festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

on

  • 360 views

 

Statistics

Views

Total Views
360
Views on SlideShare
360
Embed Views
0

Actions

Likes
0
Downloads
8
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy Presentation Transcript

  • 1. Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Gastone Nencini Trend Micro Italy Leader and Snr. Technical Manager Trend Micro Southern Europe
  • 2. Copyright 2013 Trend Micro Inc. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
  • 3. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Source: IBM 2.5 QUINTILLION BYTES OF DATA/DAY!90% CREATED IN LAST 2 YEARS INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
  • 4. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies
  • 5. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP)
  • 6. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP) NEW THREAT CREATED EVERY SECOND 90% ORGANIZATIONS HAVE ACTIVE MALWARE 55%1 NOT EVEN AWARE OF INTRUSIONS COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS AVERAGE COST OF DATA BREACH$3.7M
  • 7. Copyright 2013 Trend Micro Inc. Empower the business: Improve business agility by providing quick and intuitive access to the right information, tools and applications Mitigate risk: Protect sensitive information to maintain brand and comply with regulations, while controlling costs CIO
  • 8. Copyright 2013 Trend Micro Inc. Consumerization Cloud & Virtualization Cyber Threats Attackers Employees IT
  • 9. Copyright 2013 Trend Micro Inc. Smart protection for information Simple yet flexible to manage and deploy Security that fits an evolving ecosystem Information no longer protected by traditional defenses Customers Need… Point solutions; limited visibility, de-centralized administration Dynamic, complex environment; many new apps and platforms The New Reality…
  • 10. Copyright 2013 Trend Micro Inc. Smart protection for information Layered – lines of defense Interconnected – intelligent protection Real-time – cloud updates Transparent – no user impact
  • 11. Copyright 2013 Trend Micro Inc. Simple yet flexible to deploy and manage Centralized – visibility and control Automated – policy management Lightweight – resource efficient Flexible – on-premise or as a service
  • 12. Copyright 2013 Trend Micro Inc. Security that fits an evolving ecosystem Open – broad platform support Optimized – designed in partnership Focused – 100% dedicated to security Innovative – ahead of the latest threats …and more
  • 13. Interconnected Real-time Transparent Organizations Need a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more Copyright 2013 Trend Micro Inc.
  • 14. Copyright 2013 Trend Micro Inc. SIGNATURE BASED ANTI-MALWARE 1988 - 2007 Smart protection begins with global threat intelligence… CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE NOW! • Email reputation • File reputation • Web reputation • Whitelisting • Network traffic rules • Mobile app reputation • Vulnerabilities/Exploits • Threat Actor Research • Enhanced File Reputation • Enhanced Web Reputation
  • 15. Copyright 2013 Trend Micro Inc.
  • 16. Copyright 2013 Trend Micro Inc. Protects Identifies Collects
  • 17. Copyright 2013 Trend Micro Inc. GLOBAL SENSORNET (via honeypots, community, customers, threat researchers and more) DAILY STATS: • 1.15B threat events • 6TB threat feeds • 11B threat queries • 7M new files… Collects Protects Identifies • URLs • Vulnerabilities • Files • Domains • Network Traffic • Cyber Criminals • Mobile Apps • IP Addresses • Exploit Kits
  • 18. Copyright 2013 Trend Micro Inc. Collects Protects Identifies BIG DATA ANALYTICS (Data Mining, Machine Learning, Modeling, Correlation) DAILY STATS: • 7.2 TB data correlated • 1B IP addresses • 90K malicious threats identified • 100+M good files
  • 19. Copyright 2013 Trend Micro Inc. Collects Protects Identifies GLOBAL THREAT INTELLIGENCE DAILY STATS: • 200M threats blocked • 50M malicious URL’s • 700K cloud email entries •1.4B whitelist queries • 80M malicious files • Email Reputation • Web Reputation • File Reputation • Whitelisting • Vulnerabilities & Exploits • Mobile App Reputation • Network Traffic Rules • Threat Actor Research
  • 20. Copyright 2013 Trend Micro Inc. Global CLOSER TO THE SOURCE OF THREATS Correlated IDENTIFIES ALL COMPONENTS OF AN ATTACK Proactive BLOCKS THREATS AT THEIR SOURCE Real-time IDENTIFIES NEW THREATS FASTER
  • 21. Copyright 2013 Trend Micro Inc. Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using the latest endpoint products with the latest pattern at the time of testing 200 MB June 2012Oct 2011 289 MB Competitor A 34MB Trend Micro June 2012Oct 2011 33 MB 34 MB 100 -- 200 -- 300 -- EndpointMalwareDefinitionSize(MB) Competitor B June 2012Oct 2011 122 MB 156 MB • Lightweight cloud infrastructure • Minimal user and network impact • Real-time protection IT Admin Security
  • 22. Copyright 2013 Trend Micro Inc. Complete End User Protection Email & Messaging Web Access Device Hopping Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Employees IT Admin Security
  • 23. Enabling a Complete Lifecycle Copyright 2013 Trend Micro Inc. Custom Defense Network-wide Detection Advanced Threat Analysis Threat Tools and Services Automated Security Updates Threat Intelligence Custom Sandboxes Detect malware, communications and behavior invisible to standard defenses Analyze the risk and characteristics of the attack and attacker Adapt security automatically (IP black lists, custom signatures…) Respond using the insight needed to respond to your specific attackers Network Admin Security
  • 24. Smart Protection Copyright 2013 Trend Micro Inc.
  • 25. Interconnected Real-time Transparent Trend Micro Enables a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more
  • 26. Thank You!