+ All Categories
Home > Documents > Extending Traditional Security to VDI

Extending Traditional Security to VDI

Date post: 02-Jun-2018
Category:
Upload: puscul
View: 217 times
Download: 0 times
Share this document with a friend
5
A C Sec Pme ExtEnding traditional SEcurity to Vdi ARE YOUR VIRTUALIZATION EFFORTS HURTING YOUR SECURITY?
Transcript

8/11/2019 Extending Traditional Security to VDI

http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 1/5

A C Sec Pme

ExtEnding traditional SEcurity to Vdi

ARE YOUR

VIRTUALIZATIONEFFORTS HURTING YOURSECURITY?

8/11/2019 Extending Traditional Security to VDI

http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 2/5

8/11/2019 Extending Traditional Security to VDI

http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 3/5ExtEnding trAditionAl SECurity to Vdi 2

Security Risks of Extending Traditional Security

oe f he ce bees f mpeme Vdi s he ab qck eeaea va eskp mae sea f sa each sace fm scach. if itepames smp ee aa sec va eskps, pcaemaes w evab pae he sec sfwae ae f ssemscas a he same me, ea a bawh pbem kw as “escece” a “sec sm.”

Cmm b mppe wk-as ce amz sab avssca a pa. Whe it amsas sabe sec fcs ahs eve, he ae, effec, es eskp sec ewk ewasa s eec ssems (idSs).

i sch a sa, he peceee spee b whch cbecmas ceaemawae—3.5 ew heas eve sec—ee va eskps veabe aacks.

uke vaze seves, va eskps cmpse a bae aack sfacebecase each sace s a pea e p. use behavs sch asscmae wa pams a cmes, s he Web, acck ks hep. Wh pec f eve a sma am f me,

VM maes ca avee ce heas cpae ewks.

Zero-Day Exploits and the “Zero-Day Effect”

Ze-a eps ae epe he w b cbecmas se aeeaacks ep pache kw sfwae veabes. rescece wk-as ha ff pec ea sec fce itamsas effecve face he same ze-a sks eve f paches aeaea avaabe a espe ep sec pcs.

We se appcas fm Mcsf, Abe, a eve Appe have a beef ca sfwae veabes ha ae cca cbecme aacksbecase hese aw amac cmma eec.4

Customized Highly Targeted Attacks

Avace pesse heas (APts) ae cmpaes a azas e sea cea fma. these campas feqe be whsca eee aacks as mae as se csmze emas whep aachmes.

Afe m APts f e mh, te Mc f ha he msepe Microsoft Ofce sfwae was Microsoft Word (see Fe 2).5 Fheme, bh eave ew (e.., CVE-2012-0158)6 a (e..,CVE-2010-3333)7  veabes have bee eveae.

Eps f veabes  Adobe Acrobat Reader a Flash Player have asbee se vas APt campas sch as lurid,8 SyKiPot,9 a ixESHE.10

4 hp://b.emc.cm/2011--evew-eps-a-veabes/5 hp://b.emc.cm/sapsh-f-ep-cmes-f-ap-2012/6 hp://www.cve.me./c-b/cveame.c?ame=CVE-2012-01587 hp://cve.me./c-b/cveame.c?ame=CVE-2010-33338 hp://b.emc.cm/e-mc-epses--ap/9 hp://b.emc.cm/he-skp-campa/10 hp://b.emc.cm/ak-a-be--f-eshe/

“With VDI, numerous desktops share

the host’s hardware resources, often at

a ratio of 60 to 1 or higher.”

— Trend Micro,

“Securing Your

Virtual DesktopInfrastructure”

Figure 2. Ms epe Mcsfsfwae b aee aacks Ap 2012

8/11/2019 Extending Traditional Security to VDI

http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 4/5ExtEnding trAditionAl SECurity to Vdi 3

Figure 3. Sec sks ee phsca sec Vdi pses

Responding to VDI Security Challenges with Agentless

Security and Vulnerability Shielding

F eepses eaze he bees Vdi ffes, it amsas ms sesec s mpeme pces ha ca esp he qe secchaees a heas ha es vaze evmes.

Eepses ha have be vaz seves a fesee vaza be a ce it sae sh aea cse ee seve vazasaees Vdi. Specca, Vdi-awae sec sfwae ha eaes we

wh hpevss aws it amsas fee p he space each vaeskp pevs ake p b sec aes.

Trend Micro™ Deep Security™, f sace, emps aeess echhh a hweh ve each va eskp se b he vazapafm chesae saee sec scas a paes sea feq a sepaae aa sec ae each va eskp. thspecs va eskps he ms pma mae aas he skssae he pevs sec whe pesev va eskp esces.ths aeess ech pmzes pefmace a ceases VM es.Meve, es ee a aa sec ae each VM, as eveaes he ve se vaza.

Fheme, eepses ha se VM-awae sec sfwae sch as Deep

Security ca as ake avaae f veab she, aka “vapach,” aess kw pach maaeme sses a, me specca,he hea ze-as aacks pse.11 P sfwae hes wh veabshes a he ewk eve eabes eepses efce a pacvepec he ewks eve befe a pach s evepe b he affecesfwae’s ve.

11 hp://www.emc.cm/c-ce/s/pfs/bsess/whe-papes/wp_veab-she-pme.pf

Only extend traditional security to VDI if

your security software can:

• Identify whether the agent is

running on physical or virtual

endpoints (i.e., a capability called

“virtualization awareness”)

• Serialize scans and updates to

prevent resource contention

problems

8/11/2019 Extending Traditional Security to VDI

http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 5/5

©2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-bal

logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product

or company names may be trademarks or registered trademarks of their owners.

TRENDLABSSM

TrendLabs is a multinational research, development, and support

center with an extensive regional presence committed to 24 x 7 threat

surveillance, attack prevention, and timely and seamless solutions

delivery. With more than 1,000 threat experts and support engineersdeployed round-the-clock in labs located around the globe, TrendLabs

enables Trend Micro to continuously monitor the threat landscape

across the globe; deliver real-time data to detect, to preempt, and to

eliminate threats; research on and analyze technologies to combat new

threats; respond in real time to targeted threats; and help customers

worldwide minimize damage, reduce costs, and ensure business

continuity.

TREND MICRO™

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud

security leader, creates a world safe for exchanging digital information

with its Internet content security and threat management solutions for

businesses and consumers. A pioneer in server security with over

20 years’ experience, we deliver top-ranked client, server and cloud-

based security that ts our customers’ and partners’ needs, stops

new threats faster, and protects data in physical, virtualized and

cloud environments. Powered by the industry-leading Trend Micro™

Smart Protection Network™ cloud computing security infrastructure,

our products and services stop threats where they emerge—from the

Internet. They are supported by 1,000+ threat intelligence experts

around the globe.


Recommended