OfficeScan 10 Cloud Client File Reputation Technology

76
Trend Micro 3 rd June 2009 Veli-Pekka Kusmin Pre-Sales Engineer OfficeScan 10 Cloud Client File Reputation Technology Stallion Spring Seminar 2009

Transcript of OfficeScan 10 Cloud Client File Reputation Technology

Page 1: OfficeScan 10 Cloud Client File Reputation Technology

Trend Micro3rd June 2009

Veli-Pekka KusminPre-Sales Engineer

OfficeScan 10 –

Cloud Client File Reputation TechnologyStallion Spring Seminar 2009

Page 2: OfficeScan 10 Cloud Client File Reputation Technology

Trend Micro Channel ConfidentialJune 2009

Veli-Pekka KusminPre-Sales Engineer

OfficeScan 10 (OSCE)Cloud Client File Reputation Technology

Page 3: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Why do we need a new approach against

malware?

Because Cybercrime is

mainstream now!

A malware industry has

been established!

Cybercrime is bigger than the drug trade today?

June-2009 3Trend Micro Channel Confidential

Page 4: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Collaboration in the Underground

Independent

Businessman

Botnet Vendors

and Hackers

Malware

Vendors

Carders

Spammers

Blackmailers

Anti-Detection Vendors Toolkit

Vendors

June-2009 4Trend Micro Channel Confidential

Page 5: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Increase in unique malware samples

2008 Jan-May: 2753587 unique malware samples*

Data source: AV-Test.Org, June 2008

* = January - May 2008

1998: 177615 unique malware samples

1988: 1738 unique malware samples

June-2009 5Trend Micro Channel Confidential

Page 6: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Increase in unique malware samples

Data source: AV-Test.Org, June 2008

Note: Samples include malware variants

June-2009 6Trend Micro Channel Confidential

Page 7: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Incoming Threat Samples Per Hour

Problems in the pattern deployment in the future?

Trend Micro processes 1500 samples

per hour in year 2009

June-2009 7Trend Micro Channel Confidential

Page 8: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Why Internet Security?

June-2009 8Trend Micro Channel Confidential

Page 9: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

A Typical Web Threat – 9th of May 2008

June-2009 9Trend Micro Channel Confidential

Page 10: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

What does the HTML Code look like?

» HTML_IFRAME. QJ – first detected since

April 29, 2008 using scan engine 8.300 and

pattern file 5.247.00.

iframe … src=\‘http://getanewmazda.info …

Getanewmazda.info stores malicious code

June-2009 10Trend Micro Channel Confidential

Page 11: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Fast Reaction from Honda!

June-2009 11Trend Micro Channel Confidential

Page 12: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 12Trend Micro Channel Confidential

Another Typical Web Threat1. Your boss asks you to develop a corporate travel policy

2. You begin with a Google search on travel policy

Oct 7, 2006

First result is

a .gov site

Second result

looks like a

good choice

Page 13: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 13Trend Micro Channel Confidential

Example: Haxdoor

1. You click on the second search

result

2. You wait…the site appears to

be downloading images and

content…you wait…and you

wait…

3. Finally you close the browser

window…you‘ll find another site

Page 14: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 14Trend Micro Channel Confidential

Example: HaxdoorUnbeknownst to you…

1. The IFRAME at the top of the page leads you to an index.htm file

2. This file includes a script that exploits the MS Internet Explorer (MDAC) Remote Code Execution Exploit (MS06-014)– The original exploit code has been modified to try to bypass AV

scanners that detect the original exploit

3. An executable file (win.exe) is downloaded to your system and executed

4. You now have a backdoor with rootkit features—a variant of the notorious family of backdoor rootkits known as Haxdoor!

Page 15: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Smart Protection Network (Web)

Processes more than 50 Million

new IP addresses / URL„s daily

Processes more than 1.2

Terabyte daily

More than 1000 Global Threat

Research and Analysis Experts

Operates 24/7 in 10 centers

around the world

Category Collaboration

Anti-Spam

Operation

Anti-Malware

Operation

Threat Research

Operation

URL

Sourcing

End User

Query Traffic

Web

Crawler

Customer

Feedback

URLs in

Spam Mails

URL Threat

Research

3rd Party

Sources

Worldwide Services Dispatch

Category & Reputation Score

UR

Ls

Malicious EXE or URLs

URL

Analysis

Email Security Services

Email

Reputation Services

OEM Partners

URLs with malware

TMUFE

AV/AS Detection Signature or Heuristics

Web Reputation ServiceURL Filtering Service

Point

Products

URLs

DNS & HTTP

Automatic Rating Systems

Zone Builder/Dispatcher

URL Database

JIT Human Validation

Category Reputation

URL Services

Query PointsURL Services

Query Points

URL Services

Query Points

URL Services

Query PointsURL Services

Query Points

URL Services

Query Points

Sourcing:

Correlation:

June-2009 15Trend Micro Channel Confidential

Page 16: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Processing of a Web Threat - Honda example

Virus Scan Engine VSAPI (heuristics):

1210127434 61.91.242.26 1 TREIGSA15

1.5.1102 43ffffff 3 Possible_Hifrm-2 0

http:%2f%2fwww.honda.co.th%2fjazz%2f

Infected sites

detected as

HTML_IFRAME.QJ

Getanewmazda.info

malicious!

Anti-Malware

Operation

June-2009 16Trend Micro Channel Confidential

Page 17: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Smart Protection NetworkSecurity Made Smarter

Endpoint

GatewayOff Network

Web 2.0

SaaS/Managed

Cloud

ManagementThreat Analysis

TrendLabs &Malware Database

Web Reputation

URL

File Reputation

Files

Email Reputation

IP

Threat Feeds

(Email, Web, File)

Multi-Vector

Correlation

Feedback Loops

Threats

Verification

Analysis

Correlation

Packaging

Threat Collection

• Customers

• Partners

• TrendLabs Research,

Service & Support

• Samples

• Submissions

• Honeypots

• Web Crawling

• Feedback Loops

• Behavioral Analysis

Partners

ISPs, Cisco,

Linksys,

Sony, etc.

Mobile

June-2009 17Trend Micro Channel Confidential

2005 NOW

2006

Page 18: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Why File Reputation in the Cloud?

Endpoint Cloud

The traditional approach to Malware protection places the burden

of storage and detection intelligence on the customer.

Negative Effects• vastly increasing endpoint resource usage

(disc, cpu, memory)

• increasing network bandwidth

• increasing delays in handling new threats

• outdated clients?

Burden of Storage

June-2009 18Trend Micro Channel Confidential

Page 19: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Why File Reputation in the Cloud?

Endpoint Cloud

Burden of Storage

The future approach to Malware protection places the burden of

storage and detection intelligence in the cloud.

Advantages• minimal endpoint resource usage

• consistent network bandwidth usage

• immediate handling of new threats

• increased awareness of localized threats

June-2009 19Trend Micro Channel Confidential

Page 20: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Threat DetectedProtection Received

Benefits of Cloud-Client Architecture

Hours Until Protection Is in Place

Cloud-Client

Architecture

Conventional

Content Security

Threat Detected

Pattern File Received

Pattern File Deployed

Protection Deployed

Decrease Security Latency:

Faster Protection Equals Lower Risks and Costs

June-2009 20Trend Micro Channel Confidential

Page 21: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

File Reputation – Feedback Loop

• The feedback loop mechanism does not involve copying

or downloading any files from customer communications

for analysis. When a file in an email attachment is

determined by behavioral analysis to be malicious, the

only information that is sent to the file reputation

database is a ―fingerprint‖ of the file—the minimum

required to uniquely identify that file, along with

references to IP addresses associated with spam or

potentially malicious websites.

• All of this is accomplished without downloading the entire

file, or in any way accessing the business data that is

included in that file. In no case is any information stored

that would allow the file to be traced to an end user or

customer organization.

June-2009 21Trend Micro Channel Confidential

iCRC

Page 22: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 22Trend Micro Channel Confidential

OfficeScan 10 – Available now!

Page 23: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10 – New features

• File Reputation

• Cloud Scan Server (Integrated or Standalone)

• Device Control

• Role Based Administration

• Active Directory integration for Security Compliance

reports

• Optional End-user control for Scheduled Scans

• Web Reputation configurations improvements

• Windows Server 2008 Support

June-2009 23Trend Micro Channel Confidential

Page 24: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• File Reputation

– With File Reputation technology, the OfficeScan client provides

more immediate protection with negligible pattern management

effort and a lighter footprint

– Administrators can decide to use either cloud based scanning or

traditional scanning technology

June-2009 24Trend Micro Channel Confidential

Page 25: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 25Trend Micro Channel Confidential

Page 26: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Corporate Network

Internet

Local Scan Server

Query file signature

Immediate response

FILE

REPUTATION

Constant, real-time

updates happen

in the cloud

Query file signature

Immediate response

OfficeScan 10

June-2009 26Trend Micro Channel Confidential

Page 27: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Cloud Scan Server (Integrated)

– Integrates with OSCE 10 server (on OSCE management console)

– Supports Windows platform either in 32 or 64 bits environment

– Performs active update for Cloud Scan Server related patterns

– Stores Cloud Virus & Smart Filter Patterns

– Clients are able to download latest Smart Filter patterns from Cloud Scan Server

– Clients are also able to send CRC queries to Cloud Scan Server

– Responds results back to the clients by querying patterns in the shared memory

June-2009 27Trend Micro Channel Confidential

Page 28: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 28Trend Micro Channel Confidential

OfficeScan 10 - Cloud Scan Server (Integrated)

• Install Cloud Scan Server (Integrated)

Select Yes

Select No

Page 29: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Cloud Scan Service Source

OfficeScan 10 - Cloud Scan Server (Integrated)

June-2009 29Trend Micro Channel Confidential

Page 30: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Cloud Scan Server

OfficeScan 10 - Cloud Scan Server (Integrated)

June-2009 30Trend Micro Channel Confidential

Page 31: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Cloud Scan Server (Standalone)

– A Linux Server with CentOS 5.1 kernel (a freely-available Linux

distribution)

– Stores Cloud Virus Pattern (on database) & Smart Filter

– Clients can download both Smart Filter from Cloud Scan Server

– iCRC Clients make CRC queries to the Cloud Virus Pattern DB

on Cloud Scan Server

– ONLY be installed as virtual machine on VMWare ESX 3.0, ESX

3.5, ESXi 3.5 and Server 2.0

– CPU/BIOS MUST support Virtualization Technology

– Virtual machine MUST be 64-bit compatible (i.e. 64-bit Guest

OS)

– iCRC Cloud Scan Server CANNOT be installed on Virtual

machine without hard drive or network device

June-2009 31Trend Micro Channel Confidential

Page 32: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

1. Open http://server-ip:8080

2. Login as “admin” only

OfficeScan 10 - Cloud Scan Server (Standalone)

June-2009 32Trend Micro Channel Confidential

Page 33: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10 - Cloud Scan Server (Standalone)

June-2009 33Trend Micro Channel Confidential

Page 34: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• File Reputation

– Administrators can decide to use either cloud based scanning or

traditional scanning technology

June-2009 34Trend Micro Channel Confidential

New icon ->

Page 35: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Device Control

– Capability to granularly control the access and use of fixed and

removable devices, such as USB storage.

June-2009 35Trend Micro Channel Confidential

Page 36: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.Trend Micro Channel Confidential

OfficeScan 10

• Device will be ―Plug-in devices (USB)‖

• Permissions will be ―No Access‖

June-2009 36

Page 37: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Role Based Administration

– Allows to spread responsibilities

for endpoint security amongst

multiple administrators and to

define their management roles

based on their login credentials

June-2009 37Trend Micro Channel Confidential

Page 38: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 38Trend Micro Channel Confidential

Page 39: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 39Trend Micro Channel Confidential

Page 40: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Active Directory integration for Security Compliance

reports

– Administrators can easily spot ‗unprotected‘ machines by

connecting OfficeScan to the central Active Directory and by

querying various levels in the AD tree (Organization Unit, and

Container)

– Manage the static AV status under specified scope of AD

structure

– Provide remote installation functionality over un-protected

computers in the AD structure

– Scheduled/Manual update of compliance report

– An AD domain is available (NT4 domain not supported)

– OSCE server installed on the computer joined AD domain

June-2009 40Trend Micro Channel Confidential

Page 41: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 41Trend Micro Channel Confidential

Page 42: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 42Trend Micro Channel Confidential

Page 43: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

June-2009 43Trend Micro Channel Confidential

Page 44: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Optional End-user control for Scheduled Scans

– Users can decide to postpone or skip scheduled scans based on

the privilege assignment by administrators

June-2009 44Trend Micro Channel Confidential

Page 45: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Web Reputation configuration improvements

– Added granularity, allowing the assignment of Web Reputation

policy at various layers of the OfficeScan client tree.

June-2009 45Trend Micro Channel Confidential

Page 46: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 46Trend Micro Channel Confidential

OfficeScan 10 Web Reputation

Page 47: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 47Trend Micro Channel Confidential

OfficeScan 10 Web Reputation

Browser:

Client popup:

Page 48: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10

• Windows Server 2008 Support

– OfficeScan client and OfficeScan management server are fully

supported on Window Server 2008 (excluding server core and

Hyper-V for now)

– Windows Server 2008 (Standard, Enterprise, Datacenter and

Web Editions), 32-bit and 64-bit versions

June-2009 48Trend Micro Channel Confidential

Page 49: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 49Trend Micro Channel Confidential

OfficeScan™ Client/Server Edition 10.0

• OfficeScan™ provides a revolutionary new defense

against threats—both on and off the corporate network—

combining world-class anti-malware with innovative in-

the-cloud protection from the Trend Micro Smart

Protection Network. New File Reputation moves the

burden of pattern file management into the cloud, freeing

endpoint resources. And Web Reputation protects

endpoints by blocking access to malicious sites.

• Available in solution suites, OfficeScan now offers a

single solution to protect desktops, laptops, servers,

storage appliances, and smartphones. A flexible plug-in

architecture, virtualization, and extended platform

support ensure better security, lower management costs,

and more flexibility to evolve your security.

Page 50: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

OfficeScan 10.0 Demo

June-2009 50Trend Micro Channel Confidential

Page 51: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

MODULAR PLUG-IN ARCHITECTURE

Anti-malwareFile & Folder

Encryption

HIPS &

Vulnerability shielding

Mobile

SecuritySecurity for

Macintosh

Virtualization

Security

Select the security you want to deploy, when, and where

• Easily add new modules, as needed

– As soon as new technologies become available

– At any time your needs change

• Extends your solution lifecycle

• Protects your investment

• No need to rip-and-replace to be protected

OfficeScan Plug-in Architecture

June-2009 51Trend Micro Channel Confidential

Page 52: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

MODULAR PLUG-IN ARCHITECTURE

Anti-malwareHIPS &

Vulnerability shielding

Mobile

Security

OfficeScan Plug-in Architecture

June-2009 52Trend Micro Channel Confidential

Page 53: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.53

Intrusion Defense Firewall

Intrusion Defense Firewall (IDF)

• Designed to protect corporate desktops & laptops

• Implemented as an OfficeScan 8.0 and 10.0 Plug-in

• Consists of two components

– IDF Manager Plug-in

– IDF Client Plug-in

Desktop & Laptop Protection

OfficeScan Plug-in

OfficeScan 8.0/10.0

Intrusion Defense Firewall

June-2009Trend Micro Channel Confidential

Page 54: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.54

IDF Leverages OfficeScan

plug-in architecture

Internet

OfficeScan 8.0/10.0 Console

Intrusion Defense Firewall

Is deployed on top of

OfficeScan – no reinstall

June-2009Trend Micro Channel Confidential

Page 55: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.55

Intrusion Defense Firewall

• Enhanced OfficeScan End-point Security

– Enhanced firewall capabilities

• Stateful bi-directional firewall

• Includes pre-defined Windows security profiles

– Intrusion Detection and Prevention

• Protect against both known and unknown attacks

• Shield systems until they can be patched

• Detection only / Detection and Prevention

– Centralized Management

• Dashboards, logging, reports, threat tracking

• Deployment, updates, configuration

June-2009Trend Micro Channel Confidential

Page 56: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Enhanced firewall capabilities

June-2009 56Trend Micro Channel Confidential

Page 57: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Enhanced firewall capabilities

June-2009 57Trend Micro Channel Confidential

Page 58: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 58Trend Micro Channel Confidential

Intrusion Detection and Prevention

Page 59: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Intrusion Detection and Prevention

June-2009 59Trend Micro Channel Confidential

Smart - One or more known and unknown (zero day) vulnerabilities

Exploit - An exact exploit, usually signature based

Vulnerability - A specific vulnerability for which one or more exploits may exist

Page 60: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.60

Blended Protection

Reactive

Handle “Unknown”

(Smart/Custom Filters)

Stop / Neutralize Unknown Bad

or Known Vulnerability

(Vulnerability Filters)

Proactive

Stop Known Bad

(Exploit/Attack Filters)

MalwareIntrusion

Defense

Firewall

June-2009Trend Micro Channel Confidential

Page 61: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 61Trend Micro Channel Confidential

Centralized Management

Page 62: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 62Trend Micro Channel Confidential

Intrusion Defense Firewall 1.1

• As a plug-in for OfficeScan 8.0/10.0, Intrusion Defense

Firewall provides earlier, stronger endpoint protection by

supplementing highly effective OfficeScan client-level security

with network-level Host Intrusion Prevention System (HIPS).

• A high-performance, deep-packet inspection engine monitors

incoming and outgoing traffic for network protocol deviations,

suspicious content that signals an attack, or security policy

violations. Intrusion Defense Firewall shields vulnerabilities

from being exploited before patches can be deployed to

business-critical and hard-to-patch systems.

• Together with Intrusion Defense Firewall, OfficeScan provides

one of the industry‘s most secure platforms for protecting end

users, whether they are on the network, mobile, or remote.

Page 63: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Intrusion Defense Firewall 1.1 (Plug-in) Demo

June-2009 63Trend Micro Channel Confidential

Page 64: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Mobile Security 5.1

Comprehensive, all-in-one mobile security

• State-of-the art Anti-Malware

• Firewall and Intrusion Detection

• In-place data encryption

• Remote wipe

• Powerful authentication

• SMS and WAP security

• Scalable enterprise-class central management

June-2009 64Trend Micro Channel Confidential

Page 65: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

The Mobile Security Challenge

Centralized

management for

smartphones and PDAs

Anti-malware to stop

viruses, spyware, and

SMS spam

Firewall/IDS to prevent

hacker intrusion

Encryption/remote wipe

to protect sensitive data

in the event of loss or

theft

Protect confidential data

against loss or theft

Manage security for

multiple devices across

different networks

Limit device downtime &

compliance to match

corporate policies

Ensure device integrity (data at rest / data in motion)

Manage devices and

functions of

smartphones

Feature lock capabilities

June-2009 65Trend Micro Channel Confidential

Page 66: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Mobile Security 5.1 Antivirus

• Real-time Scan

• Manual Scan

• Card Scan

• Scan Options: – Actions: Quarantine, Delete

– File type: exe and cab/zip, only exe, all files.

– Scan layers: 1/2/3.

June-2009 66Trend Micro Channel Confidential

Page 67: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Mobile Security 5.1 Firewall

• Stateful inspection firewall protects against hackers & intrusions

– Includes Intrusion Detection System (IDS)

• Predefined security levels deliver simplicity

– Low – Allows all inbound & outbound traffic

– Medium – Allows all outbound traffic, blocks inbound

– High – Blocks all inbound & outbound traffic

• Customizable firewall rules for specific ports & IP addresses

– Rules can be prioritized/ordered when impacting same port/address

June-2009 67Trend Micro Channel Confidential

Page 68: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Real-time in-place EncryptionSecure Data on mobile devices

• For certified Windows Mobile 5/6 devices andnow also on Nokia Symbian Devices E60, E61i, E70, E90!

• Automatically encrypts admin-selected file types

– No user intervention required

– No circumventing encryption

– No need for encrypted ‖containers―

• Completely transparent to the end-user

– No end-user training required

– No decision on what data to encrypt

• FIPS 140-2 validated algorithms

– AES 128-bit, 192-bit and 256-bit

– Triple DES

• Encrypts device memoryand storage cards

June-2009 68Trend Micro Channel Confidential

Page 69: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

TMMS 5.1 SMS Anti-spam

• Approved list

– Allow messages from numbers on this list, block all other

messages.

• Blocked list

– Block messages from numbers on this list, allow all other

messages.

• TMMS will move all blocked SMS messages to a Spam folder in

your inbox.

June-2009 69Trend Micro Channel Confidential

Page 70: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

TMMS 5.1 WAP Push Protection

• WAP Push protection allows you to use a list of trusted

senders to filter WAP Push messages.

• The blocked messages will be deleted.

June-2009 70Trend Micro Channel Confidential

Page 71: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

TMMS 5.1 Feature Lock

June-2009 71Trend Micro Channel Confidential

Page 72: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

TMMS 5.1 Remote Wipe

• Remotely wipe all data on the device

June-2009 72Trend Micro Channel Confidential

Page 73: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Trend Micro Mobile Security 5.1 Single Console Management for Endpoints

• Single console for endpoint security management

– Protects smartphones, PDAs, laptops, desktop, and servers

– Simplifies administration

– Reduces total cost of ownership

• Policy creation and deployment to all mobile devices

running Trend Micro Mobile Security

– Global policies

– Group policies

June-2009 73Trend Micro Channel Confidential

Page 74: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.June-2009 74Trend Micro Channel Confidential

Trend Micro Mobile Security 5.1

• Trend Micro Mobile Security protects smartphones and PDAs

from data loss, infections, and attacks. Encryption and

authentication defends data integrity and company reputation

when devices are lost or stolen. The anti-malware features

block viruses, worms, Trojans, and SMS text message spam.

Built-in firewall and Intrusion Detection System (IDS) protects

against hackers, intrusions, and denial-of-service attacks—

potential threats to the increasing number of Wi-Fi-enabled

mobile devices.

• With the included OfficeScan™ Client/Server Edition 8.0

console, IT managers can save resources by managing

security for smartphones, PDAs, desktops, servers, laptops or

any combination of these devices.

Page 75: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.

Mobile Security 5.1 (Plug-in) Demo

June-2009 75Trend Micro Channel Confidential

Page 76: OfficeScan 10 Cloud Client File Reputation Technology

Copyright 2009 - Trend Micro Inc.Sep 2007 76Trend Micro Channel Confidential

Veli-Pekka KusminPre-Sales Engineer

Trend Micro Baltics & Finland

Porkkalankatu 7 A, 5th floor

FI-00180 Helsinki

Finland

Telephone +358 9 5868 620

Direct +358 9 5868 6212

Fax +358 9 753 1098

Mobile +358 40 596 7181

[email protected]

http://www.trendmicro-europe.com