0
Next Generation Security Platforms Will Enable Clouds To Fulfill Their Promise John Maddison SVP Trend Micro June 7 th  2010
Cloud Security Business Model Scalable Subscription Service Model Cross Selling Opportunities
3 Types Of Cloud Security Security from The Cloud Security for The Cloud Security in The Cloud 1 2 3
Threat Environment Evolving Threat of Volume Projected   Increase   in Unique Threat Samples  PER HOUR  (Conservative Proj...
Crimeware Driving the Threat Environment <ul><li>Complex </li></ul><ul><li>High Volume </li></ul><ul><li>Short Life Cycle ...
Cloud Client Architecture Now Required Threat Protection Databases 50 Signatures Per Day Past Threat Protection Databases ...
Threat Protection vs. Detection TARGET LINKS & ATTACHMENTS INTERNET REMOVABLE MEDIA FILE TRANSFERS EMAIL WEBSITES THREATS ...
The $30B (IDC) Security Market Will Shift to the Cloud 3
Baseline Security Moving To The Cloud <ul><li>Small Business </li></ul><ul><li>All Security Solutions - Cloud Client Enabl...
Data Center Being Upgraded <ul><li>Consolidation & Virtualization </li></ul><ul><li>Virtual Desktop Infrastructure </li></...
Datacenter-hosted Virtual Desktop Infrastructure <ul><li>User Operating environment </li></ul><ul><li>Virtual machine on a...
Traditional Security Causes Resource Contention  <ul><li>The “9-AM problem” </li></ul><ul><ul><li>Multiple users log in an...
Security Needs to Align with the New Infrastructure <ul><li>Detects whether endpoints are physical or virtual </li></ul><u...
Deep Security Architecture
Key Security Practices <ul><li>Protecting Virtualized Environments & Ensuring Compliance </li></ul><ul><li>Securing the Pu...
SaaS Market 2010 - $2B (IDC) 3
SaaS Basic’s <ul><li>Hosted </li></ul><ul><li>Hybrid SaaS </li></ul><ul><li>Market Coverage </li></ul><ul><li>Segment Focu...
Hosted Solutions For Small Businesses 3 In-the-Cloud Gateway Network Servers Endpoint Off Network Hosted Email Security We...
Hybrid SaaS Solutions For Enterprises 3 Web Services On-Premise Part Cloud  Part Pre-Filter For Emails Central Policy Outb...
Reseller Management Tools 3 <ul><li>Reseller Console </li></ul><ul><li>Manage Customer Profiles </li></ul><ul><li>License ...
Key Reseller Take-Aways <ul><li>Differentiated Cloud  Security Offerings </li></ul><ul><li>Data Center Security Practices ...
 
Upcoming SlideShare
Loading in...5
×

Next Generation Security Platforms Will Enable Clouds To ...

360

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
360
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • As vendors come up with new methods of protecting their customers, their technologies should be included in the tests. Protection Networks using cloud-based technologies are currently prohibited from the traditional Anti-Virus/Anti-Malware testing methodologies. Trend Micro’s Smart Protection Network uses in-the-cloud reputation technologies to block threats at their source and therefore should be included in any new testing methodologies.
  • Transcript of "Next Generation Security Platforms Will Enable Clouds To ..."

    1. 1. Next Generation Security Platforms Will Enable Clouds To Fulfill Their Promise John Maddison SVP Trend Micro June 7 th 2010
    2. 2. Cloud Security Business Model Scalable Subscription Service Model Cross Selling Opportunities
    3. 3. 3 Types Of Cloud Security Security from The Cloud Security for The Cloud Security in The Cloud 1 2 3
    4. 4. Threat Environment Evolving Threat of Volume Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) 1 By 2015 233,000,000 Per Year
    5. 5. Crimeware Driving the Threat Environment <ul><li>Complex </li></ul><ul><li>High Volume </li></ul><ul><li>Short Life Cycle </li></ul>1 PROFIT DRIVEN SOPHISTICATED Web Botnets Spyware Spam Worms Complexity MULTIPLYING 5,490,960 1985 1995 2007 Malware Sample Collection Growth 2005
    6. 6. Cloud Client Architecture Now Required Threat Protection Databases 50 Signatures Per Day Past Threat Protection Databases 50,000 Signatures Per Day Today Threat Protection Databases (CORRELATION) Reputation Queries Tomorrow Files URLs IP’s Files Files URLs IP’s 1
    7. 7. Threat Protection vs. Detection TARGET LINKS & ATTACHMENTS INTERNET REMOVABLE MEDIA FILE TRANSFERS EMAIL WEBSITES THREATS THREATS THREATS WEB REPUTATION EMAIL REPUTATION FILE REPUTATION SPAM
    8. 8. The $30B (IDC) Security Market Will Shift to the Cloud 3
    9. 9. Baseline Security Moving To The Cloud <ul><li>Small Business </li></ul><ul><li>All Security Solutions - Cloud Client Enabled </li></ul><ul><li>Option for Cloud Management </li></ul><ul><li>Enterprise </li></ul><ul><li>All Security Solutions - Cloud Client Enabled </li></ul><ul><li>Option for Local Cloud </li></ul>1
    10. 10. Data Center Being Upgraded <ul><li>Consolidation & Virtualization </li></ul><ul><li>Virtual Desktop Infrastructure </li></ul><ul><li>Private, Public & Hybrid Cloud </li></ul><ul><li>Data Protection </li></ul><ul><li>Compliance </li></ul>2
    11. 11. Datacenter-hosted Virtual Desktop Infrastructure <ul><li>User Operating environment </li></ul><ul><li>Virtual machine on an central server </li></ul><ul><li>Accessed from existing hardware </li></ul><ul><li>or a thin client </li></ul><ul><li>Can be accessed from anywhere </li></ul><ul><ul><li>Home PC over VPN </li></ul></ul><ul><ul><li>BYOC </li></ul></ul><ul><li>Analysts view: </li></ul><ul><li>Gartner: </li></ul><ul><li>“ [VDI] will undergo an explosive growth...“ </li></ul><ul><li>Enterprise strategy group: </li></ul><ul><li>” 60% of enterprises have a VDI strategy“ </li></ul><ul><li>Forrester: </li></ul><ul><li>“ three-quarters of firms now have client </li></ul><ul><li>virtualization on their IT agenda for the next </li></ul><ul><li>12 months“ </li></ul>2
    12. 12. Traditional Security Causes Resource Contention <ul><li>The “9-AM problem” </li></ul><ul><ul><li>Multiple users log in and get updates at the same time </li></ul></ul><ul><li>Scheduled scans </li></ul><ul><ul><li>Adds significant load to the endpoint </li></ul></ul><ul><ul><li>Multiplied by number of VMs </li></ul></ul>Cumulative system load Customers had to completely disable Security in their VDI environments!
    13. 13. Security Needs to Align with the New Infrastructure <ul><li>Detects whether endpoints are physical or virtual </li></ul><ul><ul><li>With VMware View </li></ul></ul><ul><ul><li>With Citrix XenDesktop </li></ul></ul><ul><li>Serializes updates and scans per VDI-host </li></ul><ul><ul><li>Controls the number of concurrent scans and updates per VDI host </li></ul></ul><ul><ul><li>Maintains availability and performance of VDI host </li></ul></ul><ul><ul><li>Faster than concurrent approach </li></ul></ul><ul><li>Leverages Base-images to further shorten scan times </li></ul><ul><ul><li>Pre-scans and white-lists VDI base-images </li></ul></ul><ul><ul><li>Prevents duplicate scanning of unchanged files on a VDI host </li></ul></ul><ul><ul><li>Further reduces impact on the VDI host </li></ul></ul>
    14. 14. Deep Security Architecture
    15. 15. Key Security Practices <ul><li>Protecting Virtualized Environments & Ensuring Compliance </li></ul><ul><li>Securing the Public Cloud without Losing Control </li></ul><ul><li>Managing Traditional and Virtual Desktop Infrastructure (VDI) Security </li></ul>2
    16. 16. SaaS Market 2010 - $2B (IDC) 3
    17. 17. SaaS Basic’s <ul><li>Hosted </li></ul><ul><li>Hybrid SaaS </li></ul><ul><li>Market Coverage </li></ul><ul><li>Segment Focus </li></ul><ul><li>Adding Value </li></ul>3
    18. 18. Hosted Solutions For Small Businesses 3 In-the-Cloud Gateway Network Servers Endpoint Off Network Hosted Email Security Web Application Scanning Hosted Endpoint (WFBS-S) Hosted Web Security (WFBS-S)
    19. 19. Hybrid SaaS Solutions For Enterprises 3 Web Services On-Premise Part Cloud Part Pre-Filter For Emails Central Policy Outbound Email Compliance Internal Vulnerability Scanning
    20. 20. Reseller Management Tools 3 <ul><li>Reseller Console </li></ul><ul><li>Manage Customer Profiles </li></ul><ul><li>License Management </li></ul><ul><li>Manage Policy </li></ul><ul><li>Consolidated Reporting </li></ul>Customer 1 Customer 2 Customer N
    21. 21. Key Reseller Take-Aways <ul><li>Differentiated Cloud Security Offerings </li></ul><ul><li>Data Center Security Practices </li></ul><ul><li>Scalable, Multiple SaaS Offerings with Reseller Management </li></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×