Threat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager

Similar documents
EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Securing the Modern Data Center with Trend Micro Deep Security

Maximum Security with Minimum Impact : Going Beyond Next Gen

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Commercial Product Matrix

TREND MICRO SMART PROTECTION SUITES

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

TREND MICRO SMART PROTECTION SUITES

with Advanced Protection

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Stopping Advanced Persistent Threats In Cloud and DataCenters

Next Generation Endpoint Security Confused?

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Copyright 2011 Trend Micro Inc.

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Protecting Virtual Environments

Symantec Endpoint Protection

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

The Internet of Everything is changing Everything

AT&T Endpoint Security

Automating Security Response based on Internet Reputation

Endpoint Protection : Last line of defense?

Cyber Defense Operations Center

Gladiator Incident Alert

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Building Resilience in a Digital Enterprise

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

THE ACCENTURE CYBER DEFENSE SOLUTION

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Synchronized Security

Securing Your Most Sensitive Data

Securing Digital Transformation

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

A Simple Guide to Understanding EDR

How do you decide what s best for you?

2018 Cyber Security Predictions

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Cisco s Appliance-based Content Security: IronPort and Web Security

Symantec Endpoint Protection 14

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Security in a Virtualized Environment with TrendMicro

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Security and Compliance for Office 365

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

June 2 nd, 2016 Security Awareness

Strategies for a Successful Security and Digital Transformation

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

HOSTED SECURITY SERVICES

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Defending Against Known & Unknown Threats

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

Cisco Advanced Malware Protection. May 2016

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Securing the SMB Cloud Generation

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Secure solutions for advanced threats

Agile Security Solutions

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

How to build a multi-layer Security Architecture to detect and remediate threats in real time

What is an Endpoint Protection Platform?

IT & DATA SECURITY BREACH PREVENTION

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

2017 Annual Meeting of Members and Board of Directors Meeting

Next Generation Enduser Protection

PEOPLE CENTRIC SECURITY THE NEW

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

IBM Cloud Internet Services: Optimizing security to protect your web applications

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

FOR FINANCIAL SERVICES ORGANIZATIONS

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

2018 Edition. Security and Compliance for Office 365

Service Provider View of Cyber Security. July 2017

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Security in India: Enabling a New Connected Era

INFINIT Y TOTAL PROTECTION

Cyber Security Stress Test SUMMARY REPORT

Cisco Ransomware Defense The Ransomware Threat Is Real

Seqrite Endpoint Security

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Convegno Sezione Automazione ANIMP

Moving Beyond Prevention: Proactive Security with Integrity Monitoring

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Proofpoint, Inc.

Security Made Simple by Sophos

From Managed Security Services to the next evolution of CyberSoc Services

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Transcription:

Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager

Threat Landscape Past, Present and Future

So it begins in the year of 1802 Joseph Marie Jacquard 3

Very first computer virus 1971 The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. [2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper. [3] Source: https://en.wikipedia.org/wiki/timeline_of_computer_viruses_and_worms 4

May 1974 World s first Spam sent 5

DAMAGE CAUSED Cybercrime Business Development CRIMEWARE Intellig ent Botnets W eb Threats Targ eted Attacks Mob ile Attacks Destructiv e Attacks/ Ransomware Business Email Compromise W orm Outb reaks Vulnerab ilities Spam Mass Mailers Spyware 2001 2003 2004 2005 2007 2010 2012 2015 2016

brand new malware every second! of these infects only one machine cybercrimers spends more time deleting their trails.

I will never be hacked! YES YOU WILL!!

World Economic Forum - The Global Risks Report 2017 9

RANSOMWARE GROWTH WILL PLATEAU IN 2017, BUT ATTACK METHODS AND TARGETS WILL DIVERSIFY. 10

IOT DEVICES WILL PLAY A BIGGER ROLE IN DDOS ATTACKS; IIOT SYSTEMS IN TARGETED ATTACKS. 11

THE SIMPLICITY OF BUSINESS EMAIL COMPROMISE ATTACKS WILL DRIVE AN INCREASE IN THE VOLUME OF TARGETED SCAMS IN 2017. 12

BUSINESS PROCESS COMPROMISE WILL GAIN TRACTION AMONG CYBERCRIMINALS LOOKING TO TARGET THE FINANCIAL SECTOR. 13

ADOBE AND APPLE WILL OUTPACE MICROSOFT IN TERMS OF PLATFORM VULNERABILITY DISCOVERIES. 14

CYBERPROPAGANDA WILL BECOME A NORM. GENERAL DATA PROTECTION REGULATION IMPLEMENTATION AND COMPLIANCE WILL RAISE ADMINISTRATIVE COSTS ACROSS ORGANIZATIONS. THREAT ACTORS WILL COME UP WITH NEW TARGETED ATTACK TACTICS THAT CIRCUMVENT CURRENT ANTI-EVASION SOLUTIONS. 15

Face Reality With a Hollistic Approach Cloud and Virtualization Complex Networks Consumerization 16

State of the Art Threat Management

Cloud based & Big Data Analytics Driven Threat Intelligence since 2004 Global Threat Intelligence 100 TB analyzed daily 500k new threats daily 800M+ good file whitelist 100s of millions of sensors Threat Researchers 450 researchers Threat lifecycle and distribution research 3k+ external vulnerability & exploit researchers (ZDI) 18

19

SMART Maximizes protection Sandbox Analysis Intrusion Prevention Application Control Machine Learning Integrity Monitoring Behavioral Analysis Anti-Malware & Content Filtering Response & Containment 20

OPTIMIZED Minimizes IT impact Sandbox Analysis Intrusion Prevention Application Control Machine Learning Integrity Monitoring Behavioral Analysis Anti-Malware & Content Filtering Response & Containment 21

CONNECTED Speeds time to protect, detect and respond 22

LEGEND Protect Against Advanced Threats Known Good Known Bad Unknown Anti-Malware & Content Filtering Intrusion Prevention (IPS) & Firewall Integrity Monitoring & Log Inspection Application Control Machine Learning Behavioral Analysis Safe files & actions allowed Custom Sandbox Analysis Malicious files & actions blocked 23

ANALYZER VISIBILITY AND CONTROL INSPECTOR

Layered Defense on WCRY (and all other threats) 25

Market Leadership Position The market leader in server security for the 7th straight year Recommended Breach Detection System for 3 straight years, and Recommended Next-generation IPS Highest and Furthest to the Right in the Leader s Quadrant in the Gartner Magic Quadrant for Endpoint Protection Platforms, Jan 2017 Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention Systems, January 2017 #1 in protection and performance Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116 26 NSS Labs Breach Detection Test Results (2014-2016); NSS NGIPS Test Results, 2016 http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/ https://resources.trendmicro.com/gartner-magic-quadrant- Endpoints.html av-test.org (Jan 2014 to Dec 2016)

Trend Micro 28 years focused on security software Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) Annual sales over $1B US Customers include 45 of top 50 global corporations 5500+ employees in over 50 countries Enterprise Midsize Business 500k commercial customers & 155M endpoints protected Consumers r Small Business 27

thomas@trendmicro.no