The Changing World of Endpoint Protection Hashem El Telawi October 2015.
-
Upload
stuart-may -
Category
Documents
-
view
212 -
download
0
Transcript of The Changing World of Endpoint Protection Hashem El Telawi October 2015.
2
INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
3
INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
4
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
NEW THREATS CREATED EVERY SECOND90% ORGANIZATIONS HAVE
ACTIVE MALWARE55%2 NOT EVEN AWARE OF INTRUSIONS
COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS
ESTIMATED COST OF RECENT RETAIL DATA BREACH$1B+
Source: Jeffries Group Inc. retail analysts
5
Hacked
Interestingstory
Inside Job
Accidentalpublish
World’s Biggest Data Breaches: Most are Hacks
Source: www.informationisbeautiful.net
Copyright 2014 Trend Micro Inc. 6
Time
Vulnerability Exploits
Traditional Malware
Advanced Malware
Employee DataLeaks
Targeted Attacks
Soph
istica
tion
Copyright 2014 Trend Micro Inc. 7
Then. . .!
Employees
IT Admin
File/Folder &Removable Media
Email &Messaging
Web Access
Copyright 2014 Trend Micro Inc. 8
Now. . . !
Email &Messaging
Web Access
File/Folder &Removable Media
IT Admin
Employees
Device Hopping Cloud Sync& Sharing Collaboration
Social Networking
IT Workload Increasing
IT Admin
Copyright 2014 Trend Micro Inc. 9
Many more environments
More complex compliance
Copyright 2014 Trend Micro Inc. 10
A Gradual Transition to the Cloud
“25% of Office customers now have Office 365. Microsoft, April 2013
Copyright 2013 Trend Micro Inc. 14
Evolving Threat Landscape
Time
Vulnerability Exploits
Traditional Malware
Advanced Malware
Employee Data Leaks
Targeted Attacks
Soph
istic
ation
Copyright 2014 Trend Micro Inc. 15
Customers need a range of capabilities…
Email Security
Secure Web Gateway
SharePoint Security
Mobile Security
Endpoint Protection
Encryption
Advanced Threat Protection
Application Control
DLP
Copyright 2014 Trend Micro Inc. 16
…but don’t want lots of consoles!
Email Security
Secure Web Gateway
SharePoint Security
Mobile Security
Endpoint Protection
Encryption
Advanced Threat Protection
Application Control
DLP
IT Admin
!#$%*?!
No interconnected threat response
Reduced timeliness
Higher cost
Higher workload
Copyright 2014 Trend Micro Inc. 18
Suite vendors help improve this…
Email Security
Secure Web Gateway
SharePoint Security
Mobile Security
Endpoint Protection
Encryption
Advanced Threat Protection
Application Control
DLP
Copyright 2014 Trend Micro Inc. 20
Endpoint Solutions Intelligence Network
Anti-Malware Encryption ApplicationControl
Device Management
Data LossPrevention
ContentFiltering
Employees
IT Admin
Security
Email &Messaging
Web Access
Device Hopping
CollaborationCloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Copyright 2013 Trend Micro Inc. 22
Evolving Threat Landscape
Time
Vulnerability Exploits
Traditional Malware
Advanced Malware
Employee Data Leaks
Targeted Attacks
Soph
istic
ation
Copyright 2014 Trend Micro Inc.
Device Control
DLP
Encryption
Behavior Monitoring
Vulnerability Protection
Unpacking
Memory Inspection
Command & Control Blocking
Sandboxing
FileReputation
WebReputation
Email Reputation
Web Gateway
Email Gateway or Server
SharePoint Server
Forensics
Network
ApplicationWhitelisting
827M in March 2014 284M in
March 2014
Copyright 2014 Trend Micro Inc. 24
Comprehensive Protection vs Threats
Employee Data Leaks
Traditional malware
Vulnerability exploits
Advanced Malware
Targeted Attacks
APPLICATION CONTROL
BEHAVIOR MONITORINGCOMMAND&CONTROL BLOCK
SANDBOXING INTEGRATION
SIG-BASED
WEB REPVULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTION
DLPENCRYPTION
DEVICE POLICY
The Modern Suite
Copyright 2014 Trend Micro Inc. 25
Protection On-Premise and in the Cloud
✔ ✔ ✔
✔ ✔ ✔
Endpoint Protection Messaging Security Secure Web Gateway
26
213 MB
118MB
36 MB
Minimal endpoint / network impactReal-time protection
Source: Trend Micro, tested on 22nd August 2013 using the latest endpoint products with the latest pattern at the time of testing
Superior Cloud / Client Architecture Increases Efficiency
Copyright 2013 Trend Micro Inc.
COLLECTS VIA GLOBAL SENSOR NET
BIG DATA ANALYTICS
GLOBAL THREAT INTELLIGENCE
A GLOBAL INTELLIGENCE DATA NETWORK
Copyright 2014 Trend Micro Inc. 28
Trend Micro 26 years focused on security software, now largest pure-play Consistent – A World Safe for Exchanging Digital Information Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) 8 consecutive years on Dow Jones Sustainability Indexes Customers include 48 of top 50 global corporations 5200+ employees, 38 business units worldwide
500k commercial customers &155M endpoints protected Small
Business
Midsize Business
Enterprise
Consumer
Consumers