extending traditional security to vdi
TRANSCRIPT
8/11/2019 Extending Traditional Security to VDI
http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 1/5
A C Sec Pme
ExtEnding traditional SEcurity to Vdi
ARE YOUR
VIRTUALIZATIONEFFORTS HURTING YOURSECURITY?
8/11/2019 Extending Traditional Security to VDI
http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 2/5
8/11/2019 Extending Traditional Security to VDI
http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 3/5ExtEnding trAditionAl SECurity to Vdi 2
Security Risks of Extending Traditional Security
oe f he ce bees f mpeme Vdi s he ab qck eeaea va eskp mae sea f sa each sace fm scach. if itepames smp ee aa sec va eskps, pcaemaes w evab pae he sec sfwae ae f ssemscas a he same me, ea a bawh pbem kw as “escece” a “sec sm.”
Cmm b mppe wk-as ce amz sab avssca a pa. Whe it amsas sabe sec fcs ahs eve, he ae, effec, es eskp sec ewk ewasa s eec ssems (idSs).
i sch a sa, he peceee spee b whch cbecmas ceaemawae—3.5 ew heas eve sec—ee va eskps veabe aacks.
uke vaze seves, va eskps cmpse a bae aack sfacebecase each sace s a pea e p. use behavs sch asscmae wa pams a cmes, s he Web, acck ks hep. Wh pec f eve a sma am f me,
VM maes ca avee ce heas cpae ewks.
Zero-Day Exploits and the “Zero-Day Effect”
Ze-a eps ae epe he w b cbecmas se aeeaacks ep pache kw sfwae veabes. rescece wk-as ha ff pec ea sec fce itamsas effecve face he same ze-a sks eve f paches aeaea avaabe a espe ep sec pcs.
We se appcas fm Mcsf, Abe, a eve Appe have a beef ca sfwae veabes ha ae cca cbecme aacksbecase hese aw amac cmma eec.4
Customized Highly Targeted Attacks
Avace pesse heas (APts) ae cmpaes a azas e sea cea fma. these campas feqe be whsca eee aacks as mae as se csmze emas whep aachmes.
Afe m APts f e mh, te Mc f ha he msepe Microsoft Ofce sfwae was Microsoft Word (see Fe 2).5 Fheme, bh eave ew (e.., CVE-2012-0158)6 a (e..,CVE-2010-3333)7 veabes have bee eveae.
Eps f veabes Adobe Acrobat Reader a Flash Player have asbee se vas APt campas sch as lurid,8 SyKiPot,9 a ixESHE.10
4 hp://b.emc.cm/2011--evew-eps-a-veabes/5 hp://b.emc.cm/sapsh-f-ep-cmes-f-ap-2012/6 hp://www.cve.me./c-b/cveame.c?ame=CVE-2012-01587 hp://cve.me./c-b/cveame.c?ame=CVE-2010-33338 hp://b.emc.cm/e-mc-epses--ap/9 hp://b.emc.cm/he-skp-campa/10 hp://b.emc.cm/ak-a-be--f-eshe/
“With VDI, numerous desktops share
the host’s hardware resources, often at
a ratio of 60 to 1 or higher.”
— Trend Micro,
“Securing Your
Virtual DesktopInfrastructure”
Figure 2. Ms epe Mcsfsfwae b aee aacks Ap 2012
8/11/2019 Extending Traditional Security to VDI
http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 4/5ExtEnding trAditionAl SECurity to Vdi 3
Figure 3. Sec sks ee phsca sec Vdi pses
Responding to VDI Security Challenges with Agentless
Security and Vulnerability Shielding
F eepses eaze he bees Vdi ffes, it amsas ms sesec s mpeme pces ha ca esp he qe secchaees a heas ha es vaze evmes.
Eepses ha have be vaz seves a fesee vaza be a ce it sae sh aea cse ee seve vazasaees Vdi. Specca, Vdi-awae sec sfwae ha eaes we
wh hpevss aws it amsas fee p he space each vaeskp pevs ake p b sec aes.
Trend Micro™ Deep Security™, f sace, emps aeess echhh a hweh ve each va eskp se b he vazapafm chesae saee sec scas a paes sea feq a sepaae aa sec ae each va eskp. thspecs va eskps he ms pma mae aas he skssae he pevs sec whe pesev va eskp esces.ths aeess ech pmzes pefmace a ceases VM es.Meve, es ee a aa sec ae each VM, as eveaes he ve se vaza.
Fheme, eepses ha se VM-awae sec sfwae sch as Deep
Security ca as ake avaae f veab she, aka “vapach,” aess kw pach maaeme sses a, me specca,he hea ze-as aacks pse.11 P sfwae hes wh veabshes a he ewk eve eabes eepses efce a pacvepec he ewks eve befe a pach s evepe b he affecesfwae’s ve.
11 hp://www.emc.cm/c-ce/s/pfs/bsess/whe-papes/wp_veab-she-pme.pf
Only extend traditional security to VDI if
your security software can:
• Identify whether the agent is
running on physical or virtual
endpoints (i.e., a capability called
“virtualization awareness”)
• Serialize scans and updates to
prevent resource contention
problems
8/11/2019 Extending Traditional Security to VDI
http://slidepdf.com/reader/full/extending-traditional-security-to-vdi 5/5
©2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-bal
logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product
or company names may be trademarks or registered trademarks of their owners.
TRENDLABSSM
TrendLabs is a multinational research, development, and support
center with an extensive regional presence committed to 24 x 7 threat
surveillance, attack prevention, and timely and seamless solutions
delivery. With more than 1,000 threat experts and support engineersdeployed round-the-clock in labs located around the globe, TrendLabs
enables Trend Micro to continuously monitor the threat landscape
across the globe; deliver real-time data to detect, to preempt, and to
eliminate threats; research on and analyze technologies to combat new
threats; respond in real time to targeted threats; and help customers
worldwide minimize damage, reduce costs, and ensure business
continuity.
TREND MICRO™
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud
security leader, creates a world safe for exchanging digital information
with its Internet content security and threat management solutions for
businesses and consumers. A pioneer in server security with over
20 years’ experience, we deliver top-ranked client, server and cloud-
based security that ts our customers’ and partners’ needs, stops
new threats faster, and protects data in physical, virtualized and
cloud environments. Powered by the industry-leading Trend Micro™
Smart Protection Network™ cloud computing security infrastructure,
our products and services stop threats where they emerge—from the
Internet. They are supported by 1,000+ threat intelligence experts
around the globe.