EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Similar documents
Securing the Modern Data Center with Trend Micro Deep Security

TREND MICRO SMART PROTECTION SUITES

TREND MICRO SMART PROTECTION SUITES

Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

Maximum Security with Minimum Impact : Going Beyond Next Gen

Stopping Advanced Persistent Threats In Cloud and DataCenters

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Commercial Product Matrix

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Symantec Endpoint Protection 14

Kim Due Andersen Channel Account Manager,

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Security Made Simple by Sophos

CloudSOC and Security.cloud for Microsoft Office 365

Copyright 2011 Trend Micro Inc.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

IBM Security Network Protection Solutions

trend micro smart Protection suites

with Advanced Protection

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Symantec Ransomware Protection

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

An all-in-one lightweight agent with deployment flexibility through both software as a service (SaaS) and on-premises options

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Trend Micro and IBM Security QRadar SIEM

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cisco Firepower NGFW. Anticipate, block, and respond to threats

This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

A Simple Guide to Understanding EDR

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

Agile Security Solutions

Cisco Firepower NGFW. Anticipate, block, and respond to threats

BETTER Mobile Threat Defense (BMTD)

AT&T Endpoint Security

100% Endpoint Protection dank Machine Learning, EDR & Deception?

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Building Resilience in a Digital Enterprise

RSA NetWitness Suite Respond in Minutes, Not Months

Trend Micro Deep Discovery Training for Certified Professionals

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

Trend Micro Deep Discovery and Custom Defence

Windows Server The operating system

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

Endpoint Protection : Last line of defense?

Security by Default: Enabling Transformation Through Cyber Resilience

FOR FINANCIAL SERVICES ORGANIZATIONS

Technical Brochure F-SECURE THREAT SHIELD

Best Practices in Securing a Multicloud World

Put an end to cyberthreats

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

MANAGED DETECTION AND RESPONSE

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

May the (IBM) X-Force Be With You

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

What is a mobile protection product?

SYMANTEC DATA CENTER SECURITY

AKAMAI CLOUD SECURITY SOLUTIONS

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Symantec Endpoint Protection

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

What is an Endpoint Protection Platform?

Seqrite Endpoint Security

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Defend Against the Unknown

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

McAfee Endpoint Threat Defense and Response Family

RSA INCIDENT RESPONSE SERVICES

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Symantec Endpoint Protection 11.0

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

South Korea Cyber-attack Heightens Changes in Threat Landscape. Richard Sheng Sr. Director, Enterprise Security, Asia Pacific

The threat landscape is constantly

Tomorrow s Endpoint Protection Platforms Emergence and evolution

CYBER RESILIENCE & INCIDENT RESPONSE

Measuring cloud-based anti-malware protection for Office 365 user accounts

HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE

MOBILE SECURITY OVERVIEW. Tim LeMaster

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

PEOPLE CENTRIC SECURITY THE NEW

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

Transcription:

EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Is this the WAY you handle GDPR today 2

3 area s to consider PREPARING FOR THE NEW EU GDPR 3 Copyright 2017 Trend Micro Inc.

Where is my data stored Who has access to it 4

Do you have a Breach Notification Process 5

How long do Targeted Attacks stay hidden? Most companies breached in minutes but not discovered for months! Source: Verizon Data Breach Investigations Report

State of the art Technology in place? 7

Technologies to be considered? Data Protection DLP Encryption - File/Folder/HDD 8

Technologies to be considered? Reduce data breaches Comprehensive Endpoint Security, inclusive Mobile Security Virtual and cloud-ready security technologies Integrity monitoring and log inspection to improve compliance and spot sophisticated attacks 9

Technologies to be considered? Reduce data breaches Targeted attack and APT-hunting tools Virtual patching to shield systems from latest threats 10

But it s not all about Technology!! User Education

How Can Trend Micro Help you? 12

Trend Micro 28 years focused on security software Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) Annual sales over $1B US Customers include 45 of top 50 global corporations 5500+ employees in over 50 countries Enterprise Midsize Business 500k commercial customers & 155M endpoints protected Consumers r Small Business 13

Innovative and Timely Response to Evolving Threat Landscape Antimalware Antispyware Personal Firewall Web Reputation Host-based IPS Data Loss Prevention File Reputation Behavioral Analysis Whitelisting Check Data Encryption Variant Protection Exploit Prevention Census Check High-Fidelity Machine Learning Sandbox Analysis Application Control Investigation & Forensics (EDR) 28+ years of innovation 14

15

Risk Management Requires Layered Protection Protect server workloads wherever they may be -- physical, virtual or cloud Servers 16

Intrusion Prevention Signature Matching Host Firewall Web Reputation Sandbox Analysis Application Control Integrity Monitoring Log Inspection Behavioral Analysis Defend Against Network & App Threats 17 Copyright 2017 Trend Micro Inc.

Microsoft Vulnerabilities 600 Microsoft Acknowledgments 2006 - YTD 500 400 300 200 100 0 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 18

Intrusion Prevention Signature Matching Host Firewall Web Reputation Sandbox Analysis Application Control Behavioral Analysis 19 Integrity Monitoring Log Inspection

Risk Management Requires Layered Protection Detect and block threats hitting the data center and user environments, maximizing efficiency Networks Servers 20

Breach Detection with Deep Discovery Email Gateway LAN/WAN/WLAN Network inspection Detect targeted attacks by monitoring all network traffic, plus analysis of network payloads with custom sandbox 21 Data Center

Breach Detection with Deep Discovery Email Gateway LAN/WAN/WLAN Email inspection and blocking Detect & block attempts to phish credentials and/or establish a point of entry 22 Data Center

Breach Detection with Deep Discovery Analysis of suspicious payloads and URLs with custom sandbox. Insight available to Trend Micro and third party solutions Email Gateway Analyzer LAN/WAN/WLAN 23 Data Center

Breach Detection with Deep Discovery Email Gateway Share threat insight with Trend Micro & third party solutions LAN/WAN/WLAN 24 Data Center Centralized visibility and control

Reduce the detection time from Months to Minutes Source: Verizon Data Breach Investigations Report

Risk Management Requires Layered Protection Protect user activities anywhere on any device reducing initial point of infection Users Networks Servers 26

Behavior Monitoring Device Control Investigation Malware Sandbox Machine Learning Vulnerability Shielding File Reputation Web Reputation Network Inspection Storage Web Gateway DLP Application Control Email Reputation Email Gateway or Server 27 Encryption Memory Inspection Host Firewall Response & Containment SharePoint Server Office 365

LEGEND The Right Technique At The Right Time Known Good Data Known Bad Data Unknown Data Noise Cancellation Web & File Reputation Exploit Prevention Application Control Variant Protection Pre-execution Machine Learning Behavioral Analysis Safe files allowed Runtime Machine Learning Malicious files blocked 29

Risk Management Requires Layered Protection Protect user activities anywhere on any device reducing initial point of infection Users Networks Need for connected threat defense and centralized visibility increases Servers 30

Connected Threat Defense: Better, Faster Protection Enable rapid response through shared threat intelligence and delivery of real-time security updates Assess potential vulnerabilities and proactively protect endpoints, servers and applications RESPOND PROTECT Gain centralized visibility across the system, and analyze and assess impact of threats DETECT Detect advanced malware, behavior and communications invisible to standard defenses 31

Gartner Magic Quadrant for Endpoint Protection Platforms Feb 2016 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/gartner-magic- Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Questions? 33