The document provides an overview of Trend Micro's smart protection strategy, which aims to empower businesses while efficiently mitigating risks. It discusses how information has become a strategic asset for organizations and the new threats they face from cybercriminals. Trend Micro's approach focuses on providing smart protection for information, security that is simple yet flexible to manage across evolving IT ecosystems, and defenses that fit organizations' needs. Key elements of the smart protection strategy include layered security, interconnected threat intelligence, real-time updates, and transparency with no user impact.
Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)
1. Eva Chen
CEO and Co-Founder
Empowering the Business while Efficiently
Mitigating Risks
7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.
2. 2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook Users4
427M
Smart Phones
Sold Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012;
2: Google, 2008;
3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012;
6: SocialBakers, May 2012
Copyright 2013 Trend Micro Inc.
4. 2.5 QUINTILLION
BYTES OF DATA/DAY!90% CREATED IN THE
LAST 2 YEARS
Source: IBM
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
5. INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
Copyright 2013 Trend Micro Inc.
6. Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
7. 1NEW THREAT CREATED
EVERY SECOND
90% ORGANIZATIONS HAVE
ACTIVE MALWARE
55% NOT EVEN AWARE OF
INTRUSIONS
COMMERCIAL EXPLOIT KITS
USED BY VIRTUALLY ALL
EASTERN EUROPEAN CYBERCRIMINALS
Protected Health Information (PHI)
Intellectual Property (IP)
Payment Card Industry (PCI)
Personally Identifiable Information (PII)
AVERAGE COST
OF DATA BREACH$3.7M
Copyright 2013 Trend Micro Inc.
11. Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fits
an evolving ecosystem
Information no longer protected
by traditional defenses
Customers Need…
Point solutions; limited visibility,
de-centralized administration
Dynamic, complex environment;
many new apps and platforms
The New Reality…
Copyright 2013 Trend Micro Inc.
12. Smart protection
against theft and loss
Layered – lines of defense
Interconnected – intelligent protection
Real-time – cloud updates
Transparent – no user impact
Copyright 2013 Trend Micro Inc.
13. Simple yet flexible
to deploy and manage
Centralized – visibility and control
Automated – policy management
Lightweight – resource efficient
Flexible – on-premise or on-demand
Copyright 2013 Trend Micro Inc.
14. Security that fits
an evolving ecosystem
Open – broad platform support
Optimized – designed in partnership
Focused – 100% dedicated to security
Innovative – ahead of the latest threats …and more
Copyright 2013 Trend Micro Inc.
15. Interconnected
Real-time
Transparent
Organizations Need a Smart Protection Strategy
Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Copyright 2013 Trend Micro Inc.
16. SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart Protection
begins with global
threat intelligence…
CLOUD BASED
GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN
GLOBAL THREAT INTELLIGENCE
NOW!
• Email reputation
• File reputation
• Web reputation
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerabilities/Exploits
• Threat Actor Research
• Enhanced File Reputation
• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
20. Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
91% targeted attacks begin with spear-phishing1
1 million malicious Android apps by end of 20132
1 in 5 use Dropbox at work, typically against rules3
1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012
2. Trend Micro Threat Predictions for 2013
3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni,
Sept 2012
Device
Hopping
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
21. Employees
Complete End User Protection
Device
Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Copyright 2013 Trend Micro Inc.
IT Admin
Security
Copyright 2013 Trend Micro Inc.
22. New in 2013: Enhanced Secure Cloud Sync & Share
Unique blend:
• Sync & Share
• DLP
• Sharing
• Protection
• Device Health
• App Mgmt
Copyright 2013 Trend Micro Inc.
23. Part of Your Smart Protection Strategy
Smart
• Layered security from mobile to gateways
• Superior architecture; detects real-world threats faster
• Unique phishing protection with sandbox analysis
Simple
• Modular, lightweight and efficient
• Unified dashboard with centralized policy control
• Integrated DLP for easiest configuration
• Flexible deployment: on-premise or as a service
Security that fits
• Specialized plug-ins for Exchange, Domino, SharePoint
• Open: Win, Mac, iOS, Android, Blackberry…
Copyright 2013 Trend Micro Inc.
28. By 2016, 71% of server workloads will be virtualized1;
Organizations can cut costs by 74% by storing data in the cloud2
Data Center Ops
Data Center
Physical Virtual Private Cloud
• Server and VM integrity
• Appropriate policy enforcement
• Data protection, especially in the cloud
• Performance and manageability
Security
1. Source: Gartner, Forecast Analysis: Data Center, May 2012
2. Source: Forrester study
Public Cloud
Copyright 2013 Trend Micro Inc.
29. Data Center
Physical Virtual Public CloudPrivate Cloud
Cloud and Data Center Security
Anti-Malware Firewall Encryption
Integrity
Monitoring
Intrusion
Prevention
Log
Inspection
Data Center Ops
Security
Copyright 2013 Trend Micro Inc.
30. • Single platform and administration
across physical, virtual and cloud
New:
• Further differentiating VMware
optimization
o Improved performance (caching, de-
duping)
o Stronger protection (automated virtual
patching, Hypervisor integrity
monitoring)
• Hybrid cloud management for
Amazon Web Services and
VMware vCloud
Deep Security: Optimized for Virtualization and Cloud
Copyright 2013 Trend Micro Inc.
31. Part of Your Smart Protection Strategy
Smart
• Comprehensive protection across physical, virtual, cloud
• Automated protection, including virtual patching
Simple
• Single platform and administration; modular deployment
• Market-leading, truly agentless for VMware; enables
maximum density, consolidation, and performance
• Cloud-friendly: multi-tenancy, usage-based billing…
Security that fits
• Optimized, automated security for VMware and AWS
• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…
Copyright 2013 Trend Micro Inc.
34. Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
Today’s Attacks: Social, Sophisticated, Stealthy!
Copyright 2013 Trend Micro Inc.
Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
35. Network Admin
Security
1.8 successful attacks per week / per large organization1
21.6% organizations experienced APT attacks2
Malware engineered and tested to evade your standard
gateway/endpoint defenses
A custom attack needs a custom defense!
1: Source: 2012 Ponemon Study on costs of Cybercrime
2: Source: ISACA APT Awareness Study, 2013
Copyright 2013 Trend Micro Inc.
37. Custom Defense
Network-wide
Detection
Threat
Intelligence
Threat Tools
and Services
Custom
Sandboxes
Detect malware,
communications and
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
Enabling a Complete Lifecycle
Advanced
Threat Analysis
Automated
Security Updates
Copyright 2013 Trend Micro Inc.
Network Admin
Security
38. Deep Discovery: at the Heart of the Custom Defense
• Advanced threat
detection (even non-
Windows malware)
• Multiple customer-
defined sandboxes
• Local and global
threat intelligence
• Single appliance
across multiple ports
and protocols
• Custom security
updates to endpoints
and gateways
Copyright 2013 Trend Micro Inc.
39. Part of Your Smart Protection Strategy
Smart
• Advanced, targeted threat detection, including
detection of non-Windows malware (i.e. mobile)
• Only solution with multiple customer-defined
sandboxes for more accurate analysis
• Actionable insight from global threat intelligence
Simple
• Lowest TCO: Single appliance monitors across
multiple ports and 80+ protocols
• Only solution that enables the full lifecycle: detect,
analyze, adapt, respond
Security that fits
• Sandbox analysis and custom signatures available
to other security products
Copyright 2013 Trend Micro Inc.
42. Market Leadership
Trend Micro has 27% global share,
almost twice the market share of the
next two vendors - IDC
2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011
“Trend Micro is able to dominate the
market because of its diversified
geographic reach, established
customer base, and brand reputation.”
Technavio 2011, Global Virtualization Security Management Solutions
Trend Micro extends its market share
lead over closest competitor
Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013
Copyright 2013 Trend Micro Inc.
43. Organizations Need a Smart Protection Strategy
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Interconnected
Real-time
Transparent
Layered
Copyright 2013 Trend Micro Inc.