Security Designed for the Software-Defined
Data Center
3/14/2014 Confidential | Copyright 2013 Trend Micro Inc.
Bill McGee
SVP and General Manager, Cloud and Data Center Security
Trend Micro
March 13, 2014
Copyright 2014 Trend Micro Inc.
2
Have you simply
“lifted-and- shifted”
your traditional security to
your software-defined
data center?
Copyright 2014 Trend Micro Inc.
3
Many organizations are experiencing the following…
• Minutes to deploy a server…weeks to secure it
• Virtually scale beyond physical limits… until you hit
your security limit
• Servers that share resources…security that consumes it
Attackers
Potential Risks
• Vulnerability in server exploited
to introduce malicious code
• Company must restrict
access to certain applications
• Admin makes changes to
known good configuration
• Hacker attempts a SQL
injection attack
• Brute force authentication
attack is executed
Software-defined data center changes the game
The opportunity:
Automate and
optimize security as
part of your data
center operations
Copyright 2014 Trend Micro Inc. 5
Security principles remain the same;
APPROACH to security must change
CONTEXT Workload and application-aware
SOFTWARE Security that evolves with the data center
PLATFORM Single platform for data center and cloudSiloed
Generic
Hardware
ADAPTIVE Intelligent, dynamic policy enforcement
Automated provisioning specific to platform
Static
3/14/2014Copyright 2014 Trend Micro Inc. 6
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 7
Extend to cloud with confidence
Provisioning securely within a dynamic data center
How do you:
• Secure the VM the moment it is provisioned?
• Apply the right policies to that VM?
• Reduce the time to provision without
compromising on security?
• Securely bring up/down/move your VMs?
Copyright 2014 Trend Micro Inc. 8
Provisioning
Infrastructure
vCenter, AD,
vCloud and
AWS
SAP
Exchange
Servers
Oracle
Web
Servers
Web
Server
Automate security as part of your operations
• Gain visibility into environment using
vCenter and vCloud Director integration
• Recommend and apply policies
automatically - specific to your data
center
• Automatically scale up and
down as required—with no
security gaps
19
Rules
15
Rules
73
Rules
8
Rules
28
Rules
Copyright 2014 Trend Micro Inc. 9
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 11
Extend to cloud with confidence
Management Challenge: Keeping up-to-date
How do you:
• Quickly and easily identify an issue?
• Keep up to date with patches?
• Manage multiple controls as you execute your
strategy for your data center and cloud?
Copyright 2014 Trend Micro Inc. 12
Protect even before you patch
• Protect against
vulnerability exploits
before patches available
• Save money avoiding
costly emergency patching
• Patch at your convenience
Vulnerability Disclosed or
Exploit Available
Patch
Available
Complete
Deployment
Test
Soak
Exposure
Begin
Deployment
PatchedTrend Micro Virtual Patching
Copyright 2014 Trend Micro Inc. 14
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 15
Extend to cloud with confidence
Optimized for your virtual environments
Network Usage
Scan Speed
CPU/Memory Usage
IOPS
Storage
ESXi
SAN
Copyright 2014 Trend Micro Inc. 17
Proven impact on data center resources
18
Scan
Cache
*All results based on internal testing using VMware View simulators
Up to 20X Faster*
Full Scans
Up to 5X Faster
Realtime Scans
Up to 2X Faster
VDI Login
Copyright 2014 Trend Micro Inc. 18
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimize data center resources
Copyright 2014 Trend Micro Inc. 19
Extend to external or public cloud with confidence
Public Cloud: Affects every organization
Public cloud extension of Private Cloud by I.T. (Bursting)
Business groups Bypass IT to use Public Cloud
Private Cloud forced to take on attributes of
Public Cloud (ITaaS)
Copyright
2013 Trend20
Security in the cloud is a Shared Responsibility
Partner Eco-System
• Operating Systems
• Application
• Security Groups
• OS Firewalls
• Anti-Virus
• Account Management
• Storage Encryption
• Facilities
• Physical Security
• Physical Infrastructure
• Virtualized Infrastructure
Customer
Domain
AWSDomain
Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Edge
Locations
Availability Zones
Regions
Enterprise Applications
Enterprise Operation Systems
Cloud Deployment Dynamics
Instance Awareness
• Dynamic real-time security
visibility and response
Complexity
• Supporting multi-region
and global deployments
Scale & Automation
• Elastic services and
applications managed with
new tools Data Protection
• Protection of all data across
boot & data volumes
Purchasing
• Ability to purchase
security aligned to cloud
models
Common Management & Reporting
Security platform for the modern data center
3/14/2014Copyright 2014 Trend Micro Inc. 25
Data Center
Physical Virtual Private Cloud Public Cloud
• Address security across ALL your environments
• Comprehensive security to address varying risk
Log
Inspection
Anti-
Malware
Intrusion
Prevention
Host
Firewall
Integrity
Monitoring
100% of the
top 10 automotive
companies.
96% of the top
50 global
corporations.
100% of the
top 10 telecom
companies.
80% of the top
10 banks.
90% of the top
10 oil companies.
Global Threat Intelligence
New malware every ½ second
CEO
Founded
Headquarters
Employees
Offices
2012 Sales
Eva Chen
1988, United States
Tokyo, Japan
5,137
36
$1.2B USD
A world safe for exchanging
digital information
Copyright 2014 Trend Micro Inc. 26
Thank you!
Copyright 2014 Trend Micro Inc.

More Related Content

PDF
The 7 Rules of IT Disaster Recovery by Acronis
PDF
Cloud security: Accelerating cloud adoption
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PPTX
Security As A Service In Cloud(SECaaS)
PPTX
Outpost24 webinar : how to secure your data in the cloud - 06-2018
PDF
Cloud university intel security
PPTX
Endpoint Protection as a Service (EPaaS)
PDF
Cloud security design considerations
The 7 Rules of IT Disaster Recovery by Acronis
Cloud security: Accelerating cloud adoption
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Security As A Service In Cloud(SECaaS)
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Cloud university intel security
Endpoint Protection as a Service (EPaaS)
Cloud security design considerations

What's hot (19)

PDF
Cloud Security Demystified
PPT
Cloud Security
PDF
Secaa s cat_10_network_security_implementation_guidance
PDF
Migrating to the Cloud: Lessons Learned from Federal Agencies
PDF
Modern Security for the Modern Data Center
PDF
introduction to Azure Sentinel
PDF
Addressing the Cyber-Security Landscape
PPTX
cloud security ppt
PPTX
2nd Anniversary Datacomm Cloud Business- Azure Stack
PPTX
Introducing Acronis Backup as a Service
PPTX
Gitex journey to the cloud
PDF
Cloud Security & Cloud Encryption Explained
PDF
CipherGraph Cloud VPN
PDF
MT17_Building Integrated and Secure Networks with limited IT Support
PDF
CipherGraph Networks: Introduction
PDF
Cloud security
PPTX
4.2.cloud storage
PPTX
Security and governance in the cloud
PDF
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Cloud Security Demystified
Cloud Security
Secaa s cat_10_network_security_implementation_guidance
Migrating to the Cloud: Lessons Learned from Federal Agencies
Modern Security for the Modern Data Center
introduction to Azure Sentinel
Addressing the Cyber-Security Landscape
cloud security ppt
2nd Anniversary Datacomm Cloud Business- Azure Stack
Introducing Acronis Backup as a Service
Gitex journey to the cloud
Cloud Security & Cloud Encryption Explained
CipherGraph Cloud VPN
MT17_Building Integrated and Secure Networks with limited IT Support
CipherGraph Networks: Introduction
Cloud security
4.2.cloud storage
Security and governance in the cloud
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Ad

Viewers also liked (18)

PDF
Debugging 2013- Sune Vuorela
PDF
Debugging 2013- Michael Rasmussen
PPTX
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
PDF
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
PDF
Debugging 2013- Jesper Brouer
PPTX
Workpoint: Kundetilpassede SharePoint-løsninger
PPTX
Digital project management - Magnus Holmlid, Visuell Planering
PPTX
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
PDF
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
PPTX
Thomas Hansen - information management
PPTX
Dansk projektledelse: IPMA certificering af projektledere
PPTX
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
PPTX
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
PDF
Pitch slides datacenter 2014 færdige
PPTX
Dit CV din fremtid
PDF
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
PPTX
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
PDF
Agenda rum 204 2014
Debugging 2013- Sune Vuorela
Debugging 2013- Michael Rasmussen
PMO, processer og Antura Projects i harmoni!, Christina Sejr Pedersen
Sådan skaber projektledelse værdi, Dansk Projektledelse, Morten Fangel
Debugging 2013- Jesper Brouer
Workpoint: Kundetilpassede SharePoint-løsninger
Digital project management - Magnus Holmlid, Visuell Planering
Insight live om IT-sikkerhed - Thomas Lund-Sørensen
Modarbejdere eller medarbejdere? - Annette Franck, Teknologisk Institut
Thomas Hansen - information management
Dansk projektledelse: IPMA certificering af projektledere
Den agile Prince – konflikt eller gevinst? - Jonas Högstrand, Metier
Syddansk Universitet:Master i projektledelse er en 2-årig forskningsbaseret e...
Pitch slides datacenter 2014 færdige
Dit CV din fremtid
Mikkel Munk Quist Andersen: Gennemgang af Ingeniørens profilanalyse 2014
Ulla Plüger Michelsen - Rekuttering og branding forankret i virksomhedens kul...
Agenda rum 204 2014
Ad

Similar to Datacenter 2014: Trend Micro - Bill MCGee (20)

PDF
TrendMicro - Security Designed for the Software-Defined Data Center
PDF
Security Considerations When Using Cloud Infrastructure Services.pdf
PDF
Cw13 securing your journey to the cloud by rami naccache-trend micro
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
Rik Ferguson
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
Security Building Blocks of the IBM Cloud Computing Reference Architecture
PDF
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
PPTX
CSO CXO Series Breakfast
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
PPTX
cloud computer security fundamentals Unit-5.pptx
PPTX
ShareResponsibilityModel.pptx
PDF
110307 cloud security requirements gourley
PPTX
chapitre1-cloud security basics-23 (1).pptx
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
BT Cloud Enterprise Service Store - Rob Rowlingson
TrendMicro - Security Designed for the Software-Defined Data Center
Security Considerations When Using Cloud Infrastructure Services.pdf
Cw13 securing your journey to the cloud by rami naccache-trend micro
I am sharing 'Unit-2' with youuuuuu.PPTX
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
CSS 17: NYC - Realities of Security in the Cloud
Rik Ferguson
CSS17: Atlanta - Realities of Security in the Cloud
Security Building Blocks of the IBM Cloud Computing Reference Architecture
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
CSO CXO Series Breakfast
I am sharing 'unit 4' with youuuuuu.PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
cloud computer security fundamentals Unit-5.pptx
ShareResponsibilityModel.pptx
110307 cloud security requirements gourley
chapitre1-cloud security basics-23 (1).pptx
Effectively and Securely Using the Cloud Computing Paradigm
BT Cloud Enterprise Service Store - Rob Rowlingson

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPT
What is a Computer? Input Devices /output devices
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Five Habits of High-Impact Board Members
DOCX
search engine optimization ppt fir known well about this
Architecture types and enterprise applications.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Build Your First AI Agent with UiPath.pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Improvisation in detection of pomegranate leaf disease using transfer learni...
What is a Computer? Input Devices /output devices
Microsoft Excel 365/2024 Beginner's training
sbt 2.0: go big (Scala Days 2025 edition)
Taming the Chaos: How to Turn Unstructured Data into Decisions
1 - Historical Antecedents, Social Consideration.pdf
Custom Battery Pack Design Considerations for Performance and Safety
Module 1.ppt Iot fundamentals and Architecture
The influence of sentiment analysis in enhancing early warning system model f...
Chapter 5: Probability Theory and Statistics
Developing a website for English-speaking practice to English as a foreign la...
sustainability-14-14877-v2.pddhzftheheeeee
Flame analysis and combustion estimation using large language and vision assi...
A review of recent deep learning applications in wood surface defect identifi...
Five Habits of High-Impact Board Members
search engine optimization ppt fir known well about this

Datacenter 2014: Trend Micro - Bill MCGee

  • 1. Security Designed for the Software-Defined Data Center 3/14/2014 Confidential | Copyright 2013 Trend Micro Inc. Bill McGee SVP and General Manager, Cloud and Data Center Security Trend Micro March 13, 2014
  • 2. Copyright 2014 Trend Micro Inc. 2 Have you simply “lifted-and- shifted” your traditional security to your software-defined data center?
  • 3. Copyright 2014 Trend Micro Inc. 3 Many organizations are experiencing the following… • Minutes to deploy a server…weeks to secure it • Virtually scale beyond physical limits… until you hit your security limit • Servers that share resources…security that consumes it
  • 4. Attackers Potential Risks • Vulnerability in server exploited to introduce malicious code • Company must restrict access to certain applications • Admin makes changes to known good configuration • Hacker attempts a SQL injection attack • Brute force authentication attack is executed
  • 5. Software-defined data center changes the game The opportunity: Automate and optimize security as part of your data center operations Copyright 2014 Trend Micro Inc. 5
  • 6. Security principles remain the same; APPROACH to security must change CONTEXT Workload and application-aware SOFTWARE Security that evolves with the data center PLATFORM Single platform for data center and cloudSiloed Generic Hardware ADAPTIVE Intelligent, dynamic policy enforcement Automated provisioning specific to platform Static 3/14/2014Copyright 2014 Trend Micro Inc. 6
  • 7. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 7 Extend to cloud with confidence
  • 8. Provisioning securely within a dynamic data center How do you: • Secure the VM the moment it is provisioned? • Apply the right policies to that VM? • Reduce the time to provision without compromising on security? • Securely bring up/down/move your VMs? Copyright 2014 Trend Micro Inc. 8
  • 9. Provisioning Infrastructure vCenter, AD, vCloud and AWS SAP Exchange Servers Oracle Web Servers Web Server Automate security as part of your operations • Gain visibility into environment using vCenter and vCloud Director integration • Recommend and apply policies automatically - specific to your data center • Automatically scale up and down as required—with no security gaps 19 Rules 15 Rules 73 Rules 8 Rules 28 Rules Copyright 2014 Trend Micro Inc. 9
  • 10. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 11 Extend to cloud with confidence
  • 11. Management Challenge: Keeping up-to-date How do you: • Quickly and easily identify an issue? • Keep up to date with patches? • Manage multiple controls as you execute your strategy for your data center and cloud? Copyright 2014 Trend Micro Inc. 12
  • 12. Protect even before you patch • Protect against vulnerability exploits before patches available • Save money avoiding costly emergency patching • Patch at your convenience Vulnerability Disclosed or Exploit Available Patch Available Complete Deployment Test Soak Exposure Begin Deployment PatchedTrend Micro Virtual Patching Copyright 2014 Trend Micro Inc. 14
  • 13. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 15 Extend to cloud with confidence
  • 14. Optimized for your virtual environments Network Usage Scan Speed CPU/Memory Usage IOPS Storage ESXi SAN Copyright 2014 Trend Micro Inc. 17
  • 15. Proven impact on data center resources 18 Scan Cache *All results based on internal testing using VMware View simulators Up to 20X Faster* Full Scans Up to 5X Faster Realtime Scans Up to 2X Faster VDI Login Copyright 2014 Trend Micro Inc. 18
  • 16. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimize data center resources Copyright 2014 Trend Micro Inc. 19 Extend to external or public cloud with confidence
  • 17. Public Cloud: Affects every organization Public cloud extension of Private Cloud by I.T. (Bursting) Business groups Bypass IT to use Public Cloud Private Cloud forced to take on attributes of Public Cloud (ITaaS) Copyright 2013 Trend20
  • 18. Security in the cloud is a Shared Responsibility Partner Eco-System • Operating Systems • Application • Security Groups • OS Firewalls • Anti-Virus • Account Management • Storage Encryption • Facilities • Physical Security • Physical Infrastructure • Virtualized Infrastructure Customer Domain AWSDomain Foundation Services Compute Storage Database Networking AWS Global Infrastructure Edge Locations Availability Zones Regions Enterprise Applications Enterprise Operation Systems
  • 19. Cloud Deployment Dynamics Instance Awareness • Dynamic real-time security visibility and response Complexity • Supporting multi-region and global deployments Scale & Automation • Elastic services and applications managed with new tools Data Protection • Protection of all data across boot & data volumes Purchasing • Ability to purchase security aligned to cloud models
  • 20. Common Management & Reporting Security platform for the modern data center 3/14/2014Copyright 2014 Trend Micro Inc. 25 Data Center Physical Virtual Private Cloud Public Cloud • Address security across ALL your environments • Comprehensive security to address varying risk Log Inspection Anti- Malware Intrusion Prevention Host Firewall Integrity Monitoring
  • 21. 100% of the top 10 automotive companies. 96% of the top 50 global corporations. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. Global Threat Intelligence New malware every ½ second CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United States Tokyo, Japan 5,137 36 $1.2B USD A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 26
  • 22. Thank you! Copyright 2014 Trend Micro Inc.