Friday 24th April
Keynote Presentation by Guido Appenzeller, Chief Technology Strategy Officer for Networking and Security
‘The Next Horizon for Cloud Networking and Security’
Friday 24 th April Keynote Presentation by Guido Appenzeller, Chief - - PowerPoint PPT Presentation
Friday 24 th April Keynote Presentation by Guido Appenzeller, Chief Technology Strategy Officer for Networking and Security The Next Horizon for Cloud Networking and Security The Next Horizon for Cloud Networking and Security Guido
Keynote Presentation by Guido Appenzeller, Chief Technology Strategy Officer for Networking and Security
‘The Next Horizon for Cloud Networking and Security’
The Next Horizon for Cloud Networking and Security
Guido Appenzeller
Chief Technology & Strategy Officer Networking & Security VMware
Evolution of Compute vs Evolution of Networking
4 CPU System Software
Operating System
Chip System Software CPU System Chip System Software
OS OS OS Compute Virtualization
Software CPU System Software
Mainframe / Workstation
Chip System Software
Compute Networking
CPU System
Software
Chip System Software
Cloud OS OS OS Compute Virtualization
Software
Orchestration & Management Client Server
Revolution in Networking
CONFIDENTIAL
5
Revolution in Networking
6
Evolution of Software Defined Networking
7
2008 2015 Research
Products & Architecture
2016 2010 2012 2014 Network Virtualization has become mainstream.
Architectural Battles
NSX 2014 Customer & Business Momentum
8
Production Deployments
(adding 25-50 per QTR)
NSX Customers
% of Top Banks Adopting NSX
Software Defined Network is the big moment to create the unified way of operating and teaming
Network Security Operations Storage Servers Audit
Software Defined Network is the big moment to create the unified way of operating and teaming
Cloud Business
Network Automation Nirvana
DevOps Mentality + Rich APIs + Scripting
Virtual infrastructure 3rd Generation Apps and Cloud State of Network Virtualization and SDN
Two Tier Infrastructure Model
VM or server workloads and network are separate security domains Physical Servers Physical Network Infrastructure
Internet
Two Tier Infrastructure Model
VM or server workloads and network are separate security domains
Virtual Machines Physical Network Infrastructure
Internet
Two Tier Infrastructure Model
VM or server workloads and network are separate security domains
Virtual Machines
Virtual Infrastructure
Physical Network Infrastructure
Internet
Virtual Infrastructure
Virtualizing the Network and Security
Physical Network Infrastructure
Internet
Virtual Machines
Virtual Infrastructure
Switches (L2) Routers (L3) Load Balancer Firewall (Security)
Virtual Infrastructure
What else can we do with virtual infrastructure?
Physical Network Infrastructure
Internet
Virtual Machines
Virtual Infrastructure
g
storage
Why virtual infrastructure?
18
Security Automation Application Continuity
Perimeter-focused security
19
Unconstrained Communication
Little or no lateral controls inside perimeter
Sophisticated attackers bypass perimeter defenses. The initial system that is compromised, is often of lowvalue. Because of a lack of internal controls, attackers can move around the data center freely and over time infect systems with sensitive data. 10110100110 101001010000010 1001110010100 Attackers gather and exfiltrate data over weeks or even months.
Internet
Data Center Perimeter
Micro-Segmentation
20
Why can’t we have individual firewalls for every VM?
Data Center Perimeter
Internet
Cost prohibitive with complex configurations
Physical firewalls
Slower performance, costly and complicated
Virtual firewalls
With traditional technology, this is operationally infeasible.
Secure Micro-Segmentation in the Data Center
2 1
Internet
Security Policy
Perimeter Firewalls
Cloud Management Platform
Security: Protected Domain
22
Endpoint Virtualization Network Virtual Machine VM VM Protected Domain Hypervisor Application
Secure Data Secure Audit Provision Keys Verify Signature Trusted Module Trusted Module
The hypervisor can bridge the context / isolation gap
Web Tier App Servers Database
Load Balancer Firewall
Policy & Security
Allow PCI Data to be stored on this server Hypervisor based IDS Allow TCP Port 3306 Allow TCP Port 80 Network Encryption to DB Hypervisor based IDS Allow TCP Port 443 Deny All Provision: SSL Certificate Hypervisor based IDS
Microsegments as a Policy Primitive
Firewall
…
Why virtual infrastructure?
24
Automation Security Application Continuity
Physical Network Infrastructure Application Workloads Virtual Infrastructure
Internet
Automation
25
Platform Services Enable Robust Ecosystem
26
We expect the vast majority of this functionality to come from partners Physical Network Infrastructure Applications and End Hosts
Internet
Virtual Infrastructure
Self Service IT: Driving IT Agility
27 Provider
Automation by IT for IT
Cloud Consumer
Automation by IT for End user
Automation by IT for External Use
27
Why virtual infrastructure?
28
Application Continuity Automation Security
Hardware Refresh
Viertual infrastructure decouples applications from hardware
Virtual Machines
Virtual Infrastructure
Physical Network Infrastructure
Internet
Isolation
Backup Site
Physical Network Infrastructure Application Workloads Virtual Infrastructure 30
Original Site
Physical Network Infrastructure Application Workloads Virtual Infrastructure Internet Internet
Desaster Recovery
Network configuration becomes easily replicable once it is software defined
Virtual infrastructure 3rd Generation Apps and Cloud State of Network Virtualization and SDN
3rd Platform Apps
How are these apps different?
stored in a service
abstractions
What does this mean for networking and security infrastructure?
32
Host Hypervisor
Containers
Containers emerging as the application management layer of choice
Applications App Framework OS Applications App Framework OS Applications App Framework OS App Framework OS
Application Containers VM Applications
Application Containers Host
App App App App App App App App App Containers
Container Networking
Containers run inside of VMs
security domain
Does this make sense? It actually does…
34
Enterprise Model Today
VM
Container Container Container Container
Hypervisor VM
Container Container Container Container
vSwitch
Container Networking
Two levels of vSwitch
container VM
Hypervisor
35
In the future, container level visibility
VM
Container Container Container Container
Hypervisor VM
Container Container Container Container
vSwitch vSwitch vSwitch
Physical Network Infrastructure Internet
Server
Container Container Container Container
vSwitch Server
Container Container Container Container
vSwitch Server
Container Container Container Container
vSwitch
Containers – do we still need a Hypervisor?
Without Hypervisor:
container
to get root access on container host
to the physical network
36
Without a hypervisor, attackers can spread
37 37
Hypervisor Hypervisor Hypervisor Guest
Container Container Container Container
Guest
Container Container Container Container
vSwitch vSwitch Guest
Container Container Container Container
vSwitch
Physical Network Infrastructure Internet
Containers – do we still need a Hypervisor?
Hypervisor provides a security control point
With Hypervisor:
from container to vSwitch
network access
limited
Three Tier Model
38
Containers still need virtual infrastructure
Physical Network Infrastructure Applications and End Hosts Internet Virtual Infrastructure
Container Container Container Container Container Container Container Container Container Container Container Container
Power of cloud: workload mobility
Lock-in through services
Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service
Cloud: Just new Silos?
Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service
Virtual Infrastructure
BYOI – Bring your own infrastructure
Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service Storage Service Load Balancin g Service Firewall Service
Clouds Datacenter #2
InternetPhysical Network Infrastructure
InternetDatacenter #1
Physical Network Infrastructure
Virtual Infrastructure for the SDDC and Cloud
43
Virtual Infrastructure Layer
Thank you