Virtual Server Security for VM Ware

Page 1

Helps customers to be more cost-effective, compliant and secure by delivering integrated and optimized security for virtual data centers

IBM Virtual Server Security for VMware

Virtualization offers significant benefits

Highlights ■

Enforces dynamic security

to the IT organization, but many existing security solutions are not optimized to Helps to accelerate and simplify

wherever virtual machines

your Payment Card Industry

(VMs) are deployed

Data Security Standard (PCI DSS) audit, and achieve

Provides multilayered intrusion

compliance with security and

prevention and firewall

reporting functionality cus­ tomized for the virtual

infrastructure

Increases virtual server uptime and availability with virtual rootkit detection

work in the virtual environment and may leave organizations at risk of not meet­ ing compliance mandates. Instead of complementing the virtual infrastructure, some security agents drain resources and add management overhead. IBM Virtual Server Security for VMware® offers integrated threat pro­ tection for VMware vSphere™ 4 that

Helps reduce cost and com­ plexity over using physical security solutions in virtual infrastructures with automatic protection features

provides protection for every layer of the virtual infrastructure, including host, network, hypervisor, virtual machine (VM) and traffic between VMs. The solution leverages VMware VMsafe™ integration to offer protection that is scalable, isolated, centralized, visible and efficient.


Transparent intrusion prevention and

Virtual network access control

application and virtual security all built

firewall

IBM Virtual Server Security for VMware

on the same core technology, enter­

IBM Virtual Server Security for VMware

performs virtual network access control

prises gain even greater security visibil­

provides multilayered IPS and firewall

to quarantine or limit network access

ity and control from an efficient,

technology to protect the virtual data

from a virtual server until VM security

scalable platform.

center in a solution that is purpose-built

posture has been confirmed.

to protect the virtual environment at the core of the infrastructure.

The IBM Proventia® Management Virtual infrastructure auditing

SiteProtector™ system offers a simpler,

IBM Virtual Server Security for VMware

cost-effective way to manage security

Automatic discovery

reports on privileged user activity such

solutions and ease regulatory compli­

Virtual servers operate in a dynamic

as VMotion events, VM state changes

ance by providing a central manage­

state which can render traditional secu­

(start, stop, pause) and login activity

ment point to control security policy,

rity technology ineffective. With

which can reduce the preparation time

analysis, alerting and reporting for your

IBM Virtual Server Security for VMware,

required to support audits.

business and is supported on VMware

the security virtual machine can perform

ESX. Designed for simplicity and flexibil­

automatic discovery of all VMs. This

IBM Virtual Patch technology

ity, the SiteProtector system can

helps increase security awareness and

Automatically protects vulnerabilities on

provide centralized configuration, man­

visibility across the virtual environment.

virtual servers regardless of patch

agement, analysis and reporting for the

strategy.

full IBM Internet Security Systems™

VM rootkit detection

(ISS) Proventia product family, along

Virtualization-based rootkits are particu­

Harnessing the power of enterprise

with IBM Virtual Server Security for

larly worrying because they can cause

security control

VMware.

the hypervisor to become malware, and

While virtualization continues to expand,

can conceal themselves from traditional

organizations are still taking a hybrid

Features and Benefits

security tools. IBM Virtual Server

approach to IT, and physical server

Enforces dynamic security wherever

Security for VMware transparently

boxes and network connections will

VMs are deployed

inspects VMs to detect installation of

continue to exist and require protection.

rootkits.

IBM encourages clients to take a

defense-in-depth approach to enter­ Inter-VM Traffic Analysis

prise security. The IBM Virtual Server

While traditional host and network intru­

Security for VMware solution provides

sion prevention systems do not have

defense-in-depth for the virtual infra­

visibility into traffic between VMs,

structure, but it is also one layer of a

IBM Virtual Server Security for VMware

larger enterprise security strategy. With

monitors traffic between virtual servers

IBM, clients can benefit from world

to stop threats before impact.

class security technology designed to protect every layer of the IT environ­ ment. With network, host, endpoint,

Provides multilayered intrusion pre­ vention and firewall to offer defense-in-depth, visible security Enforces automatic VM discovery in order to reduce VM sprawl Provides VM rootkit detection and virtual infrastructure auditing Offers inter-VM traffic analysis


Helps to accelerate and simplify your

compliance by providing a central man­

security content updates to IBM ISS

PCI DSS audit, and achieve compliance

agement point to control security policy,

products, the X-Force team also pro­

with security and reporting functionality

analysis, alerting and reporting for your

vides the IBM Internet Security

customized for the virtual infrastructure

business and is supported on VMware

Systems X-Force Threat Analysis

ESX. Designed for simplicity and flexibil­

Service (XFTAS). The XFTAS delivers

ity, the SiteProtector system can

customized information about a wide

provide centralized configuration, man­

array of threats that could affect your

agement, analysis and reporting for the

network through detailed analysis of

full IBM ISS Proventia product family,

global threat conditions.

Quarantines or limits network access until VM security posture can be validated Offers dashboard visibility into the virtual host OS and the virtual net­ work to identify vulnerabilities Enables network-level workload isolation

along with IBM Virtual Server Security for VMware.

Why IBM? IBM Virtual Server Security for VMware

Improving virtual security with

was purpose-built to protect the

IBM Internet Security Systems X-Force

virtual data center at the core of the

Helps reduce cost and complexity over

research

infrastructure—without decreasing sys­

using physical security solutions in vir­

IBM ISS security excellence is driven by

tem efficiency or performance. Along

tual infrastructures with automatic pro­

the world-renowned X-Force® team.

with superior protection, IBM Virtual

tection features

The X-Force team’s primary security

Server Security for VMware helps

intelligence is infused into IBM security

clients meet regulatory compliance

solutions. Whether a physical 1U appli­

standards by limiting access to critical

ance or a piece of software installed on

data housed on virtual machines and

a virtual machine, IBM solutions are

tracking user access. IBM offers a com­

backed by the same security intelli­

plete security portfolio—including lead­

gence and threat content, developed

ing protection technologies for the

by the X-Force team. The X-Force team

physical server environment, endpoints,

is one of the of the oldest and best-

the network core, applications and

known commercial security research

more. With IBM, virtual security can be

groups in the world. This leading group

managed centrally alongside existing IT

Gaining efficiency with the IBM Proventia

of security experts researches and eval­

security technology, so clients can real­

Management SiteProtector system

uates vulnerabilities and security issues,

ize greater efficiency and scalability.

IBM Proventia Management

develops assessment and countermea­

IBM brings comprehensive, end-to-end

SiteProtector system offers a simpler,

sure technology for IBM Internet

security to virtualization, enabling you to

cost-effective way to manage

Security Systems products, and edu­

more quickly realize the benefits of vir­

security solutions and ease regulatory

cates the public about emerging

tualization technology.

Reduces system administrator workload with automatic protec­ tion, discovery and assessment features Leverages IBM Virtual Patch® technology to automatically protect vulnerabilities on virtual servers regardless of patch strategy

Internet threats. In addition to providing


© Copyright IBM Corporation 2009

Requirements Platform

For more information To learn more about IBM Virtual Server Security for VMware, please contact your IBM representative or IBM Business Partner, or visit the following Web site: ibm.com/services/security

X86 servers with VMware vSphere 4

IBM Global Services Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America November 2009 All Rights Reserved IBM, the IBM logo, ibm.com, Proventia, SiteProtector, Virtual Patch and X-Force are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml VMware is the registered trademark of VMware, Inc. in United States and perhaps in other countries. The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the reader may have to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. Other company, product or service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates.

SED03097-USEN-00


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.