ebook img

Four Horsemen Of the Virtualization Security Apocalypse - Rational PDF

84 Pages·2009·14.05 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Four Horsemen Of the Virtualization Security Apocalypse - Rational

The Four Horsemen Of the Virtualization Security Apocalypse PacketFilter We lc ome To Th e Ju ng le ... ✤ Se tup ✤ Virtualization In Conte xt ✤ Virtual Ne t working Architecture ✤ VirtSec Solutions Landscape ✤ The Four Horsemen ✤ Wrap-Up The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Topic s and G o a ls Of Ou r Ch at: ✤ Discuss the operational re alities of virtualizing ne t working and securit y today: performance, scalabilit y and resiliency ✤ Describe the broad impact of immaturit y in VirtSec technology/solutions ✤ Illustrate how the melange of securit y in the ISV Sof t ware, hyper visor, OS, ne t work and embedded in hardware opens a securit y wormhole The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr St at us Quo = FAIL? Some securi t y things you do today are perfect ly re asonable and work we ll in v irt ualize d e nv ironme nts, o thers simply don’t work at all The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Re a li t y Bi te s Replicat ing many highly-available securi t y applicat ions and ne t work topologie s in v irt ual swi tche s doe sn’t work “It ain’t all rainbows and unicorns...” The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Bumpy R o ad Ah e ad “Ever ything’s Under Construction...” Monoli thic securi t y ve ndor v irt ual appliance s are the v irt ualizat ion version of the UTM argume nt The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr If I t Ai n’t Fi xe d, Do n’t Bre ak I t “She just don’t run like she used to...” Virt ualize d Securi t y can seriously impact performance, re silie ncy and scalabili t y The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Pe nny Wise & Po und Fo o lish Virt ualizing securi t y will no t save you money, i t will cos t you more “Money for nuthin’ and my chips for f ree...” The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Wh e re To St a rt ? ✤ Se tup ✤ Virtualization In Conte xt ✤ Virtual Ne t working Architecture ✤ VirtSec Solutions Landscape ✤ The Four Horsemen ✤ Wrap-Up The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr Cave ats ✤ This presentation focuses on VMware VI3 as the virtualization platform example; Microsoft’s and Citrix’s networking/security architectures are different ✤ There are a number of interesting new capabilities in VI4; I make reference to some of them, but many are futures and not shipping but change things dramatically... ✤ In the interest of scope and time, it’s focused on server virtualization and data networking only; storage, client, application virtualization are a whole other universe of security fun... ✤ It’s true you can achieve very robust/resilient integrated network and virtual infrastructure designs, but the moment you try and integrate security...not so much... The Four Horsemen Of the Virtualization Security Apocalypse | Hoff PPaacckkeettFFiilltteerr

Description:
PacketFilter. The Four PacketFilter PacketFilter PacketFilter .. Core L2 forwarding engine . The trick is forcing the traffic through .. PF. SR-IOV eliminates software intermediary in fast path. •. Virtualization HW Switch embedded in NIC.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.