Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)
-
Upload
minh-le -
Category
Technology
-
view
1.073 -
download
0
description
Transcript of Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)
Eva Chen
CEO and Co-Founder
Empowering the Business while Efficiently Mitigating Risks
7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.
2.4B Internet Users1
1 Trillion+ URLs indexed
by Google2
665M Web Sites3
1B Facebook Users4
427M Smart Phones
Sold Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012;
2: Google, 2008;
3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012;
6: SocialBakers, May 2012
Copyright 2013 Trend Micro Inc.
Source:
Asymco.com, June 2012
Copyright 2013 Trend Micro Inc. Copyright 2013 Trend Micro Inc.
2.5 QUINTILLION BYTES OF DATA/DAY! 90%
CREATED IN THE
LAST 2 YEARS
Source: IBM
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
Copyright 2013 Trend Micro Inc.
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
1 NEW THREAT CREATED
EVERY SECOND 90% ORGANIZATIONS HAVE
ACTIVE MALWARE 55% NOT EVEN AWARE OF
INTRUSIONS
COMMERCIAL EXPLOIT KITS
USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS
Protected Health Information (PHI)
Intellectual Property (IP)
Payment Card Industry (PCI)
Personally Identifiable Information (PII)
AVERAGE COST
OF DATA BREACH $3.7M
Copyright 2013 Trend Micro Inc.
Empower the Business…
Copyright 2013 Trend Micro Inc.
…while Protecting Information from Theft and Loss
Copyright 2013 Trend Micro Inc.
Consumerization
IT Employees
Cyber Threats
Attackers
Cloud &
Virtualization
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fits an evolving ecosystem
Information no longer protected
by traditional defenses
Customers Need…
Point solutions; limited visibility,
de-centralized administration
Dynamic, complex environment;
many new apps and platforms
The New Reality…
Copyright 2013 Trend Micro Inc.
Smart protection against theft and loss
Layered – lines of defense
Interconnected – intelligent protection
Real-time – cloud updates
Transparent – no user impact
Copyright 2013 Trend Micro Inc.
Simple yet flexible to deploy and manage
Centralized – visibility and control
Automated – policy management
Lightweight – resource efficient
Flexible – on-premise or on-demand
Copyright 2013 Trend Micro Inc.
Security that fits an evolving ecosystem
Open – broad platform support
Optimized – designed in partnership
Focused – 100% dedicated to security
Innovative – ahead of the latest threats …and more
Copyright 2013 Trend Micro Inc.
Interconnected
Real-time
Transparent
Organizations Need a Smart Protection Strategy
Layered
Smart protection for information
Simple yet flexible to manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Copyright 2013 Trend Micro Inc.
Big Data Analytics-driven
Global Threat Intelligence
Added protection:
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerability shielding
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart Protection begins with global threat intelligence…
CLOUD BASED GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE
NOW! • Email reputation
• File reputation
• Web reputation
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerabilities/Exploits
• Threat Actor Research
• Enhanced File Reputation
• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Email &
Messaging
Web
Access
File/Folder &
Removable Media
IT Admin
Then…
Copyright 2013 Trend Micro Inc.
Employees
Device Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking File/Folder &
Removable Media
Now!
IT Admin
Copyright 2013 Trend Micro Inc.
Employees
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking File/Folder &
Removable Media
91% targeted attacks begin with spear-phishing1
1 million malicious Android apps by end of 20132
1 in 5 use Dropbox at work, typically against rules3
1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012
2. Trend Micro Threat Predictions for 2013
3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni,
Sept 2012
Device Hopping
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Employees
Complete End User Protection
Device Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking File/Folder &
Removable Media
Anti-Malware Encryption Application
Control
Device
Management Data Loss
Prevention
Content
Filtering
Copyright 2013 Trend Micro Inc.
IT Admin
Security
Copyright 2013 Trend Micro Inc.
New in 2013: Enhanced Secure Cloud Sync & Share
Unique blend:
• Sync & Share
• DLP
• Sharing
• Protection
• Device Health
• App Mgmt
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart • Layered security from mobile to gateways
• Superior architecture; detects real-world threats faster
• Unique phishing protection with sandbox analysis
Simple • Modular, lightweight and efficient
• Unified dashboard with centralized policy control
• Integrated DLP for easiest configuration
• Flexible deployment: on-premise or as a service
Security that fits • Specialized plug-ins for Exchange, Domino, SharePoint
• Open: Win, Mac, iOS, Android, Blackberry…
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Cloud &
Virtualization
IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Productivity
HR
CRM
Customer
Support
Finance
Supply Chain
Commerce
Employees
Partners
Customers
Business App Owners
Data Center Ops
Copyright 2013 Trend Micro Inc.
Productivity
HR
CRM
Customer
Support
Finance
Supply Chain
Commerce
Data Center Ops
Data Center
Copyright 2013 Trend Micro Inc.
By 2016, 71% of server workloads will be virtualized1;
Organizations can cut costs by 74% by storing data in the cloud2
Data Center Ops
Data Center
Physical Virtual Private Cloud
• Server and VM integrity
• Appropriate policy enforcement
• Data protection, especially in the cloud
• Performance and manageability Security
1. Source: Gartner, Forecast Analysis: Data Center, May 2012
2. Source: Forrester study
Public Cloud
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Public Cloud Private Cloud
Cloud and Data Center Security
Anti-Malware Firewall Encryption Integrity
Monitoring Intrusion
Prevention
Log
Inspection
Data Center Ops
Security
Copyright 2013 Trend Micro Inc.
• Single platform and administration
across physical, virtual and cloud
New: • Further differentiating VMware
optimization
o Improved performance (caching, de-
duping)
oStronger protection (automated virtual
patching, Hypervisor integrity
monitoring)
• Hybrid cloud management for
Amazon Web Services and
VMware vCloud
Deep Security: Optimized for Virtualization and Cloud
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart • Comprehensive protection across physical, virtual, cloud
• Automated protection, including virtual patching
Simple • Single platform and administration; modular deployment
• Market-leading, truly agentless for VMware; enables
maximum density, consolidation, and performance
• Cloud-friendly: multi-tenancy, usage-based billing…
Security that fits • Optimized, automated security for VMware and AWS
• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…
Copyright 2013 Trend Micro Inc.
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
Today’s Attacks: Social, Sophisticated, Stealthy!
Copyright 2013 Trend Micro Inc.
Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
Network Admin
Security
1.8 successful attacks per week / per large organization1
21.6% organizations experienced APT attacks2
Malware engineered and tested to evade your standard
gateway/endpoint defenses
A custom attack needs a custom defense!
1: Source: 2012 Ponemon Study on costs of Cybercrime
2: Source: ISACA APT Awareness Study, 2013
Copyright 2013 Trend Micro Inc.
Custom Defense
Network Admin
Security
Network-wide
Detection
Threat
Intelligence
Threat Tools
and Services Custom
Sandboxes
Advanced
Threat Analysis
Automated
Security Updates
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Threat
Intelligence
Threat Tools
and Services Custom
Sandboxes
Detect malware,
communications and
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
Enabling a Complete Lifecycle
Advanced
Threat Analysis
Automated
Security Updates
Copyright 2013 Trend Micro Inc.
Network Admin
Security
Deep Discovery: at the Heart of the Custom Defense
• Advanced threat
detection (even non-
Windows malware)
• Multiple customer-
defined sandboxes
• Local and global
threat intelligence
• Single appliance
across multiple ports
and protocols
• Custom security
updates to endpoints
and gateways
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart • Advanced, targeted threat detection, including
detection of non-Windows malware (i.e. mobile)
• Only solution with multiple customer-defined
sandboxes for more accurate analysis
• Actionable insight from global threat intelligence
Simple • Lowest TCO: Single appliance monitors across
multiple ports and 80+ protocols
• Only solution that enables the full lifecycle: detect,
analyze, adapt, respond
Security that fits • Sandbox analysis and custom signatures available
to other security products
Copyright 2013 Trend Micro Inc.
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Smart Protection
Copyright 2013 Trend Micro Inc.
Market Leadership
Trend Micro has 27% global share, almost twice the market share of the next two vendors - IDC 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011
“Trend Micro is able to dominate the market because of its diversified geographic reach, established customer base, and brand reputation.” Technavio 2011, Global Virtualization Security Management Solutions
Trend Micro extends its market share lead over closest competitor Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013
Copyright 2013 Trend Micro Inc.
Organizations Need a Smart Protection Strategy
Smart protection for information
Simple yet flexible to manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Interconnected
Real-time
Transparent
Layered
Copyright 2013 Trend Micro Inc.
Thank You!