SlideShare une entreprise Scribd logo
1  sur  19
Introducing Kaspersky Security
for Virtualization
Be Ready for What’s Next
Ariel Martin Beliera
Sales Engineer | Strategic Latin American Markets - Kaspersky Lab

ariel.beliera@kaspersky.com
Skype Ariel.Beliera
What is Driving Virtualization?

                      Business Needs


          Greater          Higher         Increased
         Efficiency      Productivity       Agility




         Reduced                          Improved IT
                        Competitiveness
          Costs                             Control




PAGE 2
Virtualization Adoption Rates




     94%                                       97%                          25%
     Global 500                                Fortune 1000                 Small Business




Source: Small Business Server Virtualization Roadmap, CDW, August 31 2011




PAGE 3
Expected Benefits

         What is Virtualization Supposed to Bring?
                            Reduced
                            IT Costs
               Faster                     OS
              Disaster                 Migrations
              Recovery




              Centralized              Stability
              Management

                             Data
                            Security

PAGE 4
Threats and risks
The same as for physical machines


                      Signatures                                     New Threats Every Day    70k
    Malware           5,000,000



                      4,000,000
                                                 Malware in Kaspersky Lab Database Jan 2012   67m

 Limited Visibility   3,000,000
                                                 Malware in Kaspersky Lab Database Jan 2011   50m
                      2,000,000



Management issues     1,000,000                                     Malware from downloads    1in14



                           1999    2001   2003    2005      2007      2009     2011



PAGE 5
Options for Virtual Protection


           Option 1       Option 2      Option 3
         No Protection   Agent-based   Agentless




PAGE 6
No Protection – Not an Option

   Virtual Infection and spread
   Virtual eavesdropping
   Target of cybercriminals
   Malware can survive “tear-down”
   of non-persistent machines




   “  A single compromised virtual
     machine impacts the entire virtual
              infrastructure.
                                                       ”
                      Guide to Security for Full Virtualization Technologies
                             National Institute of Standards & Technology


PAGE 7
Agent-based Protection
Traditional Protection methods applied to VM
  AV-Storm
  Redundant anti-malware and
  signature files                       AV               AV

  Instant On Gap
  VM’s in Motion                        AV                AV

  Reduced consolidation ratios

                                        AV                AV




                                 AV   AV agent (Security Solution)

                                      Applications (i.e. Office)

                                      Operating System



PAGE 8
Agentless Protection
Kaspersky Security for virtualization
  Works with VMware’s vShield
  Endpoint
  Anti-malware functions offloaded
  Managed component of
  Kaspersky
  Security Center 9.0




PAGE 9
Kaspersky Security for Virtualization
Key benefits
Superior Protection, High Performance
  Award-winning anti-virus engine
  Unified management
  No Anti-virus Storm issues
  Immediate protection
  Higher density ratios
  Superior ROI




PAGE 10
Kaspersky Security Center
Centralized Management of combined environment

  “Single-Pane” for administrators   Broad platform coverage
  Automatic recognition              Intuitive deployment,
                                     management
  Physical, Virtual, Mobile
                                     and reporting




PAGE 11
Agent-based vs. Agentless




      AV agent (Security Solution)

      Applications (i.e. Office)

      Operating System
Advantages of Agentless Approach
 CPU
     No AV Storm

 Memory savings
     KES8: from 40MB up to 200 MB

 Storage savings
     Disk space and I/O (no Update Storm)

 No impact on networking
     Updates, events, etc. (travel inside the host)
Advantages and benefits
 VM “density”
    On unprotected ESXi host – 50 VMs
    With Kaspersky Endpoint Security 8.0 – 12-18 VMs
    With Kaspersky Security for Virtualization – 30-35 VMs


 Persistent protection
    New systems
    Powered on / outdated machines


 Easy support
    Troubleshooting only one VM
    No issues with incompatible software
    Protected OS (hard to break into KSV appliance)
Protection for infrastructures of any size and complexity

    Simplified           Virtual           Physical             Mobile
   Management          Protection         Protection          Protection




    Unified Under a      Immediate          Real Time          Protects Lost
     “Single-Pane”       Protection         Protection           Devices

     Solid Policy     High Performance   Powerful Controls       Android,
     Enforcement                                                BlackBerry,
                         Maximized        Broad Platform     Windows, Symbian
       Intuitive          Density            Support

   Robust Reporting     Virtual Aware




PAGE 15
Existing agentless offerings can be limited

  Multiple Administrative Consoles (different for virtual and
  physical infrastructures)
  Low detection rates
  Complex and long technical support procedure




PAGE 16
Recommendations

  Don’t underestimate manageability


  Choose unified solutions to protect both physical and virtual
  environment


  Find the right balance of security and performance


  Combine «agent-based» and «agentless» protection methods


  Don’t cherish illusions that virtual environments are more secure
  than physical ones


PAGE 17
Get the right balance with Kaspersky

                         Kaspersky Security for Virtualization
                         provides agentless anti-malware
                         security for virtual machines, without
                         compromising performance.


                         Get the right balance with Kaspersky.


                         Security for Virtualization.
                         Be Ready for What’s Next.

                         kaspersky.com/beready




PAGE 18
Thank You!
 Ariel Martin Beliera
 Sales Engineer | Strategic Latin American Markets - Kaspersky Lab

 ariel.beliera@kaspersky.com
 Skype Ariel.Beliera




PAGE 19

Contenu connexe

Tendances

How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 

Tendances (20)

How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 

En vedette

Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Onwubiko Emmanuel
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training GameFFFOD
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...UNIDEES Algérie
 

En vedette (6)

Kaspersky
KasperskyKaspersky
Kaspersky
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Bus Training Game
Bus Training GameBus Training Game
Bus Training Game
 
Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...Kaspersky Security for Virtualization - protection des infrastructures virtue...
Kaspersky Security for Virtualization - protection des infrastructures virtue...
 

Similaire à Introducing Kaspersky Security for Virtualization

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoiprincescorpio
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)Steven Aiello
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 

Similaire à Introducing Kaspersky Security for Virtualization (20)

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Alexandru Catalin Cosoi
Alexandru Catalin CosoiAlexandru Catalin Cosoi
Alexandru Catalin Cosoi
 
iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
IBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - EcuadorIBM Security Day, Cuenca - Ecuador
IBM Security Day, Cuenca - Ecuador
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 

Introducing Kaspersky Security for Virtualization

  • 1. Introducing Kaspersky Security for Virtualization Be Ready for What’s Next Ariel Martin Beliera Sales Engineer | Strategic Latin American Markets - Kaspersky Lab ariel.beliera@kaspersky.com Skype Ariel.Beliera
  • 2. What is Driving Virtualization? Business Needs Greater Higher Increased Efficiency Productivity Agility Reduced Improved IT Competitiveness Costs Control PAGE 2
  • 3. Virtualization Adoption Rates 94% 97% 25% Global 500 Fortune 1000 Small Business Source: Small Business Server Virtualization Roadmap, CDW, August 31 2011 PAGE 3
  • 4. Expected Benefits What is Virtualization Supposed to Bring? Reduced IT Costs Faster OS Disaster Migrations Recovery Centralized Stability Management Data Security PAGE 4
  • 5. Threats and risks The same as for physical machines Signatures New Threats Every Day 70k Malware 5,000,000 4,000,000 Malware in Kaspersky Lab Database Jan 2012 67m Limited Visibility 3,000,000 Malware in Kaspersky Lab Database Jan 2011 50m 2,000,000 Management issues 1,000,000 Malware from downloads 1in14 1999 2001 2003 2005 2007 2009 2011 PAGE 5
  • 6. Options for Virtual Protection Option 1 Option 2 Option 3 No Protection Agent-based Agentless PAGE 6
  • 7. No Protection – Not an Option Virtual Infection and spread Virtual eavesdropping Target of cybercriminals Malware can survive “tear-down” of non-persistent machines “ A single compromised virtual machine impacts the entire virtual infrastructure. ” Guide to Security for Full Virtualization Technologies National Institute of Standards & Technology PAGE 7
  • 8. Agent-based Protection Traditional Protection methods applied to VM AV-Storm Redundant anti-malware and signature files AV AV Instant On Gap VM’s in Motion AV AV Reduced consolidation ratios AV AV AV AV agent (Security Solution) Applications (i.e. Office) Operating System PAGE 8
  • 9. Agentless Protection Kaspersky Security for virtualization Works with VMware’s vShield Endpoint Anti-malware functions offloaded Managed component of Kaspersky Security Center 9.0 PAGE 9
  • 10. Kaspersky Security for Virtualization Key benefits Superior Protection, High Performance Award-winning anti-virus engine Unified management No Anti-virus Storm issues Immediate protection Higher density ratios Superior ROI PAGE 10
  • 11. Kaspersky Security Center Centralized Management of combined environment “Single-Pane” for administrators Broad platform coverage Automatic recognition Intuitive deployment, management Physical, Virtual, Mobile and reporting PAGE 11
  • 12. Agent-based vs. Agentless AV agent (Security Solution) Applications (i.e. Office) Operating System
  • 13. Advantages of Agentless Approach CPU No AV Storm Memory savings KES8: from 40MB up to 200 MB Storage savings Disk space and I/O (no Update Storm) No impact on networking Updates, events, etc. (travel inside the host)
  • 14. Advantages and benefits VM “density” On unprotected ESXi host – 50 VMs With Kaspersky Endpoint Security 8.0 – 12-18 VMs With Kaspersky Security for Virtualization – 30-35 VMs Persistent protection New systems Powered on / outdated machines Easy support Troubleshooting only one VM No issues with incompatible software Protected OS (hard to break into KSV appliance)
  • 15. Protection for infrastructures of any size and complexity Simplified Virtual Physical Mobile Management Protection Protection Protection Unified Under a Immediate Real Time Protects Lost “Single-Pane” Protection Protection Devices Solid Policy High Performance Powerful Controls Android, Enforcement BlackBerry, Maximized Broad Platform Windows, Symbian Intuitive Density Support Robust Reporting Virtual Aware PAGE 15
  • 16. Existing agentless offerings can be limited Multiple Administrative Consoles (different for virtual and physical infrastructures) Low detection rates Complex and long technical support procedure PAGE 16
  • 17. Recommendations Don’t underestimate manageability Choose unified solutions to protect both physical and virtual environment Find the right balance of security and performance Combine «agent-based» and «agentless» protection methods Don’t cherish illusions that virtual environments are more secure than physical ones PAGE 17
  • 18. Get the right balance with Kaspersky Kaspersky Security for Virtualization provides agentless anti-malware security for virtual machines, without compromising performance. Get the right balance with Kaspersky. Security for Virtualization. Be Ready for What’s Next. kaspersky.com/beready PAGE 18
  • 19. Thank You! Ariel Martin Beliera Sales Engineer | Strategic Latin American Markets - Kaspersky Lab ariel.beliera@kaspersky.com Skype Ariel.Beliera PAGE 19