The Changing World of Endpoint Protection Hashem El Telawi October 2015.

29
The Changing World of Endpoint Protection Hashem El Telawi October 2015

Transcript of The Changing World of Endpoint Protection Hashem El Telawi October 2015.

The Changing World of Endpoint Protection

Hashem El TelawiOctober 2015

2

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Identify trends

Understand customer behavior

Analyze opportunities

Discover efficiencies

3

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Payment Card Industry (PCI)

Protected Health Information (PHI)

Personally Identifiable Information (PII)

Intellectual Property (IP)

4

Payment Card Industry (PCI)

Protected Health Information (PHI)

Personally Identifiable Information (PII)

Intellectual Property (IP)

NEW THREATS CREATED EVERY SECOND90% ORGANIZATIONS HAVE

ACTIVE MALWARE55%2 NOT EVEN AWARE OF INTRUSIONS

COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS

ESTIMATED COST OF RECENT RETAIL DATA BREACH$1B+

Source: Jeffries Group Inc. retail analysts

5

Hacked

Interestingstory

Inside Job

Accidentalpublish

World’s Biggest Data Breaches: Most are Hacks

Source: www.informationisbeautiful.net

Copyright 2014 Trend Micro Inc. 6

Time

Vulnerability Exploits

Traditional Malware

Advanced Malware

Employee DataLeaks

Targeted Attacks

Soph

istica

tion

Copyright 2014 Trend Micro Inc. 7

Then. . .!

Employees

IT Admin

File/Folder &Removable Media

Email &Messaging

Web Access

Copyright 2014 Trend Micro Inc. 8

Now. . . !

Email &Messaging

Web Access

File/Folder &Removable Media

IT Admin

Employees

Device Hopping Cloud Sync& Sharing Collaboration

Social Networking

IT Workload Increasing

IT Admin

Copyright 2014 Trend Micro Inc. 9

Many more environments

More complex compliance

Copyright 2014 Trend Micro Inc. 10

A Gradual Transition to the Cloud

“25% of Office customers now have Office 365. Microsoft, April 2013

Attackers

Attackers

IncreasedOpportunity for Threats and Data Loss

Copyright 2013 Trend Micro Inc. 14

Evolving Threat Landscape

Time

Vulnerability Exploits

Traditional Malware

Advanced Malware

Employee Data Leaks

Targeted Attacks

Soph

istic

ation

Copyright 2014 Trend Micro Inc. 15

Customers need a range of capabilities…

Email Security

Secure Web Gateway

SharePoint Security

Mobile Security

Endpoint Protection

Encryption

Advanced Threat Protection

Application Control

DLP

Copyright 2014 Trend Micro Inc. 16

…but don’t want lots of consoles!

Email Security

Secure Web Gateway

SharePoint Security

Mobile Security

Endpoint Protection

Encryption

Advanced Threat Protection

Application Control

DLP

IT Admin

!#$%*?!

No interconnected threat response

Reduced timeliness

Higher cost

Higher workload

Copyright 2014 Trend Micro Inc. 17

…or separate cloud / on-premise consoles

Copyright 2014 Trend Micro Inc. 18

Suite vendors help improve this…

Email Security

Secure Web Gateway

SharePoint Security

Mobile Security

Endpoint Protection

Encryption

Advanced Threat Protection

Application Control

DLP

19

Requirements of an effective endpoint solution

Copyright 2014 Trend Micro Inc.

Copyright 2014 Trend Micro Inc. 20

Endpoint Solutions Intelligence Network

Anti-Malware Encryption ApplicationControl

Device Management

Data LossPrevention

ContentFiltering

Employees

IT Admin

Security

Email &Messaging

Web Access

Device Hopping

CollaborationCloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Copyright 2014 Trend Micro Inc. 21

It’s not about traditional AV anymore

Copyright 2013 Trend Micro Inc. 22

Evolving Threat Landscape

Time

Vulnerability Exploits

Traditional Malware

Advanced Malware

Employee Data Leaks

Targeted Attacks

Soph

istic

ation

Copyright 2014 Trend Micro Inc.

Device Control

DLP

Encryption

Behavior Monitoring

Vulnerability Protection

Unpacking

Memory Inspection

Command & Control Blocking

Sandboxing

FileReputation

WebReputation

Email Reputation

Web Gateway

Email Gateway or Server

SharePoint Server

Forensics

Network

ApplicationWhitelisting

827M in March 2014 284M in

March 2014

Copyright 2014 Trend Micro Inc. 24

Comprehensive Protection vs Threats

Employee Data Leaks

Traditional malware

Vulnerability exploits

Advanced Malware

Targeted Attacks

APPLICATION CONTROL

BEHAVIOR MONITORINGCOMMAND&CONTROL BLOCK

SANDBOXING INTEGRATION

SIG-BASED

WEB REPVULNERABILITY PROTECTION

BROWSER EXPLOIT PROTECTION

DLPENCRYPTION

DEVICE POLICY

The Modern Suite

Copyright 2014 Trend Micro Inc. 25

Protection On-Premise and in the Cloud

✔ ✔ ✔

✔ ✔ ✔

Endpoint Protection Messaging Security Secure Web Gateway

26

213 MB

118MB

36 MB

Minimal endpoint / network impactReal-time protection

Source: Trend Micro, tested on 22nd August 2013 using the latest endpoint products with the latest pattern at the time of testing

Superior Cloud / Client Architecture Increases Efficiency

Copyright 2013 Trend Micro Inc.

COLLECTS VIA GLOBAL SENSOR NET

BIG DATA ANALYTICS

GLOBAL THREAT INTELLIGENCE

A GLOBAL INTELLIGENCE DATA NETWORK

Copyright 2014 Trend Micro Inc. 28

Trend Micro 26 years focused on security software, now largest pure-play Consistent – A World Safe for Exchanging Digital Information Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) 8 consecutive years on Dow Jones Sustainability Indexes Customers include 48 of top 50 global corporations 5200+ employees, 38 business units worldwide

500k commercial customers &155M endpoints protected Small

Business

Midsize Business

Enterprise

Consumer

Consumers

Thank you!