SlideShare a Scribd company logo
What’s new in vShield 5
Enterprise Security today – not virtualized, not cloud ready

                                         Enterprise VDC

  Users            DMZ                        Web Servers            Apps / DB Tier




 Sites




                Perimeter/DMZ              Interior security          Endpoint security
                - Firewall, VPN            - VLAN or subnet based     - AV, DLP agent based
                - Load balancers           policies                   security
                Challenges                 Challenges                 Challenges
                - Sprawl: hardware, FW     - Sprawl: VLANs,           - Sprawl: agents in all VMs
                rules, VLANs               hardware, FW rules         – drain resources
                                           - Blind spots: inter-VM    - Risk: agents in guest
                                           traffic                    VMs – not hardened
vShield 5.0

 Securing the Private Cloud End to End: from the Edge to the Endpoint

                                      vShield App with Data
       vShield Edge                          Security                  vShield Endpoint
             Edge                                                           Endpoint = VM
                                              Security Zone
    Secure the edge of                                              Offload anti-virus processing
    the virtual datacenter           • Create segmentation
                                       between silos of workloads
                                     • Sensitive Data Discovery



     DMZ
                                                                             vShield Manager
                     Application 1              Application 2                     Endpoint = VM
                                                                         Centralized Management
vShield Edge 5.0

                                                                                           Overview
                vShield                  vShield                    vShield

       Tenant A
                 Edge
                              Tenant C
                                          Edge
                                                           Tenant X
                                                                     Edge
                                                                              • Provides common edge security
                                                                               services around a virtual
                                                                               datacenter. Example uses:
                                                                               • Extranets
     Secure                 Secure
                                                                               • Multi-tenant cloud environments
                                                        Secure
     Virtual                Virtual                     Virtual
    Appliance              Appliance                   Appliance




                Firewall               Load balancer               VPN




4
vShield Edge 5.0

                vShield                  vShield                    vShield
                                                                              Primary functionality
                 Edge                     Edge                       Edge      • Stateful inspection firewall
       Tenant A               Tenant C                     Tenant X
                                                                               • Dynamic Host Configuration
                                                                                 Protocol (DHCP)
                                                                               • Site to site VPN
                                                                               • (NEW) Static Routing
     Secure                 Secure                      Secure
     Virtual
    Appliance
                            Virtual
                           Appliance
                                                        Virtual
                                                       Appliance              Management features
                                                                               • REST APIs for scripting
                                                                               • Logging of activity




                Firewall               Load balancer               VPN




5
vShield Edge 5.0

                                                                                           Benefits
                vShield                  vShield                    vShield

       Tenant A
                 Edge
                              Tenant C
                                          Edge
                                                           Tenant X
                                                                     Edge
                                                                              • Reduce cost and complexity
                                                                                • Centralized management for all
                                                                                  protected environments
                                                                                • Eliminates need for multiple
                                                                                  special-purpose appliances
     Secure
     Virtual
    Appliance
                            Secure
                            Virtual
                           Appliance
                                                        Secure
                                                        Virtual
                                                       Appliance
                                                                              • Increased agility for cloud
                                                                               environments
                                                                               • Enables rapid provisioning edge
                                                                                  services
                                                                                • Ability to automate and integrate
                                                                                  into overall provisioning and
                                                                                  management workflow




                Firewall               Load balancer               VPN




6
vShield App 5.0

                            Overview

                  • vShield App: virtualization-
                   built firewall featuring
                    • VM-level enforcement
                    • Intuitive business
                      language policy
                    • Robust flow monitoring
                    • Logging and auditing
                    • REST API
vShield App Design

                                               Hypervisor-Level
                vShield             vShield
                 App                            Firewall
                                     App
                                                • Inbound/outbound
                                                  connection control enforced
                                                  at the virtual NIC level

     vSphere              vSphere               • Dynamic protection as virtual
                                                  machines migrate

                                                • Protects at Layer 3 and
                                                  Layer 2

                                                             vShield
    ESXi Host             ESXi Host                          Manager




       vSphere                                  vCenter
        Client                                   Server
vShield App Group-based Policies

                                                       MAC
                   Internet                            Set
                                      Resource
  Security                             Pools
  Groups
                     Finance     HR          Marketing

       Web Group      Web       Web              Web
                                                             IP
                                                             Set

       DB Group     Database   Database      Database
vShield App 5.0

                               Benefits

                  • Complete visibility and
                   control to the Inter VM traffic
                    • Enables multiple trust zones
                      on same ESX cluster.
                    • Ability to audit traffic for
                      compliance and security
                  • Fewer misconfiguration
                   mistakes, lower operating
                   overhead by eliminating
                    • VLAN trunking
                    • Complex rules management
                  • Ability to automate and
                   integrate into overall
                   provisioning and
                   management workflow
vShield Data Security (vSDS)

                                                               Overview
                                                    • Discover and report sensitive data
                                                     across virtual machines
                                                    • Scans occur continuously,
                                                     transparent to the virtual machine




 !                    !                   !
            Cloud Infrastructure
     (vSphere, vCenter, vShield, vCloud Director)
vShield Data Security (vSDS)

 Select from many industry, local, and international policies
vShield Data Security (vSDS)

 View report of policy matches per VM
vShield Data Security (vSDS)

                                                                  Benefits
                                                     • Reduces risk of non-compliance
                                                       with automated scans, rapid
                                                       assessment and reporting
                                                     • Improve performance by offloading
                                                       data discovery functions to a
                                                       virtual appliance




  !                    !                   !
             Cloud Infrastructure
      (vSphere, vCenter, vShield, vCloud Director)
vShield Manager Roles

 Clear separation of Responsibilities and Authority


         Security   Define, Monitor
         admin




         vShield    Implement
         admin




                                                       Security
         Auditor    Verify
                                                       Policies
vShield Endpoint

                                 Overview
                   • Offload file activity to Security VM
                   • Enforce Remediation using driver
                    in VM
                   • Security VM provided by best-of-
                    breed AV partners: Trend Micro,
                    others

                                  Benefits

                   • Improve VM performance by
                    eliminating anti-virus storms
                   • Reduce risk by eliminating
                    agents susceptible to attacks

More Related Content

PDF
Vmware Seminar Security & Compliance for the cloud with Trend Micro
PDF
Model checking in the cloud
PDF
Nevmug Left Hand Tower Publishing January 2009
PPTX
Architecting a Private Cloud - Cloud Expo
PDF
LifeSize® UVC Transit™
PDF
Security & Virtualization in the Data Center
PPT
Dvis presentation l
PDF
InterCloud the cloud network - v1
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Model checking in the cloud
Nevmug Left Hand Tower Publishing January 2009
Architecting a Private Cloud - Cloud Expo
LifeSize® UVC Transit™
Security & Virtualization in the Data Center
Dvis presentation l
InterCloud the cloud network - v1

What's hot (12)

PPTX
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
PDF
Vyatta cloud expo-sjc_2012-share
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PDF
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
PDF
Runner sv q307
PDF
Security and Virtualization in the Data Center
PPTX
Simple ams slidedeck
PDF
Wireless to the Nth Degree
PDF
Switch
PDF
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
PDF
Datacryptor Ethernet Layer 2 Rel 4.5
PDF
BayLISA: MidoNet Overlay Based Network Virtualization for IaaS Clouds
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 2
Vyatta cloud expo-sjc_2012-share
Virtual sharp cloud aware bc dr up 2012 cloud
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Runner sv q307
Security and Virtualization in the Data Center
Simple ams slidedeck
Wireless to the Nth Degree
Switch
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Datacryptor Ethernet Layer 2 Rel 4.5
BayLISA: MidoNet Overlay Based Network Virtualization for IaaS Clouds
Ad

Similar to What’s new in vShield 5 (20)

PDF
Introduction - Trend Micro Deep Security
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
PDF
Layer 7: Cloud Security For The Public Sector
PDF
Citrix - More Applications, More Security, More Availability
PDF
Vss Security And Compliance For The Cloud
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
PPTX
BIG-IP Data Center Firewall Solution
PPTX
Private Clouds - Business Agility Seminar
PDF
GAMO VMware vCloud Air
PPTX
VMware vShield - Overview
PPTX
VMware-vShield-Presentation-pp-en-Dec10.pptx
PPTX
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
PPTX
QLogic Adapters & Virtualized Environments
PDF
Transcending Computing Environment Boundaries: Seamless Computing Environmen...
PDF
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
PDF
Using Server Virtualization for Manufacturing Operations
PDF
Server Virtualization in Manufacturing Operations
PPTX
Trend micro v2
PDF
VMware Zimbra vs. Novell Groupwise
PPTX
ZStack Solutions & Cases 2023
Introduction - Trend Micro Deep Security
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Layer 7: Cloud Security For The Public Sector
Citrix - More Applications, More Security, More Availability
Vss Security And Compliance For The Cloud
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
BIG-IP Data Center Firewall Solution
Private Clouds - Business Agility Seminar
GAMO VMware vCloud Air
VMware vShield - Overview
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
QLogic Adapters & Virtualized Environments
Transcending Computing Environment Boundaries: Seamless Computing Environmen...
Desktopvirtualisatie met VMware View, de laatste ontwikkelingen
Using Server Virtualization for Manufacturing Operations
Server Virtualization in Manufacturing Operations
Trend micro v2
VMware Zimbra vs. Novell Groupwise
ZStack Solutions & Cases 2023
Ad

More from Eric Sloof (16)

PDF
VMware HA deep Dive
PDF
What’s New in vCloud Director 5.1?
PDF
Mythbusting goes virtual What's new in vSphere 5.1
PDF
vCenter Infrastructure Navigator 1.1 - What's New
PDF
vCenter Operations 5: Level 300 training
PDF
E1000 is faster than VMXNET3
PDF
vSphere 5 What's New - Profile Driven Storage
PDF
Introduction - vSphere 5 High Availability (HA)
PDF
Introduction - vSphere Storage Appliance
PDF
What’s New in vCloud Director 1.5
PDF
vSphere 5 - Image Builder and Auto Deploy
PDF
What’s New in VMware vCenter Site Recovery Manager v5.0
PPTX
Advanced Root Cause Analysis
PPT
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
PPTX
Managing V Sphere With The Vesi
PPTX
Managing V Sphere With The Vesi
VMware HA deep Dive
What’s New in vCloud Director 5.1?
Mythbusting goes virtual What's new in vSphere 5.1
vCenter Infrastructure Navigator 1.1 - What's New
vCenter Operations 5: Level 300 training
E1000 is faster than VMXNET3
vSphere 5 What's New - Profile Driven Storage
Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere Storage Appliance
What’s New in vCloud Director 1.5
vSphere 5 - Image Builder and Auto Deploy
What’s New in VMware vCenter Site Recovery Manager v5.0
Advanced Root Cause Analysis
Vblock Infrastructure Packages — integrated best-of-breed packages from VMwar...
Managing V Sphere With The Vesi
Managing V Sphere With The Vesi

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hybrid model detection and classification of lung cancer
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
project resource management chapter-09.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document
Hybrid model detection and classification of lung cancer
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
NewMind AI Weekly Chronicles – August ’25 Week III
gpt5_lecture_notes_comprehensive_20250812015547.pdf
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Developing a website for English-speaking practice to English as a foreign la...
project resource management chapter-09.pdf
Getting started with AI Agents and Multi-Agent Systems
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx
1. Introduction to Computer Programming.pptx
O2C Customer Invoices to Receipt V15A.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers

What’s new in vShield 5

  • 1. What’s new in vShield 5
  • 2. Enterprise Security today – not virtualized, not cloud ready Enterprise VDC Users DMZ Web Servers Apps / DB Tier Sites Perimeter/DMZ Interior security Endpoint security - Firewall, VPN - VLAN or subnet based - AV, DLP agent based - Load balancers policies security Challenges Challenges Challenges - Sprawl: hardware, FW - Sprawl: VLANs, - Sprawl: agents in all VMs rules, VLANs hardware, FW rules – drain resources - Blind spots: inter-VM - Risk: agents in guest traffic VMs – not hardened
  • 3. vShield 5.0 Securing the Private Cloud End to End: from the Edge to the Endpoint vShield App with Data vShield Edge Security vShield Endpoint Edge Endpoint = VM Security Zone Secure the edge of Offload anti-virus processing the virtual datacenter • Create segmentation between silos of workloads • Sensitive Data Discovery DMZ vShield Manager Application 1 Application 2 Endpoint = VM Centralized Management
  • 4. vShield Edge 5.0 Overview vShield vShield vShield Tenant A Edge Tenant C Edge Tenant X Edge • Provides common edge security services around a virtual datacenter. Example uses: • Extranets Secure Secure • Multi-tenant cloud environments Secure Virtual Virtual Virtual Appliance Appliance Appliance Firewall Load balancer VPN 4
  • 5. vShield Edge 5.0 vShield vShield vShield Primary functionality Edge Edge Edge • Stateful inspection firewall Tenant A Tenant C Tenant X • Dynamic Host Configuration Protocol (DHCP) • Site to site VPN • (NEW) Static Routing Secure Secure Secure Virtual Appliance Virtual Appliance Virtual Appliance Management features • REST APIs for scripting • Logging of activity Firewall Load balancer VPN 5
  • 6. vShield Edge 5.0 Benefits vShield vShield vShield Tenant A Edge Tenant C Edge Tenant X Edge • Reduce cost and complexity • Centralized management for all protected environments • Eliminates need for multiple special-purpose appliances Secure Virtual Appliance Secure Virtual Appliance Secure Virtual Appliance • Increased agility for cloud environments • Enables rapid provisioning edge services • Ability to automate and integrate into overall provisioning and management workflow Firewall Load balancer VPN 6
  • 7. vShield App 5.0 Overview • vShield App: virtualization- built firewall featuring • VM-level enforcement • Intuitive business language policy • Robust flow monitoring • Logging and auditing • REST API
  • 8. vShield App Design  Hypervisor-Level vShield vShield App Firewall App • Inbound/outbound connection control enforced at the virtual NIC level vSphere vSphere • Dynamic protection as virtual machines migrate • Protects at Layer 3 and Layer 2 vShield ESXi Host ESXi Host Manager vSphere vCenter Client Server
  • 9. vShield App Group-based Policies MAC Internet Set Resource Security Pools Groups Finance HR Marketing Web Group Web Web Web IP Set DB Group Database Database Database
  • 10. vShield App 5.0 Benefits • Complete visibility and control to the Inter VM traffic • Enables multiple trust zones on same ESX cluster. • Ability to audit traffic for compliance and security • Fewer misconfiguration mistakes, lower operating overhead by eliminating • VLAN trunking • Complex rules management • Ability to automate and integrate into overall provisioning and management workflow
  • 11. vShield Data Security (vSDS) Overview • Discover and report sensitive data across virtual machines • Scans occur continuously, transparent to the virtual machine ! ! ! Cloud Infrastructure (vSphere, vCenter, vShield, vCloud Director)
  • 12. vShield Data Security (vSDS)  Select from many industry, local, and international policies
  • 13. vShield Data Security (vSDS)  View report of policy matches per VM
  • 14. vShield Data Security (vSDS) Benefits • Reduces risk of non-compliance with automated scans, rapid assessment and reporting • Improve performance by offloading data discovery functions to a virtual appliance ! ! ! Cloud Infrastructure (vSphere, vCenter, vShield, vCloud Director)
  • 15. vShield Manager Roles  Clear separation of Responsibilities and Authority Security Define, Monitor admin vShield Implement admin Security Auditor Verify Policies
  • 16. vShield Endpoint Overview • Offload file activity to Security VM • Enforce Remediation using driver in VM • Security VM provided by best-of- breed AV partners: Trend Micro, others Benefits • Improve VM performance by eliminating anti-virus storms • Reduce risk by eliminating agents susceptible to attacks