Complete User Protection
Consumerization IT Work Load 2
Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3
Now! File/Folder & Removable Media Email & Messaging Web Access Device Hopping Cloud Sync & Sharing Collaboration Social Networking Employees IT Admin 4
IT Workload Increasing More complex compliance Many more environments IT Admin 5
A Gradual Transition to the Cloud 25% of Office customers now have Office 365. Microsoft, April 2013 6
Attackers
Attackers
Increased Opportunity for Threats and Data Loss
Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2013 Trend Micro Inc. 10
Customers need a range of capabilities Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP 11
but don t want lots of consoles! No interconnected threat response!#$%*?! Higher cost Reduced timeliness Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Higher workload IT Admin 12
Suite vendors help improve this Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP 13
Trend Micro s Complete User Protection solution 14
File/Folder & Removable Media Web Access Email & Messaging Device Hopping Cloud Sync & Sharing Collaboration Social Networking Employees Anti-Malware Content Filtering Data Loss Prevention Encryption Device Management Application Control Complete User Protection Security IT Admin 15
827M in March 2014 Sandboxing Device Control Behavior Monitoring Forensics DLP Encryption File Reputation Network Vulnerability Protection Web Reputation Web Gateway Unpacking Email Reputation Email Gateway or Server Memory Inspection Command & Control Blocking 284M in March 2014 Application Whitelisting SharePoint Server
How does Trend Micro stand out? Smarter Protection More Flexible Management & Licensing 17
It s not about traditional AV anymore 18
Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2013 Trend Micro Inc. 19
Trend Delivers Better Protection DEVICE POLICY ENCRYPTION DLP SIG-BASED Employee Data Leaks Traditional malware WEB REP SANDBOXING SANDBOXING COMMAND&CONTROL BLOCK BEHAVIOR MONITORING VULNERABILITY PROTECTION BROWSER EXPLOIT PROTECTION New! APPLICATION CONTROL New! Vulnerability exploits Advanced Malware Targeted Attacks 20
Protection On-Premise and in the Cloud Endpoint Protection Messaging Security Secure Web Gateway New! 21
COLLECTS VIA GLOBAL SENSORNET Honeypots, customers, threat researchers, community Over 300M nodes; 8.6B threat events daily URLs, vulnerabilities, files, domains, network traffic, threat actors, mobile apps, IP addresses, exploit kits BIG DATA ANALYTICS Identifies using data mining, machine learning, modeling and correlation 100 TB data; 500K unique threats identified daily GLOBAL THREAT INTELLIGENCE 250M threats blocked daily Email reputation, file reputation, web reputation, network traffic rules, mobile app reputation, known vulnerabilities/exploits, threat actor research, C&C Copyright 2013 Trend Micro Inc.
Smarter Protection More Flexible Management 23
IT doesn t want lots of consoles!#$%*?! IT Admin Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP 24
Simple, Flexible Management User centric visibility More product coverage Deeper Management Covering Cloud & on-premise 25
Simple, Flexible Licensing Smart Protection For Endpoints Complete Smart Protection suites All cloud and on-premise capabilities at no extra cost: easy transition Everything Endpoint Subscription license Competitively priced One-step activation 24/7 support included Messaging, Web, Portals
Comprehensive Protection Included Trend Micro Smart Protection Suites DEVICE POLICY ENCRYPTION DLP SIG-BASED Employee Data Leaks Traditional malware WEB REP SANDBOXING INTEGRATION COMMAND&CONTROL BLOCK BEHAVIOR MONITORING VULNERABILITY PROTECTION BROWSER EXPLOIT PROTECTION APPLICATION CONTROL Vulnerability exploits Advanced Malware Targeted Attacks 27
Endpoint Messaging and Collaboration Smart Protection for Endpoints Smart Protection Complete Central Management 24/7 Support On-premise, cloud or hybrid Data Loss Prevention Anti-malware Vulnerability Protection, Virtual Desktop Integration, Mac, Server Application Control Endpoint Encryption Mobile Device Mgmt Messaging Gateway & Mail Server Security Microsoft Sharepoint and Lync IM Security Secure Web Gateway Web 28
Part of Your Smart Protection Strategy Smart Best protection on endpoints and gateways Detects real-world threats more often & faster The only integrated protection against targeted attacks Simple Unified dashboard with centralized policy control Modular, lightweight and efficient Integrated DLP for easiest configuration Flexible deployment: on-premise, as a service, or a mix Security that fits Better value vs. point solutions Fits the workload needs for IT security Copyright 2013 Trend Micro Inc.
Thank you!