The Perimeter Security Retreat: Fall Back, Fall Back to the Server
-
Upload
rahul-neel-mani -
Category
Technology
-
view
318 -
download
0
Transcript of The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Copyright 2016 Trend Micro Inc.
Bill McGee, SVP & General Manager, Cloud and Data Center Security
February 25, 2016
The Perimeter Security Retreat:Fall Back, Fall Back to the Server
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.2
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.3
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.4
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.5
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.6
1. Notificator. Retrieved from http://gizmodo.com/5254222/olde-timey-notificator-machine-twitters-like-its-1935
2. The Main Gate to Ninomaru Palace. Retrieved from http://en.wikipedia.org/wiki/Nij%C5%8D_Castle
3. Present plan of Nijo Castle. Retrieved from:http://en.wikipedia.org/wiki/Nij%C5%8D_Castle
4. Inner Walls and Moat of Nijo Castle. Rerieved from http://en.wikipedia.org/wiki/Nij%C5%8D_Castle
5. Nightingale Floor,. Retrieved from http://static.panoramio.com/photos/large/24443642.jpg
References
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.7
PhysicalServers
Journey to the cloud is different for every
customerPublicCloud
Virtual Servers
Virtual Desktops
Hybrid Environments
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.8
Cloud Security Challenges
Agility
CompliancePurchasing
Visibility
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.9
Firewall IPS
On-premises
LoadBalancer
WebTier
AppTier
DBTier
Traditional on-premises securityApplied at the perimeter
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.10
Build a workload-centric security strategy
DB Services
WebTier
in the cloud
AppTier
in the cloud
ElasticLoad
Balancer
WebTier
AppTier
Network &SecurityGroups
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.11
Best Practices for Securing AWS Workloads*
• Understand Your Shared Responsibilities • Get Visibility of Cloud-based Workloads• Bake Security Into Workloads from
Development• Adopt a "No Patch" Strategy for Live
Environments• Use AWS Security Groups but Leverage a
Third-Party Firewall for Advanced Functionality• Adopt a Workload-Centric Security Strategy
* Source: Gartner research note – Best practices for securing workloads in Amazon Web Services, April 2015
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.12
All in a single platform
Deep Security delivers
Intrusion Detection & Prevention
DevOps friendly Security
Virtual PatchingAdvanced Security Functionality
Actionable Insight
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.13
Deep Security - Optimized for the Cloud
Deep Security can secure cloud and hybrid deployments with a single platform
Seamless integration with leading cloud providers:
• Auto-detect instances and rapidly protect them
• Fully scriptable, including tools to automate provisioning and set up
• Host-based protection so security isn’t a bottleneck
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.14
Trend Micro Deep Security
Anti-malware
Integrity Monitoring
Intrusion Prevention
Log Inspection
Web Reputation
Host Firewall
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.15
Ready & optimized for the cloud
Proven security for virtualized, converged and
hyper-converged environments
+
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.16
SymantecIntel
Other
30.3%
Sources: 1. IDC Tech Spotlight: “Server Security: Virtualization & Cloud Changes Everything” January 2016;
Protecting more servers than anyone else
Market leader in server security for the 6th straight year!1
Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.17