Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Similar documents
Securing the Modern Data Center with Trend Micro Deep Security

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

TREND MICRO SMART PROTECTION SUITES

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

TREND MICRO SMART PROTECTION SUITES

Maximum Security with Minimum Impact : Going Beyond Next Gen

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Kim Due Andersen Channel Account Manager,

Stopping Advanced Persistent Threats In Cloud and DataCenters

Securing and File Sharing in the Cloud

Copyright 2011 Trend Micro Inc.

Best Practices in Securing a Multicloud World

SYMANTEC DATA CENTER SECURITY

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

McAfee Public Cloud Server Security Suite

Servers, Servers, Everywhere

Symantec Endpoint Protection Family Feature Comparison

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Microsoft Security Management

AKAMAI CLOUD SECURITY SOLUTIONS

Security for the Cloud Era

Securing Your Amazon Web Services Virtual Networks

Commercial Product Matrix

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Enterprise & Cloud Security

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Security by Default: Enabling Transformation Through Cyber Resilience

CSP 2017 Network Virtualisation and Security Scott McKinnon

Securing Your Microsoft Azure Virtual Networks

CLOUD WORKLOAD SECURITY

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Moving Beyond Prevention: Proactive Security with Integrity Monitoring

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Deploy Symantec Cloud Workload Protection for Storage

An all-in-one lightweight agent with deployment flexibility through both software as a service (SaaS) and on-premises options

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

CloudSOC and Security.cloud for Microsoft Office 365

Why the cloud matters?

Dynamic Datacenter Security Solidex, November 2009

Securing Your Most Sensitive Data

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Technical Brochure F-SECURE THREAT SHIELD

Network Security Protection Alternatives for the Cloud

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

PCI DSS Compliance. White Paper Parallels Remote Application Server

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

AWS Reference Design Document

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Office 365 Buyers Guide: Best Practices for Securing Office 365

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: V i r t u a l ization and Cloud C h a n g e s E ve r yt h i n g

Qualys Cloud Platform

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

2017 Annual Meeting of Members and Board of Directors Meeting

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

with Advanced Protection

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Symantec Endpoint Protection 14

Seqrite Endpoint Security

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Leveraging the Cloud & Managing Compliance HITRUST Alliance.

Perfect Balance of Public and Private Cloud

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

A Guide to Closing All Potential VDI Security Gaps

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

WHITEPAPER. How to secure your Post-perimeter world

Pulse Secure Application Delivery

Symantec Protection Suite Add-On for Hosted Security

Synchronized Security

Reduce Your Network's Attack Surface

Comprehensive datacenter protection

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Sichere Applikations- dienste

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

Carbon Black PCI Compliance Mapping Checklist

Securing the SMB Cloud Generation

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

SIEMLESS THREAT MANAGEMENT

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Augmenting existing security infrastructure to mitigate information borne risks

Virtual Patching in Mixed Environments: How It Works to Protect You

Security Made Simple by Sophos

FIREWALL BEST PRACTICES TO BLOCK

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Managing Microsoft 365 Identity and Access

Transcription:

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Kimmo Vesajoki, Country Manager Finland & Baltics Trend Micro EMEA Ltd. Copyright 2016 Trend Micro Inc.

Cross-generational blend of threat defense techniques Gen TM Intelligently applies the right technique at the right time Powered by global threat intelligence 2 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

Solving Real Customer Problems IT Dynamics Customer Pain XGen Endpoint Security Increasingly sophisticated threats Recovering from high impact attacks Maximum Protection Shift to the cloud Existing defenses stagnant and ineffective Minimum Impact Changing user behavior Complexity & lack of visibility Proven Security Partner 3 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

XGen Endpoint Security Maximum Protection Cross-generational blend of threat defense techniques Minimum Impact Central visibility & control, lower false positives and efficient threat defense Proven Security Partner Innovative and timely response to changing threat landscape 4 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

There is no silver bullet 5 History has clearly shown that no single approach will be successful for thwarting all types of malware attacks. Organizations and solution providers have to use an adaptive and strategic approach to malware protection. - Gartner EPP Magic Quadrant 2016 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

Pros & Cons of New Threat Techniques Application Whitelisting Blocks all unknown apps Only stops EXEs Behavior Analysis Recognizes behavior CPU intensive Exploit Protection Blocks vulnerabilities that threats exploit Can t block threats that don t exploit app/os vulnerabilities Machine Learning EXE file detection Higher false positives, needs to be trained with specific file types No silver bullet; combine techniques to get best of all worlds 6 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

LEGEND The Right Technique at the Right Time With its cross-generational blend of threat defense techniques including high-fidelity machine learning, Trend Micro XGen endpoint security is always adapting to identify and defeat new ransomware and other unknown threats. Known Good Data Known Bad Data Web & File Reputation Exploit Prevention Application Control Variant Protection Unknown Data Noise Cancellation Pre-execution Machine Learning Behavioral Analysis Safe files allowed Runtime Machine Learning Malicious files blocked 7 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc.

Trend Micro offers best protection against modern threats Leader for 14 straight years! Gartner Magic Quadrant for Endpoint Protection Platforms Copyright 2016 Trend Micro Inc.

Increasingly, organizations are asking what can t go to the cloud, rather than what can 9 Copyright 2016 Trend Micro Inc. Copyright 2016 Trend Micro Inc. Source: Gartner Blog Network. The end of the beginning of cloud computing by Lydia Leong

Many choices 10 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Many choices 11 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Many Companies Gradually Move to Cloud Office Intermediate stage to full cloud deployment May always keep group of users on premises Want equivalent protection without extra management 12 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Most organizations have been infected with malware from email Copyright 2016 Trend Micro Inc. Source: Osterman Research, March 2016

Majority of Ransomware via Malicious Emails Common email hooks are here is an invoice or my resume Often use weaponized executable, script, html, scr, zip, Office, PDF files Leverage Dridex (Smart macro attack) May be a URL leading to ransomware 14 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Attack Migration Through Email Internal Phishing Attacks Less common but even more important to detect Indicator of an attack already in progress Example: Financial Times attack Phishing emails sent internally from a compromised user IT sent warning to users with a link to change their password Attackers re-sent IT s email with their own phishing link! 15 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Advanced Malware Difficult to Detect 90% of malware is used only once Network Breach Detection Systems help but miss traffic between offnetwork devices and SaaS services MS Office files with malware used in 60% targeted attacks 60% 16 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

User behavior changing: Email Attachments Cloud File Sharing 17 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc. Email gateways don t see files which are already in the cloud!

What are Users Uploading to the Cloud? Compliance data? Sensitive information? 18 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Why do I need to supplement the security included with Office 365? Exchange Online is designed and SLA backed to catch 100% known malware But 90% malware infects only 1 device. Only 10% malware is known. Every customer needs a strategy to deal with unknown malware 19 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Complimenting Office 365 s Built in Security for Better Overall Protection 20 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Securing SaaS-based applications Trend Micro Cloud App Security 21 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Securing SaaS-based Applications Advanced Threat Detection Finds zero-day and hidden threats Sandbox file analysis in the cloud Web reputation for URLs in email/files Data Loss Prevention (DLP) Discovery and visibility into confidential data usage. DLP enforcement for cloud file sharing 240 customizable templates 22 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Simple and Elegant Integration with SaaS Services API Cloud App Security Direct cloud-to-cloud integration using vendor s API s No impact to user/admin functionality Supports all devices, anywhere Fully automatic setup (above 5000 users contact Trend Micro for best practices) M X R e c o r d S o f t w a r e U s e r settings We b p r o x y 23 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Cloud App Security Service Delivery US US Netherlands Germany Japan 99.9% Available US & EMEA sites are not interconnected Cloud App Security service, hosted by Microsoft Azure Sandbox service (<2% files), hosted by Trend Micro 24 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Real Real World World Protection Protection Statistic Statistic Cloud App Security scanned 691M email/files and detected an additional 6.2 million malicious files/urls between July 15 and Aug 16. 58 thousands malicious files/urls are ransomware related. 25 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc. Source: Cloud App Security service operation portal.

Cloud Security Challenges Visibility Agility Purchasing Compliance 26 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Cloud Security is a Shared Responsibility Cloud User Cloud Provider Content and Applications Platform, Applications Operating System, Network & Firewall Configuration Data Encryption Network Traffic Protection Foundation Services Compute Storage Database Networking Global Infrastructure Domains, Availability Zones Regions Cloud providers deliver a secure infrastructure. But YOU need to protect what you put IN the cloud your workloads. 27 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Why do I need additional security in the cloud? Threats: Network attack Vulnerabilities Malware Insider threats Compliance: PCI DSS HIPAA Internal 28 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Protect more servers than anyone else Market leader in server security for the 6 th straight year! 1 Other 30.3% Intel Symantec 29 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc. Sources: 1. IDC Tech Spotlight: Server Security: Virtualization & Cloud Changes Everything January 2016;

Best Practices for Securing AWS Workloads * Understand Your Shared Responsibilities Get Visibility of Cloud-based Workloads Bake Security Into Workloads from Development Adopt a "No Patch" Strategy for Live Environments Use AWS Security Groups but Leverage a Third-Party Firewall for Advanced Functionality Adopt a Workload-Centric Security Strategy 30 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc. * Source: Gartner research note Best practices for securing workloads in Amazon Web Services, April 2015

Deep Security delivers All in a single, host-based tool 31 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Bake security into workloads Full visibility into cloud workloads from a central dashboard Automate policy creation and management via API, scriptable components, or central UI Deep Security delivers broadest OS and kernel support Works with configuration management tools like Chef, Puppet, Saltstack PowerShell Make DevSecOps a reality 32 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Virtually patch to speed protection Prevent exploit of zero-day vulnerabilities (Shellshock, Heartbleed) Reduce the risk of ransomware attacks on your workloads Reduce need for emergency patching Buy time to resolve the core issue with a new deployment adopt a no patch for live workloads strategy Deep Security delivers virtual patches to quickly protect workloads through IPS until updates can occur Speed vulnerability response with virtual patching 33 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Traditional on-premises security Applied at the perimeter On-premises Firewall IPS Load Balancer Web Tier App Tier DB Tier 34 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Build a workload-centric security strategy Network & Security Groups Elastic Load Balancer Web Tier in the cloud App Tier in the cloud DB Services 35 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Prevent network attacks Proactively protect your systems and applications with Intrusion prevention (IPS) IPS prevents attacks by examining network packets for malicious or unexpected traffic Deep Security provides full stack, host-based IPS that stops attacks before they reach applications, including new attacks like ransomware Don t just detect attacks, prevent them 36 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Defend against network & application attacks 5 days after publication: 766 attacks blocked! Deep Security on Sept 30 th, 2014, at a customer managing 100+ cloud instances 1 year later: 70,000+ attacks blocked by the service 37 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Ransomware in the Modern Data Center An overall, multi-layered approach to lowering risk makes the most sense across the enterprise Attacks typically focused on users, but spreads to servers through file shares Some new attacks (ex: SAMSAM) are focusing on unpatched and vulnerable servers, requiring enterprises to pay a ransom to return to normal operations 38 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Ransomware Protection for Servers Anti-malware & web reputation for detection of malicious software & known-bad URLs, including ransomware Vulnerability shielding (through intrusion prevention) to prevent server compromise Lateral movement detection & prevention through intrusion prevention to stop the spread of infection Ransomware-specific: Command & control (C&C) communication detection & alerting Defending Windows & Linux file servers from ransomware-infected clients through detection of over-the-network suspicious file change activity File Servers C&C Communication Other Servers 39 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Shared responsibility for compliance Cloud Provider Cloud User Facilities Physical security of hardware Network infrastructure Virtualization infrastructure File & System integrity monitoring Intrusion detection & prevention Firewall Anti-malware Vulnerability scanning & updating 40 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Accelerate PCI DSS compliance PCI DSS Requirement Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for passwords or other security parameters Protect stored cardholder data Encrypt transmission of cardholder data use and regularly update anti-virus software Develop and maintain secure systems and applications Restrict access to cardholder data by business need to know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain a policy that addresses info security for all personnel Responsibility Shared Shared Shared User User Shared Shared Shared Cloud Provider Shared Shared Shared 41 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

What about GDPR? Recital 49 EU General Data Protection Regulation (EU-GDPR): The processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security, i.e. the ability of a network or an information system to resist, at a given level of confidence, accidental events or unlawful or malicious actions that compromise the availability, authenticity, integrity and confidentiality of stored or transmitted personal data, and the security of the related services offered by, or accessible via, those networks and systems, by public authorities, by computer emergency response teams (CERTs), computer security incident response teams (CSIRTs), by providers of electronic communications networks and services and by providers of security technologies and services, constitutes a legitimate interest of the data controller concerned. This could, for example, include preventing unauthorised access to electronic communications networks and malicious code distribution and stopping 'denial of service attacks and damage to computer and electronic communication systems. Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. http://www.trendmicro.co.uk/euregulation/ 42 Inc.

Deep Security - Optimized for the Cloud Deep Security can secure cloud and hybrid deployments with a single platform Seamless integration with leading cloud providers: Auto-detect instances and rapidly protect them Fully scriptable, including tools to automate provisioning and set up Host-based protection so security isn t a bottleneck 43 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Flexible purchase & deployment options Software-as-a-Service Marketplace Software Less work On AWS or Azure bill Hybrid Environment 44 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Intrusion Prevention Anti-malware Trend Micro Deep Security Host Firewall Web Reputation Integrity Monitoring Log Inspection 45 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

Why choose Trend Micro? Scalable, automated security that fits Single security console, multiple capabilities $ Usage-based pricing 46 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc.

47 Copyright Copyright 2016 Trend 2016 Trend Micro Micro Inc. Inc. trendmicro.com/cloud