EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
Is this the WAY you handle GDPR today 2
3 area s to consider PREPARING FOR THE NEW EU GDPR 3 Copyright 2017 Trend Micro Inc.
Where is my data stored Who has access to it 4
Do you have a Breach Notification Process 5
How long do Targeted Attacks stay hidden? Most companies breached in minutes but not discovered for months! Source: Verizon Data Breach Investigations Report
State of the art Technology in place? 7
Technologies to be considered? Data Protection DLP Encryption - File/Folder/HDD 8
Technologies to be considered? Reduce data breaches Comprehensive Endpoint Security, inclusive Mobile Security Virtual and cloud-ready security technologies Integrity monitoring and log inspection to improve compliance and spot sophisticated attacks 9
Technologies to be considered? Reduce data breaches Targeted attack and APT-hunting tools Virtual patching to shield systems from latest threats 10
But it s not all about Technology!! User Education
How Can Trend Micro Help you? 12
Trend Micro 28 years focused on security software Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) Annual sales over $1B US Customers include 45 of top 50 global corporations 5500+ employees in over 50 countries Enterprise Midsize Business 500k commercial customers & 155M endpoints protected Consumers r Small Business 13
Innovative and Timely Response to Evolving Threat Landscape Antimalware Antispyware Personal Firewall Web Reputation Host-based IPS Data Loss Prevention File Reputation Behavioral Analysis Whitelisting Check Data Encryption Variant Protection Exploit Prevention Census Check High-Fidelity Machine Learning Sandbox Analysis Application Control Investigation & Forensics (EDR) 28+ years of innovation 14
15
Risk Management Requires Layered Protection Protect server workloads wherever they may be -- physical, virtual or cloud Servers 16
Intrusion Prevention Signature Matching Host Firewall Web Reputation Sandbox Analysis Application Control Integrity Monitoring Log Inspection Behavioral Analysis Defend Against Network & App Threats 17 Copyright 2017 Trend Micro Inc.
Microsoft Vulnerabilities 600 Microsoft Acknowledgments 2006 - YTD 500 400 300 200 100 0 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 18
Intrusion Prevention Signature Matching Host Firewall Web Reputation Sandbox Analysis Application Control Behavioral Analysis 19 Integrity Monitoring Log Inspection
Risk Management Requires Layered Protection Detect and block threats hitting the data center and user environments, maximizing efficiency Networks Servers 20
Breach Detection with Deep Discovery Email Gateway LAN/WAN/WLAN Network inspection Detect targeted attacks by monitoring all network traffic, plus analysis of network payloads with custom sandbox 21 Data Center
Breach Detection with Deep Discovery Email Gateway LAN/WAN/WLAN Email inspection and blocking Detect & block attempts to phish credentials and/or establish a point of entry 22 Data Center
Breach Detection with Deep Discovery Analysis of suspicious payloads and URLs with custom sandbox. Insight available to Trend Micro and third party solutions Email Gateway Analyzer LAN/WAN/WLAN 23 Data Center
Breach Detection with Deep Discovery Email Gateway Share threat insight with Trend Micro & third party solutions LAN/WAN/WLAN 24 Data Center Centralized visibility and control
Reduce the detection time from Months to Minutes Source: Verizon Data Breach Investigations Report
Risk Management Requires Layered Protection Protect user activities anywhere on any device reducing initial point of infection Users Networks Servers 26
Behavior Monitoring Device Control Investigation Malware Sandbox Machine Learning Vulnerability Shielding File Reputation Web Reputation Network Inspection Storage Web Gateway DLP Application Control Email Reputation Email Gateway or Server 27 Encryption Memory Inspection Host Firewall Response & Containment SharePoint Server Office 365
LEGEND The Right Technique At The Right Time Known Good Data Known Bad Data Unknown Data Noise Cancellation Web & File Reputation Exploit Prevention Application Control Variant Protection Pre-execution Machine Learning Behavioral Analysis Safe files allowed Runtime Machine Learning Malicious files blocked 29
Risk Management Requires Layered Protection Protect user activities anywhere on any device reducing initial point of infection Users Networks Need for connected threat defense and centralized visibility increases Servers 30
Connected Threat Defense: Better, Faster Protection Enable rapid response through shared threat intelligence and delivery of real-time security updates Assess potential vulnerabilities and proactively protect endpoints, servers and applications RESPOND PROTECT Gain centralized visibility across the system, and analyze and assess impact of threats DETECT Detect advanced malware, behavior and communications invisible to standard defenses 31
Gartner Magic Quadrant for Endpoint Protection Platforms Feb 2016 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/gartner-magic- Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Questions? 33