SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Magic Words of VDI Security:
“Agentless” and “Aware”
David Girard, Senior Security Advisor – Trend Micro Canada


                                                     1




                                                             1
Virtualization Project                                            ?
Desktop       Server                            Cloud                    Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   2




                                                                                             2
Security Built for VMware
           The most comprehensive suite
                  of next-generation
           virtualization security solutions
Desktop      Server                           Cloud                      Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc.   3




                                                                                             3
Security Built for VMware

  IT Operations                  Security                                    Compliance



Consolidation rates        Protect data                                      Ensure
Operational efficiencies   & applications                                    compliance
Flexibility
Savings




                           10/4/2010   Copyright 2009 Trend Micro Inc.   4




                                                                                          4
Security Built for VMware

Desktop      Server                           Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc.   5




                                                                                            5
Key Issue:
Resource Contention

                                High impact : Employee’s arrival or schedule scans


 9:00am Scan
  Typical AV
   Console




 If several, or all, VMs start a full anti-malware scan at the same time, the underlying
 shared hardware will experience extreme load (memory, CPU, I/O), causing a
 slowdown of all virtual systems on the server.
 Large pattern file updates require significant memory and can impact, network and
 storage I/O resources.
                                Classification 10/4/2010   Copyright 2009 Trend Micro Inc.   6




                                                                                                 6
VDI Security option #1: OfficeScan
(First AV optimized for VDI)

           Trend Micro OfficeScan
           Protects virtual & physical endpoints
           • VDI Intelligence with VDI plug-in
           • Serializes updates and scans per VDI-host
           • Leverages base-images to further shorten scan times
           • Smart Scan limit Endpoints pattern updates since it is
             mostly in the cloud




                         10/4/2010   Copyright 2009 Trend Micro Inc.   7




                                                                           7
OfficeScan 10.5 has VDI-Intelligence


• Detects whether endpoints are physical or virtual
  – With VMware View
• Serializes updates and scans per VDI-host
  – Controls the number of concurrent scans and updates per VDI host
  – Maintains availability and performance of the VDI host
  – Faster than concurrent approach
• Leverages Base-Images to further shorten scan times
  – Pre-scans and white-lists VDI base-images
  – Prevents duplicate scanning of unchanged files on a VDI host
  – Further reduces impact on the VDI host



                                 Copyright 2009 Trend Micro Inc.




                                                                       8
OfficeScan 10.5 Integrates with vCenter




                    10/4/2010   Copyright 2009 Trend Micro Inc.   9




                                                                      9
CPU




      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 10




                                                                      10
CPU - Analysis
 • Only 10.5 can support 20+ desktop images with mixed user profile.
 • With no AV, average CPU utilization while 4 heavy and 16 light user
   script is running is 33%
 • With 10.5 with ALL 4 heavy and 16 light user machines scanning,
   CPU utilization is 41%. Very Impressive.
 • With powerful machines typically used in VDI environment CPU’s
   typically are not the breaking point.
 • With 20 desktop images, 10.5 adds marginal load to CPU where as
   other solutions can not even get to support baseline number of
   desktop images
 • With 10 desktop images, 10.5 adds only 11% CPU overhead
   compared to baseline (no AV and no scanning) versus Symantec
   which adds 29% CPU overhead , 10.1 which adds 50% CPU
   overhead and McAfee which is the worst which adds 83% CPU
   overhead
                          Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 11




                                                                                          11
IOPS (vDisk Utilization)




                  Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 12




                                                                                  12
IOPS - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has
   10.95 IOPS, Symantec has 9.02 IOPS and McAfee has
   whopping 22.39 IOPS
 • Trend Micro Office Scan 10.5 IOPS has small deviation of
   0.77 MB/s and 3.66 MB/s only from baseline and mixed
   20 user profile
 • Lets recap why 10.5 is so much better with IOPS
    • 10.5 Serializes updates and scans per VDI-host
    • Pre-scans and white-lists VDI base-images
    • Prevents duplicate scanning of unchanged files on a VDI host
                        Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 13




                                                                                        13
IOPS – How many Systems?

                                                                         • A VDI environment sized for 20
                                                                           desktop images with 4 heavy
                                                                           and 16 light users.
                                                                         • Keep IOPS between 6-8 and
                                                                           see how many desktop images
                                                                           can be supported with each AV
                                                                           deployment (Apples to Apples
                                                                           comparison)
                                                                         • All about return of investment

• If you deploy McAfee, you can deploy ONLY 2 desktop images in an
  environment which supports 20 images without AV
• If you deploy Symantec, you can deploy ONLY 4 desktop images in an
  environment which supports 20 images without AV
• If you deploy Trend 10.5, you can deploy ALL 20 desktop images
      Customers no longer have to choose
      between Security and Return On Investment
                              Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 14




                                                                                                            14
Memory




         Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 15




                                                                         15
Memory - Analysis
 • Only 10.5 can support 20+ desktop images with mixed
   user profile.
 • Automatic Pool of 20 desktop images without AV in
   Mixed user Profile is consuming around 7.74 GB of
   Active Memory
 • Trend Micro Office scan 10.5 is putting an overhead of
   only 1.32 GB in maximum VDI Density environment.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 16




                                                                                      16
Scan Time with 10.5




   VDI Profile                  Other AV Solution                                        Trend Micro 10.5

   Mixed Maximum High Density   Approx 1-2 Hours                                         16 Minutes
   VDI Pool(4H &16 L)



   Mixed Low Density VDI Pool   Approx. 27- 49 minutes                                   2 Minutes
   (1H & 3 L)
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 17




                                                                                                            17
Scan Time - Analysis
 • Trend Micro Office scan 10.5 is performing Approx. 15 -
   25 times better in Mixed Low Density VDI pool and 4 -8
   times better in Mixed Maximum High Density VDI pool.

 • Trend Micro office scan 10.5 with its Smart Scan and VDI
   aware capability is consuming remarkably less scan time
   than other AV solutions.




                      Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 18




                                                                                      18
VDI Security option #2:
Deep Security

            Trend Micro Deep Security
            Protects virtualized endpoints & servers
            • First agent-less anti-malware solution
            • Hypervisor-based introspection
            • Eliminates “AV storms”




                         10/4/2010   Copyright 2009 Trend Micro Inc. 19




                                                                          19
Security Built for VMware

Desktop      Server                          Cloud                     Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 20




                                                                                           20
Key Issue:
Resource Contention



 9:00am Scan
  Typical AV
   Console




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 21




                                                                                21
Key Issue:
Instant On Gaps



                                        Active, with
          Active                    Dormant security
                                    out-of-date




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 22




                                                                                   22
Key Issue:
Mixed Trust Level VMs




          ERP   Email               Web                    Test                    CRM




                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 23




                                                                                         23
Trend Micro Deep Security



 IDS / IPS                               Integrity                                       Log
                    Anti-Virus                                                                       Firewall
                                        Monitoring                                    Inspection




    Physical               Virtual                                             Cloud               Desktop/Laptop




Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0.
Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1


                                     10/4/2010   Copyright 2009 Trend Micro Inc. 24




                                                                                                                    24
Co-ordinated Approach
                              • Optimized protection
                              • Operational efficiency



Security virtual   Security
                                                                                       Agent-based
appliance            VM                                                                Security
  Efficiency                                                                            Protection
  Manageability                                                                         Mobility




                                      10/4/2010   Copyright 2009 Trend Micro Inc. 25




                                                                                                     25
Security Built for VMware

Desktop      Server                         Cloud                      Virtual Appliance




                      10/4/2010   Copyright 2009 Trend Micro Inc. 26




                                                                                           26
Issue #1:
Multi-tenancy




                Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 27




                                                                                27
Issue #2:
Data Access & Governance



                       10010011
                       01101100




                  10/4/2010   Copyright 2009 Trend Micro Inc. 28




                                                                   28
Issue #3:
Secure Storage Recycling


                               10011                                 10011
                               01110                                 01110
                               00101                                 00101




                   10/4/2010    Copyright 2009 Trend Micro Inc. 29




                                                                             29
Trend Micro Cloud Security
Solutions
Deep Security                 SecureCloud
• Anti-Virus                  • Encryption
• IDS/IPS                     • Policy-based key management
                              Private & Public
    • + Virtual Patching
    • + Web App Protection
                              Cloud Computing
                                       Flexibility & Confidence

• File Integrity Monitoring
• Log Inspection
• Firewall




                              10/4/2010   Copyright 2009 Trend Micro Inc. 30




                                                                               30
Security Built for VMware

Desktop       Server                            Cloud                   Virtual Appliance




                       10/4/2010   Copyright 2009 Trend Micro Inc. 31




                                                                                            31
Virtual Appliances
                                                                                 Virtual Appliance

       Application


       Operating
        System



       Hypervisor                                                                  Hypervisor



                     Hardware                                                                 Hardware




                                10/4/2010   Copyright 2009 Trend Micro Inc. 32




                                                                                                         32
Virtual Appliance Benefits

 Virtual Appliance
                        Costs
                                                                                70%
                        IT Flexibility
                                                                                 Per-User
                        Improve Business                                       Cost of Virtual
                        Continuity                                              Appliance




A solution that scale over time. Don’t need to buy a bigger physical
appliance. Just add more resources. Don’t need to buy an extra box
for pre-production environment, just fire a new VM or install on any
box that can run CentOS or Red Hat.

                              10/4/2010   Copyright 2009 Trend Micro Inc. 33




                                                                                                 33
Trend Micro
Security Virtual Appliances
  Virtual Appliance


                          Web Security
                          Email Security




Other Trend Micro Product are offered as a virtual appliance :
-Data Loss Prevention Server
-Threat Discovery Virtual Appliance (part of Threat Management Services (TMS)




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 34




                                                                                  34
Security Built for VMware
Deep Security    Deep Security                  Deep Security                     InterScan Web Security
     OR                                            AND                             InterScan Messaging
 OfficeScan                                     SecureCloud                              Security


  Desktop           Server                                Cloud                       Virtual Appliance*




                                             Encryption of the                      *VMware Certified
                                             virtual file system                       Appliances




                                 10/4/2010   Copyright 2009 Trend Micro Inc. 35




                                                                                                           35
Security Built for VMware




          10/4/2010   Copyright 2009 Trend Micro Inc. 36




                                                           36
Trend Micro
Global leader in Internet content security and threat management.
Catalyst for faster adoption of virtualization.
Our Vision:
A world safe for exchanging digital information

Founded        • United States in 1988

Headquarters • Tokyo, Japan
Offices        • 23 countries
Employees      • 4,350
Leadership     • US $1 Billion annual revenue
               • 3rd largest security company                                              1,000+ Threat Research Experts
                                                                                                  10 labs. 24x7 ops
               • “Global 100 Most Sustainable Corporations”                                Real-time alerts for new threats
               • Top 3 in Messaging, Web and Endpoint security
               • Leader in virtualization & cloud computing
               security




                                                    Copyright 2009 Trend Micro Inc.
                                                                                      37




                                                                                                                              37
Questions?




                           Thank you, merci
New Threats Informations                                                                           For more informations:
http://blog.trendmicro.com/                                                                        Technical:
                                                                                                   david_girard@trendmicro.com
                                                                                                   514-629-1680

         User group                                                                                Sales:
Groupe d’utilisateurs                                                                              Michel_bouasria@trendmicro.com
Trend Micro du Québec                                                                              514-653-2257
http://www.linkedin.com/groups?gid=2296257                                                         Jean_houle@trendmicro.com
                                                                                                   514 893-1512
                                   Classification 10/4/2010   Copyright 2009 Trend Micro Inc. 38




                                                                                                                                    38

Contenu connexe

Tendances

Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architecturesinovia
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for EndpointCheah Eng Soon
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCrowdStrike
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 

Tendances (20)

Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
CHFI v10
CHFI v10CHFI v10
CHFI v10
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Application Security
Application SecurityApplication Security
Application Security
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 

En vedette

Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3guest83fa4c
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaIan Lintner
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsDegrowth Conference
 
China fei
China feiChina fei
China feiincomas
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2candipartridge
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historiaHablaGuate
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationbigdavedev
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout1CloudRoad.com
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarismSusan Daniels
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Actionsoccrgrl62
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentationWendy Neave
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategiesguestbb440f9
 

En vedette (20)

Trend Micro Case Study
Trend Micro Case StudyTrend Micro Case Study
Trend Micro Case Study
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3Informazioni utili-e-hotel-consigliati-basilea-3
Informazioni utili-e-hotel-consigliati-basilea-3
 
Canadian Centre for Court Technology Presentation
Canadian Centre for Court Technology PresentationCanadian Centre for Court Technology Presentation
Canadian Centre for Court Technology Presentation
 
HTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA IowaHTML5 & CSS3 -- UPA Iowa
HTML5 & CSS3 -- UPA Iowa
 
Equitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist ContributionsEquitable, Ecological Degrowth; Feminist Contributions
Equitable, Ecological Degrowth; Feminist Contributions
 
16 abril
16 abril16 abril
16 abril
 
Festividades do meu país (Portugal)
Festividades do meu país  (Portugal)Festividades do meu país  (Portugal)
Festividades do meu país (Portugal)
 
China fei
China feiChina fei
China fei
 
Staff development invitation2
Staff development invitation2Staff development invitation2
Staff development invitation2
 
Lesson2 contar historia
Lesson2 contar historiaLesson2 contar historia
Lesson2 contar historia
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout#VMUGMTL - Xsigo Breakout
#VMUGMTL - Xsigo Breakout
 
Preventing plagiarism
Preventing plagiarismPreventing plagiarism
Preventing plagiarism
 
...
......
...
 
Final Presentation for Teacher in Action
Final Presentation for Teacher in ActionFinal Presentation for Teacher in Action
Final Presentation for Teacher in Action
 
Av #2 windows messenger presentation
Av #2 windows messenger presentationAv #2 windows messenger presentation
Av #2 windows messenger presentation
 
3rd session reading strategies
3rd session reading strategies3rd session reading strategies
3rd session reading strategies
 
How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?
 

Similaire à TrendMicro

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWarencceconnect
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitJoan Tuls
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computingManas TI SA
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarMarkiting_be
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneUnidesk Corporation
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI SolutionsIBM Danmark
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategysolarisyougood
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsNovell
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualizationselghaly
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompDigicomp Academy AG
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeUnidesk Corporation
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft Singapore
 
VMware View 4
VMware View 4VMware View 4
VMware View 4netlogix
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0Zernike College
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of DesktopsDesktone
 

Similaire à TrendMicro (20)

Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
Presentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteitPresentaties seminar de virtuele realiteit
Presentaties seminar de virtuele realiteit
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Citrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminarCitrix XenDesktop 5.5 seminar
Citrix XenDesktop 5.5 seminar
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Sun/Oracle Desktop Virtualization
Sun/Oracle Desktop VirtualizationSun/Oracle Desktop Virtualization
Sun/Oracle Desktop Virtualization
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Vdi And Storage Deep Impact V1 0
Vdi And Storage   Deep Impact V1 0Vdi And Storage   Deep Impact V1 0
Vdi And Storage Deep Impact V1 0
 
VMware Dell řešení pro VDI
VMware Dell řešení pro VDIVMware Dell řešení pro VDI
VMware Dell řešení pro VDI
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
V mware view
V mware viewV mware view
V mware view
 

Plus de 1CloudRoad.com

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments1CloudRoad.com
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New1CloudRoad.com
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal1CloudRoad.com
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM1CloudRoad.com
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration1CloudRoad.com
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 34001CloudRoad.com
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout1CloudRoad.com
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout1CloudRoad.com
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software1CloudRoad.com
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software1CloudRoad.com
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation1CloudRoad.com
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure1CloudRoad.com
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation1CloudRoad.com
 

Plus de 1CloudRoad.com (19)

Enhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View DeploymentsEnhancing the User Experience for Multi-Pod VMware View Deployments
Enhancing the User Experience for Multi-Pod VMware View Deployments
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
VMware - VMUG Montreal
VMware - VMUG MontrealVMware - VMUG Montreal
VMware - VMUG Montreal
 
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRMFalconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
Falconstor - How It Supports P2V Machine Recovery & Integrates with VMware SRM
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400Breakout HP Discover - Session 3400
Breakout HP Discover - Session 3400
 
Virtensys
VirtensysVirtensys
Virtensys
 
#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout#VMUGMTL - Radware Breakout
#VMUGMTL - Radware Breakout
 
#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout#VMUGMTL DELL Breakout
#VMUGMTL DELL Breakout
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Controlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP SoftwareControlling Virtual Server Sprawl with HP Software
Controlling Virtual Server Sprawl with HP Software
 
Control Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP SoftwareControl Virtual Server Sprawl with HP Software
Control Virtual Server Sprawl with HP Software
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Enterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th GenerationEnterprise X-Architecture 5th Generation
Enterprise X-Architecture 5th Generation
 
Operating a World-Class Virtual Infrastructure
Operating a World-Class Virtual InfrastructureOperating a World-Class Virtual Infrastructure
Operating a World-Class Virtual Infrastructure
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

TrendMicro

  • 1. Magic Words of VDI Security: “Agentless” and “Aware” David Girard, Senior Security Advisor – Trend Micro Canada 1 1
  • 2. Virtualization Project ? Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 2 2
  • 3. Security Built for VMware The most comprehensive suite of next-generation virtualization security solutions Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 3 3
  • 4. Security Built for VMware IT Operations Security Compliance Consolidation rates Protect data Ensure Operational efficiencies & applications compliance Flexibility Savings 10/4/2010 Copyright 2009 Trend Micro Inc. 4 4
  • 5. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 5 5
  • 6. Key Issue: Resource Contention High impact : Employee’s arrival or schedule scans 9:00am Scan Typical AV Console If several, or all, VMs start a full anti-malware scan at the same time, the underlying shared hardware will experience extreme load (memory, CPU, I/O), causing a slowdown of all virtual systems on the server. Large pattern file updates require significant memory and can impact, network and storage I/O resources. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 6 6
  • 7. VDI Security option #1: OfficeScan (First AV optimized for VDI) Trend Micro OfficeScan Protects virtual & physical endpoints • VDI Intelligence with VDI plug-in • Serializes updates and scans per VDI-host • Leverages base-images to further shorten scan times • Smart Scan limit Endpoints pattern updates since it is mostly in the cloud 10/4/2010 Copyright 2009 Trend Micro Inc. 7 7
  • 8. OfficeScan 10.5 has VDI-Intelligence • Detects whether endpoints are physical or virtual – With VMware View • Serializes updates and scans per VDI-host – Controls the number of concurrent scans and updates per VDI host – Maintains availability and performance of the VDI host – Faster than concurrent approach • Leverages Base-Images to further shorten scan times – Pre-scans and white-lists VDI base-images – Prevents duplicate scanning of unchanged files on a VDI host – Further reduces impact on the VDI host Copyright 2009 Trend Micro Inc. 8
  • 9. OfficeScan 10.5 Integrates with vCenter 10/4/2010 Copyright 2009 Trend Micro Inc. 9 9
  • 10. CPU Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 10 10
  • 11. CPU - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With no AV, average CPU utilization while 4 heavy and 16 light user script is running is 33% • With 10.5 with ALL 4 heavy and 16 light user machines scanning, CPU utilization is 41%. Very Impressive. • With powerful machines typically used in VDI environment CPU’s typically are not the breaking point. • With 20 desktop images, 10.5 adds marginal load to CPU where as other solutions can not even get to support baseline number of desktop images • With 10 desktop images, 10.5 adds only 11% CPU overhead compared to baseline (no AV and no scanning) versus Symantec which adds 29% CPU overhead , 10.1 which adds 50% CPU overhead and McAfee which is the worst which adds 83% CPU overhead Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 11 11
  • 12. IOPS (vDisk Utilization) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 12 12
  • 13. IOPS - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has 10.95 IOPS, Symantec has 9.02 IOPS and McAfee has whopping 22.39 IOPS • Trend Micro Office Scan 10.5 IOPS has small deviation of 0.77 MB/s and 3.66 MB/s only from baseline and mixed 20 user profile • Lets recap why 10.5 is so much better with IOPS • 10.5 Serializes updates and scans per VDI-host • Pre-scans and white-lists VDI base-images • Prevents duplicate scanning of unchanged files on a VDI host Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 13 13
  • 14. IOPS – How many Systems? • A VDI environment sized for 20 desktop images with 4 heavy and 16 light users. • Keep IOPS between 6-8 and see how many desktop images can be supported with each AV deployment (Apples to Apples comparison) • All about return of investment • If you deploy McAfee, you can deploy ONLY 2 desktop images in an environment which supports 20 images without AV • If you deploy Symantec, you can deploy ONLY 4 desktop images in an environment which supports 20 images without AV • If you deploy Trend 10.5, you can deploy ALL 20 desktop images Customers no longer have to choose between Security and Return On Investment Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 14 14
  • 15. Memory Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 15 15
  • 16. Memory - Analysis • Only 10.5 can support 20+ desktop images with mixed user profile. • Automatic Pool of 20 desktop images without AV in Mixed user Profile is consuming around 7.74 GB of Active Memory • Trend Micro Office scan 10.5 is putting an overhead of only 1.32 GB in maximum VDI Density environment. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 16 16
  • 17. Scan Time with 10.5 VDI Profile Other AV Solution Trend Micro 10.5 Mixed Maximum High Density Approx 1-2 Hours 16 Minutes VDI Pool(4H &16 L) Mixed Low Density VDI Pool Approx. 27- 49 minutes 2 Minutes (1H & 3 L) Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 17 17
  • 18. Scan Time - Analysis • Trend Micro Office scan 10.5 is performing Approx. 15 - 25 times better in Mixed Low Density VDI pool and 4 -8 times better in Mixed Maximum High Density VDI pool. • Trend Micro office scan 10.5 with its Smart Scan and VDI aware capability is consuming remarkably less scan time than other AV solutions. Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 18 18
  • 19. VDI Security option #2: Deep Security Trend Micro Deep Security Protects virtualized endpoints & servers • First agent-less anti-malware solution • Hypervisor-based introspection • Eliminates “AV storms” 10/4/2010 Copyright 2009 Trend Micro Inc. 19 19
  • 20. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 20 20
  • 21. Key Issue: Resource Contention 9:00am Scan Typical AV Console Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 21 21
  • 22. Key Issue: Instant On Gaps Active, with Active Dormant security out-of-date Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 22 22
  • 23. Key Issue: Mixed Trust Level VMs ERP Email Web Test CRM Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 23 23
  • 24. Trend Micro Deep Security IDS / IPS Integrity Log Anti-Virus Firewall Monitoring Inspection Physical Virtual Cloud Desktop/Laptop Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0. Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1 10/4/2010 Copyright 2009 Trend Micro Inc. 24 24
  • 25. Co-ordinated Approach • Optimized protection • Operational efficiency Security virtual Security Agent-based appliance VM Security Efficiency Protection Manageability Mobility 10/4/2010 Copyright 2009 Trend Micro Inc. 25 25
  • 26. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 26 26
  • 27. Issue #1: Multi-tenancy Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 27 27
  • 28. Issue #2: Data Access & Governance 10010011 01101100 10/4/2010 Copyright 2009 Trend Micro Inc. 28 28
  • 29. Issue #3: Secure Storage Recycling 10011 10011 01110 01110 00101 00101 10/4/2010 Copyright 2009 Trend Micro Inc. 29 29
  • 30. Trend Micro Cloud Security Solutions Deep Security SecureCloud • Anti-Virus • Encryption • IDS/IPS • Policy-based key management Private & Public • + Virtual Patching • + Web App Protection Cloud Computing Flexibility & Confidence • File Integrity Monitoring • Log Inspection • Firewall 10/4/2010 Copyright 2009 Trend Micro Inc. 30 30
  • 31. Security Built for VMware Desktop Server Cloud Virtual Appliance 10/4/2010 Copyright 2009 Trend Micro Inc. 31 31
  • 32. Virtual Appliances Virtual Appliance Application Operating System Hypervisor Hypervisor Hardware Hardware 10/4/2010 Copyright 2009 Trend Micro Inc. 32 32
  • 33. Virtual Appliance Benefits Virtual Appliance Costs 70% IT Flexibility Per-User Improve Business Cost of Virtual Continuity Appliance A solution that scale over time. Don’t need to buy a bigger physical appliance. Just add more resources. Don’t need to buy an extra box for pre-production environment, just fire a new VM or install on any box that can run CentOS or Red Hat. 10/4/2010 Copyright 2009 Trend Micro Inc. 33 33
  • 34. Trend Micro Security Virtual Appliances Virtual Appliance Web Security Email Security Other Trend Micro Product are offered as a virtual appliance : -Data Loss Prevention Server -Threat Discovery Virtual Appliance (part of Threat Management Services (TMS) 10/4/2010 Copyright 2009 Trend Micro Inc. 34 34
  • 35. Security Built for VMware Deep Security Deep Security Deep Security InterScan Web Security OR AND InterScan Messaging OfficeScan SecureCloud Security Desktop Server Cloud Virtual Appliance* Encryption of the *VMware Certified virtual file system Appliances 10/4/2010 Copyright 2009 Trend Micro Inc. 35 35
  • 36. Security Built for VMware 10/4/2010 Copyright 2009 Trend Micro Inc. 36 36
  • 37. Trend Micro Global leader in Internet content security and threat management. Catalyst for faster adoption of virtualization. Our Vision: A world safe for exchanging digital information Founded • United States in 1988 Headquarters • Tokyo, Japan Offices • 23 countries Employees • 4,350 Leadership • US $1 Billion annual revenue • 3rd largest security company 1,000+ Threat Research Experts 10 labs. 24x7 ops • “Global 100 Most Sustainable Corporations” Real-time alerts for new threats • Top 3 in Messaging, Web and Endpoint security • Leader in virtualization & cloud computing security Copyright 2009 Trend Micro Inc. 37 37
  • 38. Questions? Thank you, merci New Threats Informations For more informations: http://blog.trendmicro.com/ Technical: david_girard@trendmicro.com 514-629-1680 User group Sales: Groupe d’utilisateurs Michel_bouasria@trendmicro.com Trend Micro du Québec 514-653-2257 http://www.linkedin.com/groups?gid=2296257 Jean_houle@trendmicro.com 514 893-1512 Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 38 38