• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Eva ir presentation_final_e_final_web
 

Eva ir presentation_final_e_final_web

on

  • 244 views

 

Statistics

Views

Total Views
244
Views on SlideShare
179
Embed Views
65

Actions

Likes
0
Downloads
4
Comments
0

4 Embeds 65

http://www.audiologiks.com 40
http://documenticious.com 13
http://audiologiks.com 11
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Eva ir presentation_final_e_final_web Eva ir presentation_final_e_final_web Presentation Transcript

    • Next Generation Trend Micro Eva Chen CEO and Co-Founder
    • A computing category that did not exist six years ago has come to overtake one that has been around for 38 years! iOS & Android PC Source: Asymco.com July 2013 Copyright 2014 Trend Micro Inc.
    • Cyber Threats Attackers Consumerization Cloud & Virtualization Employees Confidential © 2014 Trend Micro Inc. IT 3
    • All of Trend Micro Aligned to these Solutions 25% growth in active seats for SaaS endpoint security Copyright 2014 Trend Micro Inc. 85% customer growth Over 90% YoY revenue growth New offerings to secure Web Apps, AWS, SAP 4
    • #1 Corporate Server Security Market Share Trend Micro 31% 1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Copyright 2014 Trend Micro Inc. 1
    • Validated by Industry Experts (for Deep Discovery) 1. 2. 3. 4. 5. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 Experton Group, Cloud Vendor Benchmark, May 2013 Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine Copyright 2014 Trend Micro Inc. 6
    • So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond? 7
    • Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2014 Trend Micro Inc. 8
    • 110 ∧ Confidential | Copyright 2014 Trend Micro Inc. 9
    • Why Targeted Attacks are So Tricky! Multiple Ports Customized for each environment! Poison Ivy Evolve/Morph over Time Multiple Protocols IXESHE MW EvilGrab MW Copyright 2014 Trend Micro Inc.
    • IT Security Industry Overall Landscape Next Generation Sandbox Application Control Identity Federation Policy Enforcement Threat Defense Port Control(firewall) Access control(VPN) Copyright 2014 Trend Micro Inc. Signature Matching AV Signature matching IPS Vulnerability Scan Current
    • Two Very Different Approaches Policy Enforcement Threat Defense • Focused on network traffic and rule enforcement • Focused on understanding hacker behavior and evolving techniques • Set and Forget • Dynamic updates and change • Action is “Block” or “Pass”; no grey area • Risk management approach, balance between high detection and false alert Copyright 2014 Trend Micro Inc.
    • To Enable New Generation Protection Process! Update protection automatically, prioritize areas for remediation and adapt protection RESPOND PREVENT Assess potential vulnerabilities and proactively protect endpoints, servers and applications MONITOR & CONTROL Analyze risk and nature of attack and attacker, and assess impact of threats retrospectively Copyright 2014 Trend Micro Inc. ANALYZE DETECT Detect advanced malware, behavior and communications invisible to standard defenses 13
    • Trend Micro Smart Protection Platform RESPOND PREVENT MONITOR & CONTROL ANALYZE Copyright 2014 Trend Micro Inc. DETECT 14
    • Trend Micro Smart Protection Platform  Range of threat defense capabilities, including ‘next-gen’ approaches  Applies across endpoints, servers and network  On-premise and in cloud End Users Servers Network Copyright 2014 Trend Micro Inc.  Connected to cloud-based global threat intelligence 15
    • Consumer 3Cs •Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix “Corporatization” Family Copyright 2014 Trend Micro Inc. Cyber Threats •Consumer Fraud •Kids Safety •Identity Theft Attackers •Unprotected network traffic •Data leakage •Privacy concerns Cloud Applications
    • Next Generation Consumer Protection Providing value Future… Now… In the past… Copyright 2014 Trend Micro Inc. Enjoy Target device Protection target All home devices Protect PC & Mobile Detect & Clean Windows PC Family Individual Device, Data
    • Internet of Everything Protected at Home 3G/4G Base image source:: http://community.plus.net/blog/2012/0 2/23/smart-internet-will-help-manageCopyright 2014 Trend Micro Inc. your-home-and-life-by-2027/
    • Enabling a Smart Protection Strategy for Customers Smart protection for Simple yet flexible to Security that fits information manage and deploy an evolving ecosystem             Layered security Interconnected Real-time Transparent Centralized Automated Lightweight Flexible Open Optimized Focused Innovative …and more Copyright 2014 Trend Micro Inc.
    • Next Generation Threat Defense Range of Techniques, Across Layers and Environments Threat Defense Trend Micro Network FireEye Servers/Data Center McAfee Kaspersky Symantec Sophos Zscaler Symantec End Users Physical Copyright 2014 Trend Micro Inc. Virtual Breadth of Environment Cloud
    • Next Generation Threat Defense Range of Techniques, Across Layers and Environments Threat Defense Network Trend Micro Q2 2014 Servers/Data Center Q1 2014 End Users Physical Copyright 2014 Trend Micro Inc. Virtual Breadth of Environment Cloud
    • Consistent Vision… A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 22
    • Thank You Copyright 2013 Trend Micro Inc. 23