Citrix CTO Series - XenClient XT as an extensible open platform for innovation for the security of virtualization systems

10:05 AM
Citrix CTO Series - XenClient XT as an extensible open platform for innovation for the security of virtualization systems -

anti-malware products traditional suffered from some fundamental flaws that limit their effectiveness. First, based on the signatures is by definition a reactive approach; it can not be a signature until the malware exists. Second, it is impossible to guarantee detection of malware running with root privileges when the detection system is running at the same privilege level. In other words, if a rootkit is running in the supervisor, who is overseeing the supervisor?

That the threat landscape has changed is well known. The most significant change was moving search of strong sensations weekend warriors to a range of pirates with a variety of patterns, from disgruntled employees, political activists, professionals hacking for profit organizations. This change led an evolving attack vectors. While social activists "same old" are true, the quality of malware has changed. We can not wait aloud malware. We can not expect to detect the driver-level malicious code, since it is poorly written;. these guys are not blue-screening systems these days Worse, they know your systems best you

the safety and infrastructure converge "Who will inspect the!. supervisor"? The answer is in infrastructure. By creating this ecosystem, Citrix takes a big step forward for security in virtualized environments. This is an abandonment of the inspection of operating systems and applications. The ecosystem and suppliers that are able to embrace it represents a new paradigm in security. It is possible that the former inspect the root of the root "dilemma is disappearing (or" disappeared ").

The delivery method will be key. Customers of the largest enterprises SMEs, do not want to pick and choose the security to match infrastructure, applications and operating all of the height of the battery systems. This support method and choose-is long and full of patchwork solutions. It is also the money pit because it is intensive work with difficult to quantify the results; it creates integration efforts that add to the cost of security. In other words, clients want security that is integrated, from top to bottom of the stack. Virtualization, by the very definition of the hypervisor, provides secure space from which security can be applied. It is up to virtualization vendors to offer this security role.

Bolt safety will always be limits. Cooked in security has real consequences for suppliers who are able to work with infrastructure providers. Creating a tangible infrastructure, security awareness is a work that both infrastructure and security vendors share. The safety of the software defined data center is part of the ecosystem. Finally, we may be able to agree that the idea of ​​"security by design" is possible.

Citrix XenClient® XT implement "security by design" through a flexible architecture that is designed to provide extreme security and isolation for the public sector and other highly regulated environments. It uses a hardenedType Xen®-1 client hypervisor project that runs on bare metal to maximize security without compromising performance. Security features such as hardware-assisted start-confidence and disk encryption from the platform Intel® vPro ™ ensure only authorized users have access to sensitive data. More importantly, an open architecture enables partners and other third parties to extend the XT platform XenClient to provide additional value-added capabilities. Taken together, these capabilities are transforming Citrix XenClient® XT in a flexible platform, scalable security that offers integrated security for a leap forward in security.

The Citrix Virtualization Client Group actively participated in various activities to form a new virtualization security ecosystem based off of the platform XenClient XT. We worked closely with various security vendors by sharing our virtualization and security experiences with them.

An example of this is the VCD-IA pack extension from Adventium Labs, which was built above the Citrix XenClient XT platform for additional defensive capabilities. Another example implementation is Bitdefender which showed a demo VM implementation retrospection memory services built on top of the Xen® hypervisor project to protect guest virtual memory against malicious infection memory operations to Citrix Synergy Los Angeles 2013. " Citrix introduces a very attractive ecosystem based on XenClient XT for security vendors to go beyond traditional test paradigm. ," said Robert Krauss, director of strategic alliances, Bitdefender.

This new virtualization security ecosystem being built over Citrix XenClient XT platform through security vendors and other third parties increases the strongest available security capabilities Citrix XenClient XT to protect highly regulated environments. Download and evaluate XenClient XT for free in your own environment and learn more about the latest version of XenClient XT!

Join the conversation by connecting with Citrix XenClient team online!

See XenClient XT product page

  • Try XenClient XT with a free 0-day trial
  • Follow us on Twitter
  • Like us on Facebook
  • Visit our technical Forum XenClient XT

about the author

Ahmed Sallam is a Vice-President CTO and technology leader strategy and cross-functional Citrix solutions in an emerging new era of smart devices, IoT IoE, system virtualization, physicalization and server security. Its focus is on the new end to end solutions emerging from devices to networks to cloud through Citrix product lines. Ahmed resulting intellectual property opportunities for growth and monetization strategy comes as Citrix. He works closely with software and hardware ecosystem partners including Citrix in open platforms. He served as CTO and vice president of product strategy for client virtualization. Ahmed is a renowned expert in well-known industry for new cutting-edge security and management models oriented computer system providing a flexible virtualization experience, well-managed and secure computer with high security guarantees. Ahmed holds 25 issued patents and over 40 patent applications issued and pending

Ahmed Follow on Twitter :. Https://twitter.com/ahmedsallam

View Ahmed LinkedIn profile: www. linkedin.com/in/ahmedsallam

Previous
Next Post »
0 Komentar