtual Appliance Tied to ESXi hypervisor; one per host, no host migration Independent of hypervisor; fail-over between hosts, migration a non-issue Operating SystemsWindowsWindows, Linux, Solaris (x86) Public cloudNot technically practical/possibleYes

20 Bitdefender 2013 Security reinvented o Hypervisor agnostic; Supports VMware, Citrix, Microsoft, AWS, Oracle, and Red Hat virtualization o OS agnostic; Windows, Linux and Solaris servers as well as VDI instances o Integrated management; VMware, Citrix, Amazon Web Services o 30% more VMs per physical host; Increased server consolidation ratios with centralized antimalware o Tiny footprint on the VMs: 60 MB of disk and 30 MB of memory in non-VMware environments

21 Bitdefender 2013 Built with Virtualization Built for Virtualization

22 Bitdefender 2013 Virtualization is another disruptive technology take advantage of your chance to improve security ! o Virtualization needs purpose-built security o Two approaches today; vShield and Bitdefender o Management must be integrated (vCenter, XenServer, AD) o Avoid YAPS (Yet Another Point Solution) o Future-proof (OS & hypervisor, private & public, mobile) o Traditional endpoint and management architectures will fail

23 Bitdefender 2013

24 Bitdefender 2013 Gravity Zone Security for Endpoints On Premise orCloud-based Simple to deploy, install & manage Secures: Windows MAC Servers Exchange (roadmap) Mobile (roadmap) Comprehensive Security from one dashboard Secures: Physical devices (windows, MACS, Servers) Mobile Devices Virtualized Environments (VMware. Citrix Xen, Hyper V and more) OR

25 Bitdefender 2013 Control Center ConsoleEndpoint Security (EPS) The New Business Portfolio is entirely based on the Bitdefender GravityZone Architecture

26 Bitdefender 2013 Bitdefender at a Glance Consistent Leader

27 Bitdefender 2013 Advanced protection through proactive detection Active Virus Control leverages advanced heuristic methods to detect new potential threats in real time It monitors all application activity throughout the lifecycle of the application processes B-HAVE analyzes the behavior of potentially malicious codes inside a secure virtual computer environment It eliminates false positives and significantly increasing detection rates for new and unknown malware

28 Bitdefender 2013  The #1 Anti-Malware Security Technology in the world  First security software vendor to receive top recommendations simultaneously from the most important three key independent organizations in the US, UK, and Germany!  Only security company to receive 14 VB Antispam awards in a row  BitDefender protects more than 500 million people worldwide (including technology partnerships)  Nine international sales offices with ~ 475 employees worldwide  260+ technical people and engineers in R&D team  Products localized in more than 20 languages.  120 OEM Partners and Growing  Trusted by top security companies globally: F-Secure, G-Data, Trustport, e-Scan, Qihoo, Bullguard, Acronis IBM, etc Bitdefender at-a-glance

29 Bitdefender 2013 Bitdefender Questions and Thank-you