[et_pb_section bb_built=”1″ fullwidth=”on” _builder_version=”3.0.82″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/10/app-secure.jpg” background_position=”center_right” background_blend=”darken” custom_padding=”0px|0px|0px|0px”][et_pb_fullwidth_header title=”Ensuring Application Security With VMware AppDefense” text_orientation=”center” header_fullscreen=”on” title_font_color=”#ffffff” background_overlay_color=”rgba(0,0,0,0.42)” _builder_version=”3.0.82″ title_font=”Droid Serif||||” title_font_size=”37px” /][/et_pb_section][et_pb_section bb_built=”1″ _builder_version=”3.0.65″ custom_padding=”12px|0px|0px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|0px|2px” _builder_version=”3.0.65″][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.65″ text_font=”Droid Serif||||” text_font_size=”18px”]

 

“Cybersecurity today is very similar to the way parents approach child development,” declared VMware’s Senior Vice President, Security Products Group, Tom Corn, as he kicked off his spotlight session at VMworld 2017 in Las Vegas. The session was designed to highlight VMware’s new security solution, VMware AppDefense™, and Corn’s analogy for explaining the current state of application security piqued the interest of his audience.
“A first child is treated like glass,” Corn continued. Anything and everything is a threat. Parents strive to set up a safe environment for their child. That starts at the hospital, with clear and focused rules for who gets into the nursery to interact with that child.
As Corn explained, this is not unlike the traditional approach to application security. But the last time organizations had an effective perimeter defense was when applications were monolithic stacks. Conventional firewalls and other “old school” security measures were sufficient, then. “But,” Corn said, “that hasn’t been true for quite some time.”
Corn continued his child-rearing analogy: As a child grows, the parents’ understanding of their child grows too. They learn when to stop chasing threats and calling their physician, or obsessively consulting WebMD about threats that don’t really exist. They learn what their pediatrician already knows, said Corn, “Some kids are hot, some not; some kids cry, some don’t.”
It’s when something really changes from their child’s normal state, that’s when they learn to call the doctor for help. And they learn that this partnership drives effective care.
This is the kind of security strategy needed today.

Shrinking the Attack Surface

Today, applications are dynamic, distributed systems—essentially mini-networks in themselves—and are highly complex. They are typically composed of multiple endpoints with a number of compute processes communicating across individual components at all times.
To provide truly effective security, organizations need ways to shrink the attack surface that modern apps expose, and find ways to align security controls to the applications as they move around environments. “This is our goal and strategy,” Corn said. It’s a strategy based on using virtualization to leverage one of the oldest principles in cybersecurity, least privilege.
VMware’s strategy now applies that same principle to the compute infrastructure. “By understanding the intended purpose of an application,” Corn said, “we can shrink the attack surface by focusing on ‘ensuring good,’ rather than ‘chasing bad.’”
The result is AppDefense, a new security solution that leverages the unique properties of virtualization to protect applications running in virtualized and cloud environments.

A Three-Part Security Model

AppDefense provides a three-part security model: capture, detect, and respond.

  1. Capture. The organization sets the rules and policies when establishing the application. This provides a baseline “approved” behavior and dictates what an application can do.
  2. Detect. Once parameters are set, AppDefense automatically detects any variation from the norm. It creates a zone to isolate and monitor unusual application behaviors and compare them to the app’s intended role in the manifest. If AppDefense determines that the behavior of the application is different from the intended state, it automatically sends a bright signal alerting the organization’s Security Operations Center (SOC).
  3. Respond. Once the anomaly is detected, AppDefense automatically triggers an orchestrated incident response routine for the SOC. This facilitates immediate collaboration between the security teams in the SOC and the application teams.
    “It enables the security ecosystem to ‘architect in’ solutions,” Corn said. “We expose the logical boundary, so our partners can insert solutions.”

    Demonstrating VMware AppDefens
    e

    In the second half of his session, Corn showcased how AppDefense works in the real world with a series of three demonstrations using a live application setup.
    The demonstrations illustrated three components of common attacks: exploitation, extraction, and exfiltration. In each demo, Corn showed how the attack was prevented because a behavior did not correspond to AppDefense’s pre-set manifest.

    Bringing Up Baby: Ensuring Good or Chasing Bad.

    Corn ended his presentation by saying that VMware had identified millions of bad behaviors that could possibly impact VMware’s network systems worldwide. But, he concluded, “Using AppDefense, we identified 91 intended behaviors that we’re protecting, instead of defending against 27 million potential bad behaviors.”
    Between the two—ensuring good or chasing bad—it was clear which is more efficient.

    Watch a light board session with Tom Corn, illustrating how VMware AppDefense works.

    An earlier vesion of this article appered here.

[/et_pb_text][et_pb_image _builder_version=”3.0.65″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%” _i=”1″ _address=”1.0.0.1″ /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” background_color=”#8d8c91″ _builder_version=”3.0.65″ custom_padding=”4px|0px|20px|0px”][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”10px|0px|27px|0px” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” _i=”0″ _address=”2.0″][et_pb_column type=”4_4″][et_pb_cta title=”Pulling the plug doesn’t have to be your only security solution.” button_url=”https://www.mdsny.com/contact/” button_text=”Contact Us” use_background_color=”off” _builder_version=”3.0.65″ header_font=”Droid Sans|on|||” header_font_size=”31px” body_font=”Droid Sans||||” body_font_size=”19px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#2d3743″]

Don’t become part of a rising statistic — ensure your company is armed against a security hack.

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]