Copyright 2011 Trend Micro Inc.

Similar documents
Securing Your Journey to the Cloud. CEO Eva Chen

Stopping Advanced Persistent Threats In Cloud and DataCenters

Securing the Modern Data Center with Trend Micro Deep Security

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Why the cloud matters?

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Changing face of endpoint security

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

The Evolution of Data Center Security, Risk and Compliance

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Enterprise & Cloud Security

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Network Security Protection Alternatives for the Cloud

Trend Micro Deep Discovery and Custom Defence

Securing Your Virtual World Harri Kaikkonen Channel Manager

Dynamic Datacenter Security Solidex, November 2009

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

CloudSOC and Security.cloud for Microsoft Office 365

Deep Security 9. A Server Security Platform for Physical, Virtual, Cloud. Territory Sales Manager SEE, Trend Micro. Copyright 2011 Trend Micro Inc.

AT&T Endpoint Security

SYMANTEC DATA CENTER SECURITY

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

Datacenter Security: Protection Beyond OS LifeCycle

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Securing Your Microsoft Azure Virtual Networks

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

PEOPLE CENTRIC SECURITY THE NEW

The threat landscape is constantly

Secure & Unified Identity

CSP 2017 Network Virtualisation and Security Scott McKinnon

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016

Securing Your Amazon Web Services Virtual Networks

Trend Micro and IBM Security QRadar SIEM

Security Readiness Assessment

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

Qualys Cloud Platform

Securing the SMB Cloud Generation

Rethinking Security: The Need For A Security Delivery Platform

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Building Resilience in a Digital Enterprise

AKAMAI CLOUD SECURITY SOLUTIONS

Sichere Applikations- dienste

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Services solutions for Managed Service Providers (MSPs)

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

A Simple Guide to Understanding EDR

Trend Micro deep security 9.6

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Maximum Security with Minimum Impact : Going Beyond Next Gen

CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos. Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Kaspersky Security for Virtualization Frequently Asked Questions

Total Threat Protection. Whitepaper

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Microsoft Security Management

Mitigating Risks with Cloud Computing Dan Reis

Transforming Security Part 2: From the Device to the Data Center

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Security for the Cloud Era

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

IBM Security Network Protection Solutions

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Commercial Product Matrix

Expand Virtualization. Maintain Security.

INFINIT Y TOTAL PROTECTION

Encryption Vision & Strategy

Synchronized Security

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: V i r t u a l ization and Cloud C h a n g e s E ve r yt h i n g

McAfee Virtual Network Security Platform

We are innovating in security

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Security by Default: Enabling Transformation Through Cyber Resilience

SECURITY SERVICES SECURITY

Office 365 Buyers Guide: Best Practices for Securing Office 365

Security Assessment Checklist

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Security in a Virtualized Environment with TrendMicro

Symantec Endpoint Protection

Symantec Endpoint Protection 12

Gladiator Incident Alert

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Moving Beyond Prevention: Proactive Security with Integrity Monitoring

PrecisionAccess Trusted Access Control

Trend Micro Deep Security

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Business Strategy Theatre

Transcription:

Copyright 2011 Trend Micro Inc.

2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF 2000 1800 1600 1400 1200 1000 800 600 400 200 0 DeepSecurity/Hosted/CPVM Copyright 2011 Trend Micro Inc. 2

Smart Protection Network 2.0 Cloud Security Intelligence from Big Data Processing Cloud Evolution Intelligence Auto platform detection Virtual Patching Workload encryption Mobility Intelligence Geo Location intelligence SIM card based identification Mobile App Reputation service Device control APT & Target Attack Intelligence Real time C&C list Application Whitelist Document exploit detection Data Fingerprint Deep content Inspection Copyright 2011 Trend Micro Inc. 3

Platforms Security that Fit The Vending Machine Approach Endpoint Data Center Network Management Consumer Home Endpoint Platform Data Center Platform Network Platform Management Platform Consumer Home Platform - Anti-Malware - Mobile - Data Loss Prevention - Encryption - SafeSync - Anti-Malware - IPS/IDS - File Integrity - Log Inspection - Data Loss Prevention - Encryption - Anti-Malware - Data Loss Prevention - Application ID - Mobile - Web/DB - Policy - Reporting - Threat Intelligence - Dashboard - Configuration - Update - Anti-Malware - Mobile - Data Protection - Encryption - SafeSync Copyright 2011 Trend Micro Inc.

Cloud Era Security Challenge Defending against Threats in Physical, Virtual, and Cloud Environments Outside-in Perimeter Defense Isn t Enough Advanced Persistent Threats Mobility Elastic Perimeter Copyright 2012 Copyright Trend Micro 2011 Inc. Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

Physical Virtual - Cloud Virtual Appliances Gateway The Old Way With Virtual Appliances Gateway Solution - IWSVA 4 in 1 Web Gateway Virtual Appliance Business Benefit One Vendor, No Hardware and Better Web Security Solution - IMSVA 5 in 1 Hybrid Messaging Gateway Virtual Appliance Business Benefit One Vendor, Less Traffic Load On Network, No Hardware Cycle and Better Email Security Copyright 2011 Trend Micro Inc. 8

Physical Virtual - Cloud Agentless AntiVirus The Old Way With Agent-less Security VM VM VM Virtual Appliance VM VM VM VM Copyright 2011 Trend Micro Inc. 9

Cost Reduction & Consolidation Agentless Security on Virtual Desktop VMs VM servers per host Agentless AV 75 Traditional AV 25 3X higher VDI VM consolidation ratios 0 10 20 30 40 50 60 70 80 3-year Savings on 1000 VDI VMs = $539,600 Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011; Saving estimate based on VMware ROI calculations Copyright 2011 Trend Micro Inc.

Channel Opportunity Public Cloud Service Providers Savvis, Dell, Singtel, GoDaddy, Swisscom Global Private and Public Cloud Providers Using internally or Reselling Trend Micro as-a-service (TMaaS) Density needs are very demanding Building virtualization-aware security into their cloud platforms Most are extending into shared storage data protection with SecureCloud Ease of management and integration with private infrastructure are top customer requirements One security model for private and public cloud Add-on service or self-service IPS, AV, FIM Burst with consistency of security management model Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 11

Channel Opportunity Public Cloud Service Providers Savvis, Dell, Singtel, GoDaddy, Swisscom Global Private and Public Cloud Providers Using internally or Reselling Trend Micro as-a-service (TMaaS) We are winning Density needs are very demanding Building virtualization-aware security into their cloud platforms where scale Most are extending into shared storage data protection with SecureCloud and cost matter Ease of management and integration with private infrastructure are top customer requirements One security model for private and public cloud the most Add-on service or self-service IPS, AV, FIM Burst with consistency of security management model Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 12

Copyright 2011 Trend Micro Inc.

Compliance and Data Privacy Compliance Virtual Patching File Integrity Monitoring Data Privacy Data Encryption Data Leakage Prevention Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 14

Compliance Agent-based and Agentless FIM Agentless FIM for VMware Protection for virtualized desktops and data centers The Old Way With Agent-less Security VM VM VM Virtual Appliance VM VM VM VM Copyright 2011 Trend Micro Inc.

Customer Case Study - SaaS Provider for Sales Automation Significant Compliance Needs Needed to monitor application integrity Reviewed several options Chose Trend Micro File Integrity Monitoring On the Deep Security Server platform Across 1000s of Servers Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 16

Compliance and Data Privacy Compliance Virtual Patching File Integrity Monitoring Data Privacy Smart Data Protection Integrated DLP Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 17

Compliance & Data Privacy Data Protection across Your Network Encryption Data Loss Prevention Device Control Cloud Email Servers Endpoints Internet Firewall Copyright 2011 Trend Micro Inc.

Customer Case Study - SecureCloud American Airlines Mostly virtualized global private infrastructure Needed to move some applications to public cloud Distributed public-facing customer applications Significant security and compliance requirements A data protection model where AA held the keys Flexibility to switch cloud providers without long audit process Extended AA security architecture to include workload and data encryption model in cloud Compliance and data protection needs met Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 19

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

The APT Phenomena A Cyber Intrusion Every 5 Minutes according to US-CERT Copyright 2011 Trend Micro Inc. Trend Micro finds over 90% of enterprise networks contain active malicious malware

APT and Targeted Attack slip through perimeter security Intelligence Gathering 1 Threat Actor C & C Server External Staging Server Social People are the weakest link Spear Phishing Drive-by Downloads Network Infiltration 2 4 3 3 Network Perimeter F/W, IPS 6 Data of Interest Sophisticated Exploits vulnerabilities Remote control and backdoor Uses credentials & privileges Stealthy Low profile Masked activities Difficult to detect Lateral Movement 5 Copyright 2011 Trend Micro Inc. 23

Connect Threat Intelligence with Inside Network Visibility Intelligence Gathering 1 Threat Actor C & C Server External Staging Server Specialized Threat Detection Across the Attack Sequence Malicious Content Emails containing embedded document exploits Drive-by downloads Zero-day & known malware Network Infiltration 2 4 Lateral Movement 3 3 5 Network Perimeter Deep Discovery 3.0 6 Data of Interest Suspect Communication C&C communication for any type of malware & bots Backdoor activity by attacker Attack Behavior Malware activity: propagation, downloading, spamming Attacker activity: scan, brute force, service exploitation Data exfiltration Copyright 2011 Trend Micro Inc.

Deep Discovery (TDA 3.0) ---- Discover APT and Target Attack with actionable items Visualization Analysis Alarms Reporting Network Visibility, Insight & Control Specialized Threat Detection Sandbox Analysis Smart Threat Tracking Threat Connect Intelligence SIEM Connect Network Inspection Platform Deep Discovery Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

CONSUMERIZATION is Causing a Shift Corporate Devices Bring your Own devices Classification 2/16/2012 Copyright 2011 Trend Micro Inc. 28

The Enterprise Endpoint Evolution 20% Mobile Devices/SaaS Physical DataCenter Management Driven Virtual 50% 15% Virtual Cloud Laptops/PCs 80% EndPoint Management Driven 35% 2011 2013 3-5 Years Cross-over year Copyright 2011 Trend Micro 29 Inc.

Consumerization Solutions to Fit YOUR Balance of Control and Freedom Regain visibility & control Mobile Security 7 OfficeScan Deep Security Titanium Titanium for Android Hosted MDM (2H) Share data with confidence DLP for OfficeScan OfficeScan VDI Deep Security SafeSync for Business SecureCloud Protect data anywhere Endpoint Encryption DLP for OfficeScan SafeSync for Business SecureCloud CONTROL Company-owned, fully managed Employee-owned, full BYOIT Copyright 2012 Copyright Trend Micro 2011 Inc. Trend Micro Inc.

The Future of Endpoint Customer Case Study VMWare VDI Significant VDI deployment where security was required Investigated many options to include hypervisor-based VDI security Density was THE critical requirement Chose hypervisor-based security for performance and management reasons Striving for 348 desktops per server Managed 16 virtual appliances vs. 2500 VMs Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 31

How we win in Consumerization Customer Type Control or Denial Add Mobile Devices Rethink, New infrastructur How We Win Performance Ease of management Support One Vendor for Endpoint 80/20 MDM Best VDI Server-centric Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc.

Physical Virtual Public Security Management and Compliance Policy Assurance and Visibility Deep Security (Virtual Appliance) VM Internal Virtual DC VM Standard Policy Profile Vulnerability shielding Hypervisor based: IPS AV VM Public Cloud Copyright 2011 Trend Micro Inc. VM Customer facing Private Cloud PCI-DSS = FIM Data encryption Agent-based All VMs = FIM VM Workload encryption VM VM VM VM VM VM

Business Benefits of Trend Micro Cloud Security Reduced Cost of Operations Increased Application Stability and Performance Higher Virtualization ROI Secure Use of Public Cloud Reduced Investment in Management Copyright 2011 Trend Micro Inc.

Case Study Australian Bureau of Statistics Large Australian Government Organization 99% virtualized across multiple DCs Moved to host-based security model for 3 reasons: VMotion wanted security profile to follow host Vulnerability shielding and compliance Consistency of management one platform across all environments = Physical, Virtual, Cloud Trend Micro Confidential 2/16/2012 Copyright 2011 Trend Micro Inc. 36

Cloud & Virtualization Computing Trend is No.1 in Server and Virtualization Security Physical Virtual Cloud Trend Micro 23.7% Trend Micro 13% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Copyright 2011 Trend Micro Inc. Source: 2011 Technavio Global Virtualization Security Management Solutions

Copyright 2011 Trend Micro Inc.

An Innovative, trustworthy, security focused global organization Copyright 2011 Trend Micro Inc.