SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC)...

11
SECURE APPLICATION INFRASTRUCTURE ESSENTIALS

Transcript of SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC)...

Page 1: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

SECURE APPLICATION INFRASTRUCTURE ESSENTIALS

Page 2: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

TABLE OF CONTENTS

SECURITY IS TOP OF MIND FOR EVERY INDUSTRY

EVOLVING THREATS REQUIRE NEW SECURITY MODELS

ABSTRACTING APPLICATIONS FROM INFRASTRUCTURE

DELIVERS ADVANTAGES

A PORTFOLIO OF CAPABILITIES TO SECURE

APPLICATION INFRASTRUCTURE

SECURE YOUR APPLICATION INFRASTRUCTURE TODAY

WITH VMWARE

3

4

6

8

11

2

Secure Application Infrastructure Essentials

Page 3: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

As people, devices, and objects become more connected, protecting all these connections and environments has become more critical than ever. At the same time, it’s also become one of the biggest challenges currently facing IT. Why? Because IT organizations across all industries must, by necessity, secure each and every interaction between users, applications, and data—regardless of how and where they’re connecting. Moreover, they must secure these interactions in environments that are constantly changing and increasingly dynamic.

SECURITY IS TOP OF MIND FOR

EVERY INDUSTRY

So how do you mitigate risk in a world where IT complexity and “anytime, anywhere” digital interactions are growing exponentially? For organizations that are embracing cloud and virtualized environments, maximum visibility and control are key to mitigating this risk.

3

Secure Application Infrastructure Essentials

Page 4: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

EVOLVING THREATS REQUIRE NEW SECURITY MODELS

In recent years, businesses across virtually every industry have experienced high-profile data breaches that have compromised sensitive corporate and customer data, adding up to billions of dollars in terms of remediation costs, brand damage, loss of trust, and loss of sales. Although the methods of attack varied, most breaches exploited (and exposed) the inherent weakness of perimeter-centric network security, which traditionally focuses on protecting north-south traffic via perimeter firewalls. But what happens when a threat actually makes it past the perimeter firewall? In such instances, there are very few controls in place inside the data center to prevent it from spreading across east-west (i.e., server-to-server) traffic. With the growing sophistication of today’s modern threats, this has unfortunately become an all-too-common occurrence.

To attempt to solve this problem, many organizations have deployed an array of point products, creating a complex and disconnected web of systems that are inflexible, difficult to provision, and largely out of alignment with the applications they’re intended to protect. To make matters worse, the tools available to carry out malicious attacks have become extremely powerful and easy to use, enabling a broader range of actors to successfully breach their targets.

4

Secure Application Infrastructure Essentials

Page 5: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

IT NEEDS BOTH SECURITY AND AGILITY

To meet the expectations of business leaders and stakeholders, IT organizations must be able to deliver critical services and applications quickly, yet securely. However, as they strive to secure the business, IT teams face numerous obstacles, including:

• Changing application architectures, fromon-premises monolithic applications towarddistributed applications and microservices

• Lack of visibility and context of network traffic

• Rigid, perimeter-centric security modelsand policies

• Difficulty in achieving, maintaining, anddemonstrating compliance

BUSINESSES NEED AGILITY TO DRIVE GROWTH

As organizations seek to accelerate time to market and time to value for lines of business and other internal stakeholders, they also need to control security and manage risk more effectively. This means not only reducing the risk of a data breach, but also reducing the impact if a breach does occur. And therein lies the challenge: Dramatically improving security and compliance posture using conventional tools can often times negatively impact business agility. So how do you give IT teams the solutions and resources they need to keep pace with the speed of business operations while maintaining infrastructure security?

5

Secure Application Infrastructure Essentials

Page 6: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

ABSTRACTING APPLICATIONS FROM INFRASTRUCTURE DELIVERS ADVANTAGES

To address this challenge, organizations need to fundamentally transform the way they secure the application infrastructure. VMware offers a complete portfolio of solutions that enable IT teams to deploy a virtualized platform, which abstracts their infrastructure from the applications running on top of it—whether that infrastructure is on-premises or in the public cloud. With VMware vSphere® and VMware NSX®, organizations can take advantage of flexible, robust virtualization platforms to support their new and existing apps—without compromising security and compliance. VMware vRealize® Network Insight™ enhances their capabilities through enterprise-ready cloud management for additional visibility and protection.

6

VM VM

VM VM

VM VM

VM VM APP

VM VM

VM VM

VM VM

VM VM APP

VM VM

VM VM

VM VM

VM VM APP

“Abstraction layer”

Applications

Network, storage, and compute

Hypervisor layer

Network and security services in the hypervisor

THREE FUNDAMENTALS TO SECURING THE APPLICATION INFRASTRUCTURE

Employing a fresh approach to securing the application infrastructure lets IT organizations position themselves to take advantage of several powerful capabilities:

Abstraction of Applications from Infrastructure

Abstracting applications from infrastructure unlocks full visibility into the application data path for a better understanding of traffic patterns. It lets IT dramatically increase contextual understanding of how infrastructure and applications interact with one other as well as with data. With a complete and unified view of data, applications, and infrastructure, organizations can create policy and respond to threats more effectively.

Secure Application Infrastructure Essentials

Page 7: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

Granular Application-Aligned Security Policy

A virtualized approach lets organizations closely align security policies to the applications they are meant to protect, and follow them as they move across public and private clouds. It enables network micro-segmentation to prevent the lateral (east-west) spread of threats between workloads and applications. And it makes it easier to intelligently insert third-party security services into the platform when new capabilities are needed.

7

Hypervisor-Based Infrastructure Protection

A model that abstracts applications from the underlying infrastructure also provides an ideal point within the infrastructure to protect against compromising the infrastructure itself. Organizations can protect data at rest through workload-level encryption on each hypervisor host. And they can encrypt data in flight to mitigate the risk of compromised networking components like routers and switches.

Web App DB

VMVM

VMVM

VVM

VVM

VMVM

VMVM VMVM

VMVM

VVM

VVM

VMVM

VMVM VMVM

VMVM

VVM

VVM

VMVM

VMVM VMVM

VMVM

VVM

VVM

VMVM

VMVM

Web App DB

VM VM

VM VM

VVM

VVM

VM VM

VM VM VM VM

VM VM

VVM

VVM

VM VM

VM VM VM VM

VM VM

VVM

VVM

VM VM

VM VM VM VM

VM VM

VVM

VVM

VM VM

VM VM

Secure Application Infrastructure Essentials

Page 8: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

Secure Application Infrastructure Essentials

A PORTFOLIO OF CAPABILITIES TO SECURE APPLICATION INFRASTRUCTURE

No matter where an organization is along the virtualization journey, VMware offers industry-leading technologies that enhance application security environments.

VMware vSphere

To protect critical business resources in a virtualized environment, organizations need streamlined administration and operationally simple, policy-driven security capabilities.

VMware vSphere, the industry-leading virtualization platform, provides a powerful, flexible, and secure foundation for business agility that helps organizations accelerate the digital transformation to cloud computing. The solution supports both existing and next-gen apps through its simplified customer experience for automation and

management at scale; comprehensive, built-in security for protecting data, infrastructure, and access; and a universal app platform for running any app, anywhere. With vSphere, organizations can run, manage, connect, and secure their applications in a common operating environment, across clouds and devices.

VMware vSphere includes rich security features that help organizations protect their environments and mitigate issues if a breach does occur:

• Security at scale—Policy-driven security makessecuring infrastructure operationally simple.

• Encryption—VM-level encryption protectsunauthorized access to data, both at rest andin motion.

• Audit-quality logging—Enhanced loggingprovides forensic information about user actions.

8

Page 9: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

VMware NSX

To provide protection against today’s sophisticated threats, organizations need a virtual network environment that lets them divide the data center into logical segments.

If an attacker penetrates data center perimeter defenses, it’s critical to keep the threat from moving laterally within the data center. A virtualized approach lets IT teams define security policies for each workload, based on dynamic security groups, so they can respond immediately to threats inside the data center. VMware NSX is the network virtualization platform that delivers the operational model of a virtual machine for the data center network. With VMware NSX, organizations can programmatically create, snapshot, store, move, delete, and restore entire networks with the same point-and-click simplicity and speed of a virtual machine—delivering a level of security, agility, and availability that was unavailable with hardware-centric or traditional operational approaches. The solution lets organizations enforce security policies down to the individual virtual machine level.

VMware NSX supports organizations that want to unleash the security and performance advantages of virtualization. Key capabilities include:

• Security—Embedded security functions withinthe hypervisor deliver microsegmentation andgranular security to the individual workload.

• Automation—Network and security servicesare attached to workloads using a policy- driven approach, enabling automation andimproved performance.

• Application continuity—Networking isabstracted from the underlying hardware,attaching networking and security policiesto their associated workloads.

9

Secure Application Infrastructure Essentials

Page 10: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

vRealize Network Insight To manage a heterogeneous, hybrid cloud environment, organizations need an enterprise-ready cloud management platform that’s purpose-built for the environment.

vRealize Network Insight delivers intelligent operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks, and provides micro-segmentation planning recommendations and operations management for VMware NSX. vRealize Network Insight provides a wide range of features that can help organizations optimize security:

• Visibility—Provides converged visibility acrossoverlay and underlay, virtual and physical, privateand public cloud, with integration between virtualand physical layers.

• Micro-segmentation modeling applicationbehavior—Enables users to easily understandwho is talking to whom, and what flows need tobe allowed or blocked.

• Audit and compliance—Tracks all changes foraudit and compliance purposes.

10

Secure Application Infrastructure Essentials

Page 11: SECURE APPLICATION INFRASTRUCTURE ESSENTIALS...operations for Software-Defined Data Center (SDDC) networking and security, with converged visibility across virtual and physical networks,

Secure Application Infrastructure Essentials

VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.comCopyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: TS-0315 Secure Application Infrastructure Essentials

GET STARTED TODAY

Secure Your Application Infrastructure http://vmware.com/go/secure-app

SECURE YOUR APPLICATION INFRASTRUCTURE TODAY WITH VMWARE

Today’s IT organizations are facing unprecedented challenges driven by digital transformation and a fast-changing threat landscape. In this dynamic environment, it’s more important than ever to partner with a proven technology vendor to help ensure that business operations stay safe. VMware helps organizations transform their approach to security through a ubiquitous software layer across the application infrastructure. By abstracting the infrastructure from the applications that it supports, VMware enables IT to extend its visibility into the data path for better insight and control. Together with micro-segmentation, the solution helps organizations simplify security policy and better align protection to meet the needs of specific applications. VMware does it through a broad choice of security and virtualization

solutions, backed by an extensive partner ecosystem. With a robust security and compliance solution in place, organizations can free their IT teams to focus on driving growth and innovation across the business.

07/17

For more information contact: Partner name, Contact Name

Partner Website

Partner Email

Partner Value Proposition goes here.

Partner Phone