Download presentation
Presentation is loading. Please wait.
Published byShawn Wilfrid Johns Modified over 9 years ago
1
INTRODUCING: KASPERSKY Security FOR VIRTUALIZATION | LIGHT AGENT FOR MICROSOFT AND CITRIX VIRTUAL ENVIRONMENTS
2
WHAT IS VIRTUALIZATION SUPPOSED TO BRING?
REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM VM CENTRALIZED HW MANAGEMENT STABILITY DATA SECURITY
3
VIRTUAL ENVIRONMENTS IMMUNITY: TRUE OR FALSE?
VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS ‘IN 2012, 60% OF VIRTUALIZED SERVERS WILL BE LESS SECURE THAN THE PHYSICAL SERVERS THEY REPLACE’ Gartner FALSE ? CYBERCRIMINALS DON’T TARGET VIRTUAL MACHINES MORCUT (AKA CRISIS), THE FIRST TROJAN TARGETING VIRTUAL MACHINES, WAS IDENTIFIED IN 2012 FALSE ? MALWARE CAN’T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES RESIDENT MALWARE CAN
4
THE GROWING MALWARE THREAT …
Spam messages per day 315k+ 30M+ New threats per day Advanced protection is required Web-borne infections prevented per month Network attacks blocked per month 160M 270M 1999 2001 2003 2005 2007 2009 2011 2013
5
options FOR VIRTUAL PROTECTION
NO PROTECTION TRADITIONAL 4 choices to make options FOR VIRTUAL PROTECTION NOT AN OPTION! PROTECTION GAPS LIGHT AGENT AGENTLESS VMWARE SUPPORT ONLY SUPERIOR SECURITY
6
NO PROTECTION – NOT AN OPTION
VIRTUAL INFECTION AND SPREAD VIRTUAL EAVESDROPPING TARGET OF CYBERCRIMINALS MALWARE CAN SURVIVE “TEAR-DOWN” OF NON- PERSISTENT MACHINES
7
TRADITIONAL PROTECTION APPLIED TO VIRTUAL ENVIRONMENTS
AV-STORMS REDUNDANT ANTI-MALWARE AND SIGNATURE FILES HIGHER BOOT LATENCY REDUCED CONSOLIDATION RATIOS
8
The light agent approach
OPTIMIZED PERFORMANCE THROUGH TIGHT HYPERVISOR INTEGRATION LIGHT AGENT ALLOWS IN-DEPTH INDIVIDUAL MACHINE SCANNING FOR MAXIMUM PROTECTION SEPARATE DEDICATED SECURITY VIRTUAL MACHINE HANDLES THE HEAVY WORK. VIRTUAL, PHYSICAL AND MOBILE - MANAGED THROUGH A SINGLE CONSOLE HIGHLY SCALABLE FROM SMB TO LARGE ENTERPRISE ORGANIZATIONS
9
HOW KSV | LIGHT AGENT WORKS
10
KSV | LIGHT AGENT HIGHLIGHTS
NO ADVERSE EFFECT ON HYPERVISOR PERFORMANCE FAST, STRAIGHTFORWARD DEPLOYMENT WITH NO REBOOTS CONTROLS LIMIT OR BLOCK TIME- AND SPACE- WASTING SOCIAL WEBSITES AND APPLICATIONS SUPPORTS ALL KEY MICROSOFT AND CITRIX VIRTUALIZATION TECHNOLOGIES SHARED CACHE TECHNOLOGY AVOIDS UNNECESSARY RE-SCANNING
11
File level protection AWARD-WINNING ANTI-MALWARE ENGINE
REAL-TIME RESPONSE TO ZERO-DAY THREATS - KASPERSKY SECURITY NETWORK CLOUD-BASED INTELLIGENCE DEEP-LEVEL SCANNING AT INDIVIDUAL MACHINE LEVEL, PROTECTING AGAINST THE MOST ADVANCED MALWARE PROACTIVE DEFENSE INCLUDING AUTOMATIC EXPLOIT PREVENTION
12
NETWORK LEVEL PROTECTION
FEATURES HOST-BASED INTRUSION PROVENSION SYSTEM (HIPS) AND FIREWALL NETWORK ATTACK BLOCKER IDENTIFIES AND RESPONDS TO SUSPICIOUS TRAFFIC BEHAVIOUR IDENTIFIES AND BLOCKS LINKS TO PHISHING SITES
13
CONTROLS WEB CONTROL APPLICATION CONTROL DEVICE CONTROL
Kaspersky’s control tools have become a key part of our protection methods. They have helped our customers implement security policies and are a significant differentiator for us. WEB CONTROLS ALLOW INAPPROPRIATE INTERNET CONTENT – INCLUDING SOCIAL NETWORKS, MUSIC, VIDEO ETC - TO BE BLOCKED OR LIMITED DURING BUSINESS HOURS. APPLICATION CONTROLS REGULATE AND CONTROL THE OPENING OF PROGRAMS ON INDIVIDUAL VIRTUAL MACHINES. DEVICE CONTROLS PERMIT OR RESTRICT THE USE OF REMOVABLE DEVICES, INCLUDING EXTERNAL DRIVES, PRINTERS, CDS/DVDS, WI-FI OR BLUETOOTH. DEVICE CONTROL
14
MANAGEMENT - KASPERSKY SECURITY CENTER
SINGLE INTUITIVE CONSOLE PHYSICAL, VIRTUAL AND MOBILE ENVIRONMENT MANAGED TOGETHER COMBINED VIRTUAL AND PHYSICAL MACHINE ADMINISTRATION AND REPORTING ‘SINGLE-PANE” APPROACH CREATES EFFICIENCY & SAVINGS FOR STRETCHED IT RESOURCES SCALABLE TO THE MOST COMPLEX ENTERPRISE ENVIRONMENTS
15
MICROSOFT HYPER-V AND CITRIX XEN SUPPORT
A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS KEY SUPPORTED FEATURES: DYNAMIC MEMORY CLUSTER SHARED VOLUMES LIVE BACKUP KEY SUPPORTED FEATURES: DYNAMIC MEMORY CONTROL VM PROTECTION & RECOVERY (VMPR) XENMOTION (LIVE MIGRATION) MULTI-STREAM ICA CITRIX RECEIVER PERSONAL VDISK
16
FLEXIBLE LICENSING Choose between “Per-machine” or “Per-core”
‘PER MACHINE’ –BASED ON MAXIMUM NUMBER OF ACTIVATED VIRTUAL MACHINES RUNNING CONCURRENTLY ‘PER CORE’ – COVERS ALL HARDWARE CORES ACROSS THE ORGANIZATION /DATA CENTER. ‘PER CORE’ - IDEAL FOR INFRASTRUCTURE AS A SERVICE (IAAS), WHERE VM COUNT FLUCTUATES A SINGLE LICENCE COVERS BOTH HYPER-V, XEN AND VMWARE (AGENTLESS) PLATFORMS
17
FLEXIBLE LICENSING - HOW IT WORKS
A SINGLE LICENSE COVERS LIGHT AGENT FOR EITHER OR BOTH PLATFORMS PER- CORE PER- MACHINE Virtual Servers and Workstations BAND: 1+ CORE KEY FILE: 1 TERM: 1, 2, 3 YEARS BAND: 1+ SERVERS | 10+ WORKSTATIONS KEY FILE: 1 TERM: 1, 2, 3 YEARS EACH APPROACH APPLIES TO: BASE EDUCATIONAL RENEWAL PUBLIC SECTOR CROSS-GRADE GOVERNMENTAL
18
KSV | LIGHT AGENT IS: SIMPLIFIED MANAGEMENT PERFORMANCE
ADVANCED FILE LEVEL PROTECTION NETWORK PROTECTION VIRTUAL MACHINE CONTROLS
19
KASPERSKY SECURITY FOR VIRTUALIZATION - LIGHT AGENT
PROVIDES OUTSTANDING PROTECTION AND CONTROLS FOR HYPER-V AND XEN PLATFORMS AT FILE AND NETWORK LEVEL, WITHOUT COMPROMISING PERFORMANCE.
21
Thank you! Contact Kaspersky or your preferred reseller for more information on Kaspersky’s virtualization security options
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.