Enabling a Smart Protection Strategy
in the age of Consumerization, Cloud and new Cyber Threats
Gastone Nencini
Trend Micr...
Copyright 2013 Trend Micro Inc.
2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook
Users...
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Source: IBM
2.5 QUINTILLION
BYTES OF DATA/DAY!90% CREATED IN
LAST 2 YEA...
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Unders...
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Payment Card Industry ...
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personal...
Copyright 2013 Trend Micro Inc.
Empower the business:
Improve business agility by providing
quick and intuitive access to ...
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Cyber Threats
Attackers
Employees IT
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fi...
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Layered – lines of defense
Interconnected – intelligent p...
Copyright 2013 Trend Micro Inc.
Simple yet flexible
to deploy and manage
Centralized – visibility and control
Automated – ...
Copyright 2013 Trend Micro Inc.
Security that fits
an evolving ecosystem
Open – broad platform support
Optimized – designe...
Interconnected
Real-time
Transparent
Organizations Need a Smart Protection Strategy
Layered
Smart protection for
informati...
Copyright 2013 Trend Micro Inc.
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart protection
begins with global
threat intell...
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Protects
Identifies
Collects
Copyright 2013 Trend Micro Inc.
GLOBAL
SENSORNET
(via honeypots,
community, customers,
threat researchers
and more)
DAILY ...
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
BIG
DATA
ANALYTICS
(Data Mining,
Machine Learning,
Modeling, ...
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
GLOBAL
THREAT
INTELLIGENCE
DAILY STATS:
• 200M threats blocke...
Copyright 2013 Trend Micro Inc.
Global
CLOSER TO
THE SOURCE OF
THREATS
Correlated
IDENTIFIES ALL
COMPONENTS
OF AN ATTACK
P...
Copyright 2013 Trend Micro Inc.
Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using
the latest endpo...
Copyright 2013 Trend Micro Inc.
Complete End User Protection
Email &
Messaging
Web
Access
Device Hopping
Collaboration
Clo...
Enabling a Complete Lifecycle
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Advanced
Threat Analys...
Smart Protection
Copyright 2013 Trend Micro Inc.
Interconnected
Real-time
Transparent
Trend Micro Enables a Smart Protection Strategy
Layered
Smart protection for
informat...
Thank You!
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
Upcoming SlideShare
Loading in …5
×

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

384
-1

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
384
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

  1. 1. Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Gastone Nencini Trend Micro Italy Leader and Snr. Technical Manager Trend Micro Southern Europe
  2. 2. Copyright 2013 Trend Micro Inc. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
  3. 3. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Source: IBM 2.5 QUINTILLION BYTES OF DATA/DAY!90% CREATED IN LAST 2 YEARS INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
  4. 4. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies
  5. 5. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP)
  6. 6. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP) NEW THREAT CREATED EVERY SECOND 90% ORGANIZATIONS HAVE ACTIVE MALWARE 55%1 NOT EVEN AWARE OF INTRUSIONS COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS AVERAGE COST OF DATA BREACH$3.7M
  7. 7. Copyright 2013 Trend Micro Inc. Empower the business: Improve business agility by providing quick and intuitive access to the right information, tools and applications Mitigate risk: Protect sensitive information to maintain brand and comply with regulations, while controlling costs CIO
  8. 8. Copyright 2013 Trend Micro Inc. Consumerization Cloud & Virtualization Cyber Threats Attackers Employees IT
  9. 9. Copyright 2013 Trend Micro Inc. Smart protection for information Simple yet flexible to manage and deploy Security that fits an evolving ecosystem Information no longer protected by traditional defenses Customers Need… Point solutions; limited visibility, de-centralized administration Dynamic, complex environment; many new apps and platforms The New Reality…
  10. 10. Copyright 2013 Trend Micro Inc. Smart protection for information Layered – lines of defense Interconnected – intelligent protection Real-time – cloud updates Transparent – no user impact
  11. 11. Copyright 2013 Trend Micro Inc. Simple yet flexible to deploy and manage Centralized – visibility and control Automated – policy management Lightweight – resource efficient Flexible – on-premise or as a service
  12. 12. Copyright 2013 Trend Micro Inc. Security that fits an evolving ecosystem Open – broad platform support Optimized – designed in partnership Focused – 100% dedicated to security Innovative – ahead of the latest threats …and more
  13. 13. Interconnected Real-time Transparent Organizations Need a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more Copyright 2013 Trend Micro Inc.
  14. 14. Copyright 2013 Trend Micro Inc. SIGNATURE BASED ANTI-MALWARE 1988 - 2007 Smart protection begins with global threat intelligence… CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE NOW! • Email reputation • File reputation • Web reputation • Whitelisting • Network traffic rules • Mobile app reputation • Vulnerabilities/Exploits • Threat Actor Research • Enhanced File Reputation • Enhanced Web Reputation
  15. 15. Copyright 2013 Trend Micro Inc.
  16. 16. Copyright 2013 Trend Micro Inc. Protects Identifies Collects
  17. 17. Copyright 2013 Trend Micro Inc. GLOBAL SENSORNET (via honeypots, community, customers, threat researchers and more) DAILY STATS: • 1.15B threat events • 6TB threat feeds • 11B threat queries • 7M new files… Collects Protects Identifies • URLs • Vulnerabilities • Files • Domains • Network Traffic • Cyber Criminals • Mobile Apps • IP Addresses • Exploit Kits
  18. 18. Copyright 2013 Trend Micro Inc. Collects Protects Identifies BIG DATA ANALYTICS (Data Mining, Machine Learning, Modeling, Correlation) DAILY STATS: • 7.2 TB data correlated • 1B IP addresses • 90K malicious threats identified • 100+M good files
  19. 19. Copyright 2013 Trend Micro Inc. Collects Protects Identifies GLOBAL THREAT INTELLIGENCE DAILY STATS: • 200M threats blocked • 50M malicious URL’s • 700K cloud email entries •1.4B whitelist queries • 80M malicious files • Email Reputation • Web Reputation • File Reputation • Whitelisting • Vulnerabilities & Exploits • Mobile App Reputation • Network Traffic Rules • Threat Actor Research
  20. 20. Copyright 2013 Trend Micro Inc. Global CLOSER TO THE SOURCE OF THREATS Correlated IDENTIFIES ALL COMPONENTS OF AN ATTACK Proactive BLOCKS THREATS AT THEIR SOURCE Real-time IDENTIFIES NEW THREATS FASTER
  21. 21. Copyright 2013 Trend Micro Inc. Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using the latest endpoint products with the latest pattern at the time of testing 200 MB June 2012Oct 2011 289 MB Competitor A 34MB Trend Micro June 2012Oct 2011 33 MB 34 MB 100 -- 200 -- 300 -- EndpointMalwareDefinitionSize(MB) Competitor B June 2012Oct 2011 122 MB 156 MB • Lightweight cloud infrastructure • Minimal user and network impact • Real-time protection IT Admin Security
  22. 22. Copyright 2013 Trend Micro Inc. Complete End User Protection Email & Messaging Web Access Device Hopping Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Employees IT Admin Security
  23. 23. Enabling a Complete Lifecycle Copyright 2013 Trend Micro Inc. Custom Defense Network-wide Detection Advanced Threat Analysis Threat Tools and Services Automated Security Updates Threat Intelligence Custom Sandboxes Detect malware, communications and behavior invisible to standard defenses Analyze the risk and characteristics of the attack and attacker Adapt security automatically (IP black lists, custom signatures…) Respond using the insight needed to respond to your specific attackers Network Admin Security
  24. 24. Smart Protection Copyright 2013 Trend Micro Inc.
  25. 25. Interconnected Real-time Transparent Trend Micro Enables a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more
  26. 26. Thank You!
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×