1 copyright @ bitdefender 2013 copyright @ bitdefender 2014 “what business are we really in?”...
Post on 16-Jan-2016
216 Views
Preview:
TRANSCRIPT
1
Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2014www.bitdefender.com/enterprise
“What business are we really in?”
1. Theodore Levitt
2
Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2014www.bitdefender.com/enterprise
DATA
Endpoint protection*
APPS
Operatingsystem
Traditional antimalwareSignature based scanning and protectionHeuristic detectionFirewalll
Advanced antimalwareHIPS – host based intrusion preventionWeb protectionApplication whitelisting
Vulnerability ManagementAssessmentPatch Management
Anti-malware with advanced server supportSpecialized servers (e.g. email)virtual server environments
Endpoint security
Data SecurityEncryptionDevice controlDLP - data loss preventionMDM – mobile application management
3
Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2014www.bitdefender.com/enterprise
ENDPOINT SECURITY is our business
4
Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2014www.bitdefender.com/enterprise
Understanding The Impact of Virtualization Security
5
Copyright @ Bitdefender 2013
E-Threats behind the Curtains
Real World Virtual World
Teens and Geeks– Attention-Driven– Loner Profile
Cyber-criminals– Profit-Driven – Highly Organized
High Profile Attacks– Social Engineering – Mass Mailers
Stealth Attacks– Spyware/Adware– Automated Variant Creation
and Morphing – Persistent Threats
Lost productivity– Clogged E-mail Systems and
Networks– Help Desk and Data Loss
Costs
Cyber-crime– Identity Theft and Online
Fraud– Highly Targeted Corporate
Information Attacks
WHO?
HOW?
WHAT?
6
Copyright @ Bitdefender 2013
Magnitude of the Problem/Opportunity
• “Even the best signature databases… have less than a 50% chance of catching completely new threats. Signatures are extremely ineffective against targeted and “zero day” threats.”
According to Gartner
• “Nobody can win the war against malware with a signature-driven product, but more proactive technologies are required ”
According to AV-Test’s Andreas Marx
Source: AV-Test Labs (www.av-test.org)
Around 1.5M unique malware samples are discovered every month!
Source: av-test.org – New Malware Growth
7
Copyright @ Bitdefender 2013
Virtualization market drivers and adoption
XTraditional Antimalware
8
Copyright @ Bitdefender 2013
Antivirus Impact:
200 MBof memory per VM
200+ MBof disk per VM
The antimalware agent adds : Scan Engines – Signatures -Databases… to each VM
9
Copyright @ Bitdefender 2013
Creating The Perfect Storm
Each with its own
I/O Stream
Physical Server Can Support
50-70 Virtual Desktops
8-12 Virtual Servers
1
10
Copyright @ Bitdefender 2013
Creating The Perfect Storm
Scan
Scan
Scan
ScanScan
Scan
Simultaneous Update
Simultaneous Update Simultaneous Update
Simultaneous Update
AV STORM
11
Copyright @ Bitdefender 2013
Capacity Impact:
VSSecurity Capacity
Impact #1
12
Copyright @ Bitdefender 2013
Security Gaps:
Boot latency & Boot time gaps
System are vulnerable to attacks during AV loading, updates and during backup recovery
Impact #2
13
Copyright @ Bitdefender 2013
Lack of intelligent co-ordination
o Integrate with virtualization managemento Non-existent VMs remain o Serialize full system scanso Policy applied to groups
Impact #3
14
Copyright @ Bitdefender 2013
Secure Virtual Appliancethe Impact:
Security & Capacity
Remote Scanning
New Security Strategies
15
Copyright @ Bitdefender 2013
Secure Virtual Appliance
Deduplicate and Centralize
+30% saving on CPU impact
+10% saving on Memory impact
16
Copyright @ Bitdefender 2013
Traditional AV VS. BD Tools) - impact on host
Host running 72 virtual machines Local cache and server cache used
Tradit
ional
AV
EPSEC inte
grat
ion
EPSEC inte
grat
ion +
BD T
ools
BD Too
ls
47%
11% 12% 16%18%
7% 8% 8%
CPU Memory
At least 10% saving on Memory impactAt least 30% saving on CPU impact
17
Copyright @ Bitdefender 2013
Approach: VMware integration
VMware vShield Endpoint
VMware vCenter integration
BD Tools
“Agentless”?
18
Copyright @ Bitdefender 2013
Approach: Bitdefender Technology
o Any hypervisor
o SVA redundancy
o Performance and simplicity
20
Copyright @ Bitdefender 2013
Security
reinvented
o Hypervisor agnostic; Supports VMware, Citrix, Microsoft, AWS, Oracle, and Red Hat virtualization
o OS agnostic; Windows, Linux and Solaris servers as well as VDI instances
o Integrated management; VMware, Citrix, Amazon Web Services
o 30% more VMs per physical host; Increased server consolidation ratios with centralized antimalware
o Tiny footprint on the VMs: 60 MB of disk and 30 MB of memory in non-VMware environments
21
Copyright @ Bitdefender 2013
Built with Virtualization Built for Virtualization
22
Copyright @ Bitdefender 2013
Virtualization is another disruptive technology take advantage of your chance to improve security!
o Virtualization needs purpose-built securityo Two approaches today; vShield and Bitdefender o Management must be integrated (vCenter, XenServer, AD) o Avoid YAPS (Yet Another Point Solution)o Future-proof (OS & hypervisor, private & public, mobile)o Traditional endpoint and management architectures will fail
23
Copyright @ Bitdefender 2013
24
Copyright @ Bitdefender 2013
Gravity ZoneSecurity for Endpoints On Premise or Cloud-based
Simple to deploy, install & manage
Secures:•Windows•MAC•Servers
•Exchange (roadmap)•Mobile (roadmap)
Comprehensive Security from one dashboard
Secures:•Physical devices (windows, MACS,
Servers)•Mobile Devices
• Virtualized Environments(VMware. Citrix Xen, Hyper V and more)
OR
25
Copyright @ Bitdefender 2013
Control Center Console Endpoint Security (EPS)
The New Business Portfolio is entirely based on the Bitdefender GravityZone Architecture
26
Copyright @ Bitdefender 2013
Bitdefender at a Glance
Consistent Leader
Quarter 2
/2010
Quarter 3
/2010
Quarter 1
/2011
Quarter 2
/2011
Jul/Aug 2011
Sep/Oct
2011
Nov/Dec 2
011
Jan/Feb 2012
Mar/Apr 2
012
May/Jun 2012
Jul/Aug 2012
Sep/Oct
2012
Nov/Dec 2
012
Jan/Feb 2013
Mar/Apr 2
013
May/Jun 2013
Jul/Aug 2013
Sep / Oct
2013
Nov / Dec 2
0132.50
3.00
3.50
4.00
4.50
5.00
5.50
6.00
6.50
AV Test Score: Protection, Performance, Usability (Average)
Bitdefender Eset McAfee Avira Trend MicroPanda Avg Symantec Kaspersky
27
Copyright @ Bitdefender 2013
Advanced protection through proactive detection
• Active Virus Control leverages advanced heuristic methods to detect new potential threats in real time
• It monitors all application activity throughout the lifecycle of the application processes
• B-HAVE analyzes the behavior of potentially malicious codes inside a secure virtual computer environment
• It eliminates false positives and significantly increasing detection rates for new and unknown malware
28
Copyright @ Bitdefender 2013
The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations simultaneously from the
most important three key independent organizations in the US, UK, and Germany!
Only security company to receive 14 VB Antispam awards in a row
BitDefender protects more than 500 million people worldwide (including technology partnerships)
Nine international sales offices with ~ 475 employees worldwide
260+ technical people and engineers in R&D team
Products localized in more than 20 languages.
120 OEM Partners and Growing
Trusted by top security companies globally: F-Secure, G-Data, Trustport, e-Scan, Qihoo, Bullguard, Acronis IBM, etc
Bitdefender at-a-glance
29
Copyright @ Bitdefender 2013
Copyright @ Bitdefender 2014www.bitdefender.com/enterprise
Questions and Thank-you
top related