13.07.2015 Views

Extending Traditional Security to VDI: Are Your ... - Trend Micro

Extending Traditional Security to VDI: Are Your ... - Trend Micro

Extending Traditional Security to VDI: Are Your ... - Trend Micro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Security</strong> Risks of <strong>Extending</strong> <strong>Traditional</strong> <strong>Security</strong>One of the core benefits of implementing <strong>VDI</strong> is the ability <strong>to</strong> quickly generatea virtual desk<strong>to</strong>p image instead of installing each instance from scratch. If ITdepartments simply extend traditional security <strong>to</strong> virtual desk<strong>to</strong>ps, duplicateimages will inevitably update their security software or initiate full systemscans at the same time, leading <strong>to</strong> a bandwidth problem known as “resourcecontention” or a “security s<strong>to</strong>rm.”Common but improper work-arounds include randomizing or disabling antivirusscanning and updating. When IT administra<strong>to</strong>rs disable security functions atthis level, they are, in effect, entrusting desk<strong>to</strong>p security <strong>to</strong> network firewallsand intrusion detection systems (IDSs).“With <strong>VDI</strong>, numerous desk<strong>to</strong>ps sharethe host’s hardware resources, often ata ratio of 60 <strong>to</strong> 1 or higher.”— <strong>Trend</strong> <strong>Micro</strong>,“Securing <strong>Your</strong>Virtual Desk<strong>to</strong>pInfrastructure”In such a situation, the unprecedented speed by which cybercriminals createmalware—3.5 new threats every second—render virtual desk<strong>to</strong>ps vulnerable <strong>to</strong>attacks.Unlike virtualized servers, virtual desk<strong>to</strong>ps comprise a broader attack surfacebecause each instance is a potential entry point. User behaviors such asindiscriminately downloading programs and documents, surfing the Web, andclicking links do not help. Without protection for even a small amount of time,VM images can inadvertently introduce threats <strong>to</strong> corporate networks.Zero-Day Exploits and the “Zero-Day Effect”Zero-day exploits are deployed in the wild by cybercriminals or used in targetedattacks <strong>to</strong> exploit unpatched or unknown software vulnerabilities. Resourcecontention work-arounds that turn off protection or delay security force ITadministra<strong>to</strong>rs <strong>to</strong> effectively face the same zero-day risks even if patches arealready available and despite deploying security products.Widely used applications from <strong>Micro</strong>soft, Adobe, and even Apple have all beenfound <strong>to</strong> carry software vulnerabilities that are crucial <strong>to</strong> cybercrime attacksbecause these allow au<strong>to</strong>matic command execution. 4Cus<strong>to</strong>mized Highly Targeted AttacksAdvanced persistent threats (APTs) target companies and organizations inorder <strong>to</strong> steal confidential information. These campaigns frequently begin withsocial engineering attacks as mundane as sending out cus<strong>to</strong>mized emails withexploit attachments.After moni<strong>to</strong>ring APTs for one month, <strong>Trend</strong> <strong>Micro</strong> found that the mostexploited <strong>Micro</strong>soft Office software was <strong>Micro</strong>soft Word (see Figure 2). 5Furthermore, both relatively new (e.g., CVE-2012-0158) 6 and old (e.g.,CVE-2010-3333) 7 vulnerabilities have been leveraged.Figure 2. Most exploited <strong>Micro</strong>softsoftware by targeted attacks in April 2012Exploits for vulnerabilities in Adobe Acrobat Reader and Flash Player have alsobeen used in various APT campaigns such as LURID, 8 SYKIPOT, 9 and IXESHE. 104 http://blog.trendmicro.com/2011-in-review-exploits-and-vulnerabilities/5 http://blog.trendmicro.com/snapshot-of-exploit-documents-for-april-2012/6 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-01587 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-33338 http://blog.trendmicro.com/trend-micro-exposes-lurid-apt/9 http://blog.trendmicro.com/the-sykipot-campaign/10 http://blog.trendmicro.com/taking-a-bite-out-of-ixeshe/EXTENDING TRADITIONAL SECURITY TO <strong>VDI</strong> 2


TREND MICRO<strong>Trend</strong> <strong>Micro</strong> Incorporated (TYO: 4704; TSE: 4704), a global cloudsecurity leader, creates a world safe for exchanging digital informationwith its Internet content security and threat management solutions forbusinesses and consumers. A pioneer in server security with over20 years’ experience, we deliver <strong>to</strong>p-ranked client, server and cloudbasedsecurity that fits our cus<strong>to</strong>mers’ and partners’ needs, s<strong>to</strong>psnew threats faster, and protects data in physical, virtualized andcloud environments. Powered by the industry-leading <strong>Trend</strong> <strong>Micro</strong>Smart Protection Network cloud computing security infrastructure,our products and services s<strong>to</strong>p threats where they emerge—from theInternet. They are supported by 1,000+ threat intelligence expertsaround the globe.TRENDLABS SM<strong>Trend</strong>Labs is a multinational research, development, and supportcenter with an extensive regional presence committed <strong>to</strong> 24 x 7 threatsurveillance, attack prevention, and timely and seamless solutionsdelivery. With more than 1,000 threat experts and support engineersdeployed round-the-clock in labs located around the globe, <strong>Trend</strong>Labsenables <strong>Trend</strong> <strong>Micro</strong> <strong>to</strong> continuously moni<strong>to</strong>r the threat landscapeacross the globe; deliver real-time data <strong>to</strong> detect, <strong>to</strong> preempt, and <strong>to</strong>eliminate threats; research on and analyze technologies <strong>to</strong> combat newthreats; respond in real time <strong>to</strong> targeted threats; and help cus<strong>to</strong>mersworldwide minimize damage, reduce costs, and ensure businesscontinuity.©2012 by <strong>Trend</strong> <strong>Micro</strong>, Incorporated. All rights reserved. <strong>Trend</strong> <strong>Micro</strong> and the <strong>Trend</strong> <strong>Micro</strong> t-balllogo are trademarks or registered trademarks of <strong>Trend</strong> <strong>Micro</strong>, Incorporated. All other produc<strong>to</strong>r company names may be trademarks or registered trademarks of their owners.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!