Next Generation Trend Micro
Eva Chen
CEO and Co-Founder
A computing category that did not exist six years ago has
come to overtake one that has been around for 38 years!
iOS &
An...
Cyber Threats

Attackers

Consumerization

Cloud &
Virtualization

Employees

Confidential © 2014 Trend Micro Inc.

IT

3
All of Trend Micro Aligned to these Solutions
25% growth in
active seats for SaaS
endpoint security

Copyright 2014 Trend ...
#1 Corporate Server Security Market Share
Trend Micro 31%

1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 ...
Validated by Industry Experts

(for Deep Discovery)
1.
2.
3.
4.
5.

IDC Worldwide Endpoint Security 2013-2017 Forecast and...
So What’s Next for Trend Micro?
What will it take to compete in 2014 and beyond?

7
Sophistication

Evolving Threat Landscape

Employee Data
Leaks

Traditional
Malware

Vulnerability
Exploits

Advanced
Malw...
110
∧

Confidential | Copyright 2014 Trend Micro Inc.

9
Why Targeted Attacks are So Tricky!
Multiple Ports

Customized for each environment!
Poison Ivy

Evolve/Morph over Time

M...
IT Security Industry Overall Landscape
Next Generation

Sandbox

Application Control
Identity Federation

Policy
Enforceme...
Two Very Different Approaches

Policy Enforcement

Threat Defense

• Focused on network traffic and
rule enforcement

• Fo...
To Enable New Generation Protection Process!
Update protection
automatically,
prioritize areas for
remediation and
adapt p...
Trend Micro Smart Protection Platform
RESPOND

PREVENT

MONITOR &
CONTROL

ANALYZE

Copyright 2014 Trend Micro Inc.

DETEC...
Trend Micro Smart Protection Platform
 Range of threat defense
capabilities, including
‘next-gen’ approaches
 Applies ac...
Consumer 3Cs
•Unprotected mobile devices
•Unprotected home devices
•Lost devices (theft/backup)
•No visibility/management
...
Next Generation Consumer Protection
Providing value

Future…

Now…

In the
past…
Copyright 2014 Trend Micro Inc.

Enjoy

T...
Internet of Everything Protected at Home
3G/4G

Base image source::
http://community.plus.net/blog/2012/0
2/23/smart-inter...
Enabling a Smart Protection Strategy for Customers
Smart protection for

Simple yet flexible to

Security that fits

infor...
Next Generation Threat Defense
Range of Techniques, Across Layers and Environments
Threat
Defense

Trend Micro

Network

F...
Next Generation Threat Defense
Range of Techniques, Across Layers and Environments
Threat
Defense
Network

Trend Micro

Q2...
Consistent Vision…

A world safe
for exchanging
digital information

Copyright 2014 Trend Micro Inc.

22
Thank You

Copyright 2013 Trend Micro Inc.

23
Upcoming SlideShare
Loading in...5
×

Eva ir presentation_final_e_final_web

266

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
266
On Slideshare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
8
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Eva ir presentation_final_e_final_web

  1. 1. Next Generation Trend Micro Eva Chen CEO and Co-Founder
  2. 2. A computing category that did not exist six years ago has come to overtake one that has been around for 38 years! iOS & Android PC Source: Asymco.com July 2013 Copyright 2014 Trend Micro Inc.
  3. 3. Cyber Threats Attackers Consumerization Cloud & Virtualization Employees Confidential © 2014 Trend Micro Inc. IT 3
  4. 4. All of Trend Micro Aligned to these Solutions 25% growth in active seats for SaaS endpoint security Copyright 2014 Trend Micro Inc. 85% customer growth Over 90% YoY revenue growth New offerings to secure Web Apps, AWS, SAP 4
  5. 5. #1 Corporate Server Security Market Share Trend Micro 31% 1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Copyright 2014 Trend Micro Inc. 1
  6. 6. Validated by Industry Experts (for Deep Discovery) 1. 2. 3. 4. 5. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 Experton Group, Cloud Vendor Benchmark, May 2013 Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine Copyright 2014 Trend Micro Inc. 6
  7. 7. So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond? 7
  8. 8. Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2014 Trend Micro Inc. 8
  9. 9. 110 ∧ Confidential | Copyright 2014 Trend Micro Inc. 9
  10. 10. Why Targeted Attacks are So Tricky! Multiple Ports Customized for each environment! Poison Ivy Evolve/Morph over Time Multiple Protocols IXESHE MW EvilGrab MW Copyright 2014 Trend Micro Inc.
  11. 11. IT Security Industry Overall Landscape Next Generation Sandbox Application Control Identity Federation Policy Enforcement Threat Defense Port Control(firewall) Access control(VPN) Copyright 2014 Trend Micro Inc. Signature Matching AV Signature matching IPS Vulnerability Scan Current
  12. 12. Two Very Different Approaches Policy Enforcement Threat Defense • Focused on network traffic and rule enforcement • Focused on understanding hacker behavior and evolving techniques • Set and Forget • Dynamic updates and change • Action is “Block” or “Pass”; no grey area • Risk management approach, balance between high detection and false alert Copyright 2014 Trend Micro Inc.
  13. 13. To Enable New Generation Protection Process! Update protection automatically, prioritize areas for remediation and adapt protection RESPOND PREVENT Assess potential vulnerabilities and proactively protect endpoints, servers and applications MONITOR & CONTROL Analyze risk and nature of attack and attacker, and assess impact of threats retrospectively Copyright 2014 Trend Micro Inc. ANALYZE DETECT Detect advanced malware, behavior and communications invisible to standard defenses 13
  14. 14. Trend Micro Smart Protection Platform RESPOND PREVENT MONITOR & CONTROL ANALYZE Copyright 2014 Trend Micro Inc. DETECT 14
  15. 15. Trend Micro Smart Protection Platform  Range of threat defense capabilities, including ‘next-gen’ approaches  Applies across endpoints, servers and network  On-premise and in cloud End Users Servers Network Copyright 2014 Trend Micro Inc.  Connected to cloud-based global threat intelligence 15
  16. 16. Consumer 3Cs •Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix “Corporatization” Family Copyright 2014 Trend Micro Inc. Cyber Threats •Consumer Fraud •Kids Safety •Identity Theft Attackers •Unprotected network traffic •Data leakage •Privacy concerns Cloud Applications
  17. 17. Next Generation Consumer Protection Providing value Future… Now… In the past… Copyright 2014 Trend Micro Inc. Enjoy Target device Protection target All home devices Protect PC & Mobile Detect & Clean Windows PC Family Individual Device, Data
  18. 18. Internet of Everything Protected at Home 3G/4G Base image source:: http://community.plus.net/blog/2012/0 2/23/smart-internet-will-help-manageCopyright 2014 Trend Micro Inc. your-home-and-life-by-2027/
  19. 19. Enabling a Smart Protection Strategy for Customers Smart protection for Simple yet flexible to Security that fits information manage and deploy an evolving ecosystem             Layered security Interconnected Real-time Transparent Centralized Automated Lightweight Flexible Open Optimized Focused Innovative …and more Copyright 2014 Trend Micro Inc.
  20. 20. Next Generation Threat Defense Range of Techniques, Across Layers and Environments Threat Defense Trend Micro Network FireEye Servers/Data Center McAfee Kaspersky Symantec Sophos Zscaler Symantec End Users Physical Copyright 2014 Trend Micro Inc. Virtual Breadth of Environment Cloud
  21. 21. Next Generation Threat Defense Range of Techniques, Across Layers and Environments Threat Defense Network Trend Micro Q2 2014 Servers/Data Center Q1 2014 End Users Physical Copyright 2014 Trend Micro Inc. Virtual Breadth of Environment Cloud
  22. 22. Consistent Vision… A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 22
  23. 23. Thank You Copyright 2013 Trend Micro Inc. 23
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×