Top Banner
Virtualize your Network with VMware NSX NET3305-S Martin Casado, VMware, Inc
38
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: VMworld 2014: Virtualize your Network with VMware NSX

Virtualize your Network with VMware NSX

NET3305-S

Martin Casado, VMware, Inc

Page 2: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 2

Disclaimer• This presentation may contain product features that are currently under development.

• This overview of new technology represents no commitment from VMware to deliver these features in any generally available product.

• Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind.

• Technical feasibility and market demand will affect final delivery.

• Pricing and packaging for any new technologies or features discussed or presented have not been determined.

Page 3: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 3

Traditional Data Center

Any Application

L2/L3 or Proprietary Network

Guidance from GiantsModern SaaSData Center

Custom Application

IP Network

SecurityFault IsolationService ChainingDiscoveryLoad balancing

SecurityFault IsolationService ChainingDiscoveryLoad balancing

Opex/Capex = $$$$Innovation = HW design cycle

Opex/Capex = $Innovation = SW design cycle

Page 4: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 4

What is VMware NSX?

Internet

Page 5: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 5

What is VMware NSX?

Page 6: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 6

Internet

What is VMware NSX?

Page 7: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 7

Internet

What is VMware NSX?

Page 8: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 8

Internet

What is VMware NSX?

Page 9: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 9

VMware NSX Momentum: Customers

4of 5top investment banks enterprises & service providers

Leading global

Page 10: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 10

Three Reasons Companies Virtualize Their Network…

Speed – On Demand Apps and Services11

Economics – Opex Efficiency & Capex Cost Savings22

Security – Re-Architect Datacenter Security33

Page 11: VMworld 2014: Virtualize your Network with VMware NSX

Security Use Case

Page 12: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 12

2010 2011 2012 2013IT Spend Security Spend Security Breaches

A Picture of Diminishing ReturnsThe only thing outpacing security spend is security losses

Page 13: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 13

A Modern AttackMalware/attack vectors tested against known signatures & are often VM-aware

11Human Recon

22Attack Vector R&D

33Primary Attack

1 PREP

Page 14: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 14

44CompromisePrimary Entry Point(Phishing, Waterholes, etc.)

55Install Command& Control I/F

Strain BDormant

Strain AActive

2 INTRUSION

Leverage endpoints that circumvent perimeter controls

Page 15: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 15

66Escalate Privileges onPrimary Entry Point

3 RECON

Strain AActive 77

Lateral Movement

88Install C2 I/FWipe TracksEscalate Priv

88

88

Leverage hyper-connected computing base, accessible topology info & shared components

Page 16: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 16

99Wake Up & ModifyNext Dormant Strain

Strain AActive

4 RECOVERY

Attack Identified Response

Strain BActive

Strain CDormant

Sensor, alerts and logs easily accessible

Page 17: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 17

5 ACT ON INTENT

1010Break into Data Stores

1111Parcel &Obfuscate

1212Exfiltrate

1313Cleanup

6 EXFILTRATION

Exploit weak visibility and limited internal control points

Page 18: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 18

The modern kill chain is highly targeted, interactive, and stealthy

13Cleanup

Page 19: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 19

A Modern Kill Chain… is highly targeted, interactive and stealthy

INTRUSION2 RECOVERY4 ACT ON INTENT5 EXFILTRATION6RECON3IPREP18

Install C2 I/FWipe TracksEscalate Priv.

9Wake Up & Modify Next Dormant Strain

10Break into Data Stores

11Parcel & Obfuscate

12Exfiltrate

13Cleanup5

Install Command & Control (C2) I/F

6Escalate Privileges on Primary Entry Point

7Lateral Movement

8

8

1Recon

2Attack Vector R&D

3Primary Attack

4Compromise Primary Entry Point

Strain AActive

Strain BDormant Strain B

Active

Strain CDormant

Attack Identified

Response

Perimeter-Centric80% of resources focusedon preventing intrusion

Limited visibility and controlinside the datacenterto detect and respond to attacks

Page 20: VMworld 2014: Virtualize your Network with VMware NSX

Micro-Segmentation with NSX

Page 21: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 21

Page 22: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 22

Problem: Data Center Network SecurityPerimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible

Little or nolateral controls

inside perimeter

Internet Internet

Insufficient OperationallyInfeasible

Page 23: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 23

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 24: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 24

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 25: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 25

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 26: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 26

Using Network Virtualization For Micro-Segmentation

Internet

Security Policy

Perimeter Firewalls

CloudManagementPlatform

Page 27: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 27

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 28: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 28

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 29: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 29

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 30: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 30

Using Network Virtualization For Micro-Segmentation

Internet

Perimeter Firewalls

CloudManagementPlatform

Page 31: VMworld 2014: Virtualize your Network with VMware NSX

Looking Into the Future

Page 32: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 32

The “Goldilocks Zone”

Too Hot Too Cold

Page 33: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 33

Trading Off Context and Isolation

Software DefinedData Center (SDDC)

Any Application

SDDC Platform

Any x86

Any Storage

Any IP network

Data Center Virtualization

High Context Low Isolation

High IsolationLow Context

No Ubiquitous Enforcement

Traditional Approach

Page 34: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 34

Delivering Both Context and Isolation

Software DefinedData Center (SDDC)

Any Application

SDDC Platform

Any x86

Any Storage

Any IP network

Data Center Virtualization

High ContextHigh IsolationUbiquitous Enforcement

Secure Host Introspection

Page 35: VMworld 2014: Virtualize your Network with VMware NSX

CONFIDENTIAL 35

Broad Impact Across Many Security Verticles

Gain previously impossible vulnerability intelligence based on application purpose, data class and user roles to drive rich, policy driven response, including in-place quarantine.

Vulnerability Management Malware Protection Network ProtectionReal-time, dynamic threat response that follows applications as they migrate between hosts, data centers and cloud environments.

Leverages platform to move IPS features from dedicated edge function to distributed enforcement with rich, policy-driven response, including in-place quarantine.

Page 36: VMworld 2014: Virtualize your Network with VMware NSX

Thank You

Page 37: VMworld 2014: Virtualize your Network with VMware NSX

Fill out a surveyEvery completed survey is entered

into a drawing for a $25 VMware company store gift certificate

Page 38: VMworld 2014: Virtualize your Network with VMware NSX

Virtualize your Network with VMware NSX

NET3305-S

Martin Casado, VMware, Inc