Security for the Virtual Environment
-
Upload
ipexpo-online -
Category
Technology
-
view
332 -
download
0
Transcript of Security for the Virtual Environment
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Check Point Simplifies Cloud Security
22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Agenda
1 Customer Drivers and Challenges
4 Packaging and Software Blades
2 Solution Overview
3 Virtualization Use Scenarios
5 Summary
33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Server Virtualization Market Trends
► By 2012 half of the enterprise workload will be virtualized
► 60% of IT Managers claim securing virtual machines is difficult
Organizations with virtualized environments are asking for a simple solution to secure the
Virtual Machines.
44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
The Drivers For Change
Reduce operational costs Reusing and leveraging
investment in technology Maximizing resources Reduce Datacenter footprint
Increased flexibility Speed of deployment
Higher utilization of resources Greener computing Reduced power consumption
Maximizing Investment
55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtualization Security Challenges
Inspect traffic between Virtual Machines (VMs)Inspect traffic between Virtual Machines (VMs)
Secure new Virtual Machines automatically
Secure new Virtual Machines automatically
Protection from external threats
Protection from external threats
Security Challenges
in Virtual Environments
66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Hypervisor
VM VMVM
Virtualization Security Challenges
Security Challenges
in Virtual Environments
77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtualization Security Challenges
Security Challenges in Virtual Environments (Data Center/Cloud)
Maintain zero-downtime during Virtual Machines live migration Maintain zero-downtime during Virtual Machines live migration
Ensure Security in dynamic environments
Ensure Security in dynamic environments
88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Introducing Check PointSecurity Gateway Virtual Edition (VE)
Unified Management for Physical and Virtual
Unified Management for Physical and Virtual
Best Virtual Security Gateway with the Software Blade Architecture
Best Virtual Security Gateway with the Software Blade Architecture
Securing the Virtual Machines Securing the Virtual Machines
Check Point Delivers Plug and Play Security for Public and Private Clouds
Starting at $2,000
Software Blades
Check Point Security Gateway
Virtual Edition
99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Secure the Virtual Infrastructure
Inter-VM Traffic Inspection Protects Virtual Machines Inter-VM Traffic Inspection Protects Virtual Machines
►Seamless security within the Hypervisor
►Integration with VMsafe technology
►Audit configuration changes in the virtualization system
►Seamless security within the Hypervisor
►Integration with VMsafe technology
►Audit configuration changes in the virtualization system
VMVM VE
Hypervisor ConnectorHypervisor
1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtual Edition Features
Hypervisor
► Include Firewall, IPS, VPN and all other Software Blades.
► Flexible and extensible security
Best Security
Antivirus
IPS
VPN
Firewall
VM VM VE
Hypervisor Connector
Software Blades
Check Point Security Gateway Virtual Edition (VE)
1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtual Edition Features
Inspecting Inter-VM Traffic
VMs ProtectionVMs Protection
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Include Firewall, IPS, VPN and all other Software Blades.
► Flexible and extensible security
Best Security
Hypervisor
VM VM VE
Hypervisor Connector
VM VM
1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtual Edition Features
Securing Dynamic Environments
VMs ProtectionVMs Protection
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Include Firewall, IPS, VPN and all other Software Blades.
► Flexible and extensible security
Best Security
Hypervisor
VM VM VE
Hypervisor Connector
1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtual Edition Features
► Same management for Physical and Virtual
► Running the management blades on a Virtual Machine
► Same management for Physical and Virtual
► Running the management blades on a Virtual Machine
Unified Management
Unified Management
► Include Firewall, IPS, VPN and all other Software Blades.
► Flexible and extensible security
Best Security VMs ProtectionVMs Protection
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtual Edition Features
► Same management for Physical and Virtual
► Running the management blades on a Virtual Machine
► Same management for Physical and Virtual
► Running the management blades on a Virtual Machine
Unified Management
Unified Management
► Include Firewall, IPS, VPN and all other Software Blades.
► Flexible and extensible security
Best Security VMs ProtectionVMs Protection
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
► Plug and Play with no topology changes
► Securing new VMs automatically
► Zero-downtime during VMs live migration
Hypervisor
VM
Hypervisor Connector
VM
Virtualizing the Management Systems
1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Virtualized Security Scenarios
Office in a Box
Use Security Gateway Virtual Edition (VE) with firewall, IPS, VPN and Software Blade to secure your office networks and assets
VE
Hypervisor
Enterprise Security Gateways
Consolidate your Security Gateways deployment into a virtualized environment
VE
Hypervisor
VE VE
Secure the Virtual Environment
Use Security Gateway Virtual Edition to apply granular firewall and IPS policies for inter-VM traffic
Hypervisor
Hypervisor Connector
VE
1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Software Blades for Virtual Systems
+Additional Software
Blades can be added A-La-Carte
Optional
SGVExxxx
New containers for Security Gateway VE
Firewall with integrated Hypervisor protection
Based on number of physical cores
Firew
all
From $2000
1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Summary
Unified Management for Physical and Virtual
Unified Management for Physical and Virtual
Best Virtual Security Gateway with the Software Blade Architecture
Best Virtual Security Gateway with the Software Blade Architecture
Securing the Virtual Machines Securing the Virtual Machines
Check Point Delivers Plug and Play Security for Public and Private Clouds
Starting at $2,000
Software Blades
Check Point Security Gateway
Virtual Edition