Eva Chen
CEO and Co-Founder
Empowering the Business while Efficiently
Mitigating Risks
7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.
2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook Users4
427M
Smart Phones
Sold Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012;
2: Google, 2008;
3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012;
6: SocialBakers, May 2012
Copyright 2013 Trend Micro Inc.
Source:
Asymco.com, June 2012
Copyright 2013 Trend Micro Inc. Copyright 2013 Trend Micro Inc.
2.5 QUINTILLION
BYTES OF DATA/DAY!90% CREATED IN THE
LAST 2 YEARS
Source: IBM
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
Copyright 2013 Trend Micro Inc.
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc.
1NEW THREAT CREATED
EVERY SECOND
90% ORGANIZATIONS HAVE
ACTIVE MALWARE
55% NOT EVEN AWARE OF
INTRUSIONS
COMMERCIAL EXPLOIT KITS
USED BY VIRTUALLY ALL
EASTERN EUROPEAN CYBERCRIMINALS
Protected Health Information (PHI)
Intellectual Property (IP)
Payment Card Industry (PCI)
Personally Identifiable Information (PII)
AVERAGE COST
OF DATA BREACH$3.7M
Copyright 2013 Trend Micro Inc.
Empower the Business…
Copyright 2013 Trend Micro Inc.
…while Protecting Information from Theft and Loss
Copyright 2013 Trend Micro Inc.
Consumerization
ITEmployees
Cyber Threats
Attackers
Cloud &
Virtualization
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fits
an evolving ecosystem
Information no longer protected
by traditional defenses
Customers Need…
Point solutions; limited visibility,
de-centralized administration
Dynamic, complex environment;
many new apps and platforms
The New Reality…
Copyright 2013 Trend Micro Inc.
Smart protection
against theft and loss
 Layered – lines of defense
 Interconnected – intelligent protection
 Real-time – cloud updates
 Transparent – no user impact
Copyright 2013 Trend Micro Inc.
Simple yet flexible
to deploy and manage
 Centralized – visibility and control
 Automated – policy management
 Lightweight – resource efficient
 Flexible – on-premise or on-demand
Copyright 2013 Trend Micro Inc.
Security that fits
an evolving ecosystem
 Open – broad platform support
 Optimized – designed in partnership
 Focused – 100% dedicated to security
 Innovative – ahead of the latest threats …and more
Copyright 2013 Trend Micro Inc.
 Interconnected
 Real-time
 Transparent
Organizations Need a Smart Protection Strategy
 Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
 Centralized
 Automated
 Lightweight
 Flexible
Security that fits
an evolving ecosystem
 Open
 Optimized
 Focused
 Innovative
…and more
Copyright 2013 Trend Micro Inc.
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart Protection
begins with global
threat intelligence…
CLOUD BASED
GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN
GLOBAL THREAT INTELLIGENCE
NOW!
• Email reputation
• File reputation
• Web reputation
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerabilities/Exploits
• Threat Actor Research
• Enhanced File Reputation
• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Email &
Messaging
Web
Access
File/Folder &
Removable Media
IT Admin
Then…
Copyright 2013 Trend Micro Inc.
Employees
Device
Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Now!
IT Admin
Copyright 2013 Trend Micro Inc.
Employees
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
91% targeted attacks begin with spear-phishing1
1 million malicious Android apps by end of 20132
1 in 5 use Dropbox at work, typically against rules3
1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012
2. Trend Micro Threat Predictions for 2013
3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni,
Sept 2012
Device
Hopping
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Employees
Complete End User Protection
Device
Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Copyright 2013 Trend Micro Inc.
IT Admin
Security
Copyright 2013 Trend Micro Inc.
New in 2013: Enhanced Secure Cloud Sync & Share
Unique blend:
• Sync & Share
• DLP
• Sharing
• Protection
• Device Health
• App Mgmt
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart
• Layered security from mobile to gateways
• Superior architecture; detects real-world threats faster
• Unique phishing protection with sandbox analysis
Simple
• Modular, lightweight and efficient
• Unified dashboard with centralized policy control
• Integrated DLP for easiest configuration
• Flexible deployment: on-premise or as a service
Security that fits
• Specialized plug-ins for Exchange, Domino, SharePoint
• Open: Win, Mac, iOS, Android, Blackberry…
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Cloud &
Virtualization
IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Productivity
HR
CRM
Customer
Support
Finance
Supply Chain
Commerce
Employees
Partners
Customers
Business App Owners
Data Center Ops
Copyright 2013 Trend Micro Inc.
Productivity
HR
CRM
Customer
Support
Finance
Supply Chain
Commerce
Data Center Ops
Data Center
Copyright 2013 Trend Micro Inc.
By 2016, 71% of server workloads will be virtualized1;
Organizations can cut costs by 74% by storing data in the cloud2
Data Center Ops
Data Center
Physical Virtual Private Cloud
• Server and VM integrity
• Appropriate policy enforcement
• Data protection, especially in the cloud
• Performance and manageability
Security
1. Source: Gartner, Forecast Analysis: Data Center, May 2012
2. Source: Forrester study
Public Cloud
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Public CloudPrivate Cloud
Cloud and Data Center Security
Anti-Malware Firewall Encryption
Integrity
Monitoring
Intrusion
Prevention
Log
Inspection
Data Center Ops
Security
Copyright 2013 Trend Micro Inc.
• Single platform and administration
across physical, virtual and cloud
New:
• Further differentiating VMware
optimization
o Improved performance (caching, de-
duping)
o Stronger protection (automated virtual
patching, Hypervisor integrity
monitoring)
• Hybrid cloud management for
Amazon Web Services and
VMware vCloud
Deep Security: Optimized for Virtualization and Cloud
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart
• Comprehensive protection across physical, virtual, cloud
• Automated protection, including virtual patching
Simple
• Single platform and administration; modular deployment
• Market-leading, truly agentless for VMware; enables
maximum density, consolidation, and performance
• Cloud-friendly: multi-tenancy, usage-based billing…
Security that fits
• Optimized, automated security for VMware and AWS
• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…
Copyright 2013 Trend Micro Inc.
Cloud &
Virtualization
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
Today’s Attacks: Social, Sophisticated, Stealthy!
Copyright 2013 Trend Micro Inc.
Attacker
Gathers intelligence
about organization and
individuals
Employees
Targets individuals
using social engineering
Establishes
Command &
Control server
Moves laterally across
network seeking data of
interest
Extracts data
of interest – can go
undetected for months!
$$$$
Network Admin
Security
1.8 successful attacks per week / per large organization1
21.6% organizations experienced APT attacks2
Malware engineered and tested to evade your standard
gateway/endpoint defenses
 A custom attack needs a custom defense!
1: Source: 2012 Ponemon Study on costs of Cybercrime
2: Source: ISACA APT Awareness Study, 2013
Copyright 2013 Trend Micro Inc.
Custom Defense
Network Admin
Security
Network-wide
Detection
Threat
Intelligence
Threat Tools
and Services
Custom
Sandboxes
Advanced
Threat Analysis
Automated
Security Updates
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Threat
Intelligence
Threat Tools
and Services
Custom
Sandboxes
Detect malware,
communications and
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
Enabling a Complete Lifecycle
Advanced
Threat Analysis
Automated
Security Updates
Copyright 2013 Trend Micro Inc.
Network Admin
Security
Deep Discovery: at the Heart of the Custom Defense
• Advanced threat
detection (even non-
Windows malware)
• Multiple customer-
defined sandboxes
• Local and global
threat intelligence
• Single appliance
across multiple ports
and protocols
• Custom security
updates to endpoints
and gateways
Copyright 2013 Trend Micro Inc.
Part of Your Smart Protection Strategy
Smart
• Advanced, targeted threat detection, including
detection of non-Windows malware (i.e. mobile)
• Only solution with multiple customer-defined
sandboxes for more accurate analysis
• Actionable insight from global threat intelligence
Simple
• Lowest TCO: Single appliance monitors across
multiple ports and 80+ protocols
• Only solution that enables the full lifecycle: detect,
analyze, adapt, respond
Security that fits
• Sandbox analysis and custom signatures available
to other security products
Copyright 2013 Trend Micro Inc.
Employees IT
Cyber Threats
Attacker
Copyright 2013 Trend Micro Inc.
Smart Protection
Copyright 2013 Trend Micro Inc.
Market Leadership
Trend Micro has 27% global share,
almost twice the market share of the
next two vendors - IDC
2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011
“Trend Micro is able to dominate the
market because of its diversified
geographic reach, established
customer base, and brand reputation.”
Technavio 2011, Global Virtualization Security Management Solutions
Trend Micro extends its market share
lead over closest competitor
Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013
Copyright 2013 Trend Micro Inc.
Organizations Need a Smart Protection Strategy
Smart protection for
information
Simple yet flexible to
manage and deploy
 Centralized
 Automated
 Lightweight
 Flexible
Security that fits
an evolving ecosystem
 Open
 Optimized
 Focused
 Innovative
…and more
 Interconnected
 Real-time
 Transparent
 Layered
Copyright 2013 Trend Micro Inc.
Thank You!

Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

  • 1.
    Eva Chen CEO andCo-Founder Empowering the Business while Efficiently Mitigating Risks 7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.
  • 2.
    2.4B Internet Users1 1 Trillion+ URLsindexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012 Copyright 2013 Trend Micro Inc.
  • 3.
    Source: Asymco.com, June 2012 Copyright2013 Trend Micro Inc. Copyright 2013 Trend Micro Inc.
  • 4.
    2.5 QUINTILLION BYTES OFDATA/DAY!90% CREATED IN THE LAST 2 YEARS Source: IBM INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Copyright 2013 Trend Micro Inc.
  • 5.
    INFORMATION HAS BECOME YOURMOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies Copyright 2013 Trend Micro Inc.
  • 6.
    Payment Card Industry(PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP) INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Copyright 2013 Trend Micro Inc.
  • 7.
    1NEW THREAT CREATED EVERYSECOND 90% ORGANIZATIONS HAVE ACTIVE MALWARE 55% NOT EVEN AWARE OF INTRUSIONS COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS Protected Health Information (PHI) Intellectual Property (IP) Payment Card Industry (PCI) Personally Identifiable Information (PII) AVERAGE COST OF DATA BREACH$3.7M Copyright 2013 Trend Micro Inc.
  • 8.
    Empower the Business… Copyright2013 Trend Micro Inc.
  • 9.
    …while Protecting Informationfrom Theft and Loss Copyright 2013 Trend Micro Inc.
  • 10.
  • 11.
    Smart protection for information Simpleyet flexible to manage and deploy Security that fits an evolving ecosystem Information no longer protected by traditional defenses Customers Need… Point solutions; limited visibility, de-centralized administration Dynamic, complex environment; many new apps and platforms The New Reality… Copyright 2013 Trend Micro Inc.
  • 12.
    Smart protection against theftand loss  Layered – lines of defense  Interconnected – intelligent protection  Real-time – cloud updates  Transparent – no user impact Copyright 2013 Trend Micro Inc.
  • 13.
    Simple yet flexible todeploy and manage  Centralized – visibility and control  Automated – policy management  Lightweight – resource efficient  Flexible – on-premise or on-demand Copyright 2013 Trend Micro Inc.
  • 14.
    Security that fits anevolving ecosystem  Open – broad platform support  Optimized – designed in partnership  Focused – 100% dedicated to security  Innovative – ahead of the latest threats …and more Copyright 2013 Trend Micro Inc.
  • 15.
     Interconnected  Real-time Transparent Organizations Need a Smart Protection Strategy  Layered Smart protection for information Simple yet flexible to manage and deploy  Centralized  Automated  Lightweight  Flexible Security that fits an evolving ecosystem  Open  Optimized  Focused  Innovative …and more Copyright 2013 Trend Micro Inc.
  • 16.
    SIGNATURE BASED ANTI-MALWARE 1988 -2007 Smart Protection begins with global threat intelligence… CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE NOW! • Email reputation • File reputation • Web reputation • Whitelisting • Network traffic rules • Mobile app reputation • Vulnerabilities/Exploits • Threat Actor Research • Enhanced File Reputation • Enhanced Web Reputation Copyright 2013 Trend Micro Inc.
  • 17.
    Consumerization Cloud & Virtualization Employees IT CyberThreats Attacker Copyright 2013 Trend Micro Inc.
  • 18.
    Email & Messaging Web Access File/Folder & RemovableMedia IT Admin Then… Copyright 2013 Trend Micro Inc. Employees
  • 19.
    Device Hopping Email & Messaging Web Access Collaboration Cloud Sync &Sharing Social Networking File/Folder & Removable Media Now! IT Admin Copyright 2013 Trend Micro Inc. Employees
  • 20.
    Email & Messaging Web Access Collaboration Cloud Sync &Sharing Social Networking File/Folder & Removable Media 91% targeted attacks begin with spear-phishing1 1 million malicious Android apps by end of 20132 1 in 5 use Dropbox at work, typically against rules3 1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012 2. Trend Micro Threat Predictions for 2013 3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni, Sept 2012 Device Hopping Employees IT Admin Security Copyright 2013 Trend Micro Inc.
  • 21.
    Employees Complete End UserProtection Device Hopping Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Copyright 2013 Trend Micro Inc. IT Admin Security Copyright 2013 Trend Micro Inc.
  • 22.
    New in 2013:Enhanced Secure Cloud Sync & Share Unique blend: • Sync & Share • DLP • Sharing • Protection • Device Health • App Mgmt Copyright 2013 Trend Micro Inc.
  • 23.
    Part of YourSmart Protection Strategy Smart • Layered security from mobile to gateways • Superior architecture; detects real-world threats faster • Unique phishing protection with sandbox analysis Simple • Modular, lightweight and efficient • Unified dashboard with centralized policy control • Integrated DLP for easiest configuration • Flexible deployment: on-premise or as a service Security that fits • Specialized plug-ins for Exchange, Domino, SharePoint • Open: Win, Mac, iOS, Android, Blackberry… Copyright 2013 Trend Micro Inc.
  • 24.
    Consumerization Cloud & Virtualization Employees IT CyberThreats Attacker Copyright 2013 Trend Micro Inc.
  • 25.
  • 26.
  • 27.
  • 28.
    By 2016, 71%of server workloads will be virtualized1; Organizations can cut costs by 74% by storing data in the cloud2 Data Center Ops Data Center Physical Virtual Private Cloud • Server and VM integrity • Appropriate policy enforcement • Data protection, especially in the cloud • Performance and manageability Security 1. Source: Gartner, Forecast Analysis: Data Center, May 2012 2. Source: Forrester study Public Cloud Copyright 2013 Trend Micro Inc.
  • 29.
    Data Center Physical VirtualPublic CloudPrivate Cloud Cloud and Data Center Security Anti-Malware Firewall Encryption Integrity Monitoring Intrusion Prevention Log Inspection Data Center Ops Security Copyright 2013 Trend Micro Inc.
  • 30.
    • Single platformand administration across physical, virtual and cloud New: • Further differentiating VMware optimization o Improved performance (caching, de- duping) o Stronger protection (automated virtual patching, Hypervisor integrity monitoring) • Hybrid cloud management for Amazon Web Services and VMware vCloud Deep Security: Optimized for Virtualization and Cloud Copyright 2013 Trend Micro Inc.
  • 31.
    Part of YourSmart Protection Strategy Smart • Comprehensive protection across physical, virtual, cloud • Automated protection, including virtual patching Simple • Single platform and administration; modular deployment • Market-leading, truly agentless for VMware; enables maximum density, consolidation, and performance • Cloud-friendly: multi-tenancy, usage-based billing… Security that fits • Optimized, automated security for VMware and AWS • Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix… Copyright 2013 Trend Micro Inc.
  • 32.
    Cloud & Virtualization Employees IT CyberThreats Attacker Copyright 2013 Trend Micro Inc.
  • 33.
  • 34.
    Attacker Gathers intelligence about organizationand individuals Employees Targets individuals using social engineering Establishes Command & Control server Moves laterally across network seeking data of interest Extracts data of interest – can go undetected for months! $$$$ Today’s Attacks: Social, Sophisticated, Stealthy! Copyright 2013 Trend Micro Inc. Attacker Gathers intelligence about organization and individuals Employees Targets individuals using social engineering Establishes Command & Control server Moves laterally across network seeking data of interest Extracts data of interest – can go undetected for months! $$$$
  • 35.
    Network Admin Security 1.8 successfulattacks per week / per large organization1 21.6% organizations experienced APT attacks2 Malware engineered and tested to evade your standard gateway/endpoint defenses  A custom attack needs a custom defense! 1: Source: 2012 Ponemon Study on costs of Cybercrime 2: Source: ISACA APT Awareness Study, 2013 Copyright 2013 Trend Micro Inc.
  • 36.
    Custom Defense Network Admin Security Network-wide Detection Threat Intelligence ThreatTools and Services Custom Sandboxes Advanced Threat Analysis Automated Security Updates Copyright 2013 Trend Micro Inc.
  • 37.
    Custom Defense Network-wide Detection Threat Intelligence Threat Tools andServices Custom Sandboxes Detect malware, communications and behavior invisible to standard defenses Analyze the risk and characteristics of the attack and attacker Adapt security automatically (IP black lists, custom signatures…) Respond using the insight needed to respond to your specific attackers Enabling a Complete Lifecycle Advanced Threat Analysis Automated Security Updates Copyright 2013 Trend Micro Inc. Network Admin Security
  • 38.
    Deep Discovery: atthe Heart of the Custom Defense • Advanced threat detection (even non- Windows malware) • Multiple customer- defined sandboxes • Local and global threat intelligence • Single appliance across multiple ports and protocols • Custom security updates to endpoints and gateways Copyright 2013 Trend Micro Inc.
  • 39.
    Part of YourSmart Protection Strategy Smart • Advanced, targeted threat detection, including detection of non-Windows malware (i.e. mobile) • Only solution with multiple customer-defined sandboxes for more accurate analysis • Actionable insight from global threat intelligence Simple • Lowest TCO: Single appliance monitors across multiple ports and 80+ protocols • Only solution that enables the full lifecycle: detect, analyze, adapt, respond Security that fits • Sandbox analysis and custom signatures available to other security products Copyright 2013 Trend Micro Inc.
  • 40.
  • 41.
  • 42.
    Market Leadership Trend Microhas 27% global share, almost twice the market share of the next two vendors - IDC 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011 “Trend Micro is able to dominate the market because of its diversified geographic reach, established customer base, and brand reputation.” Technavio 2011, Global Virtualization Security Management Solutions Trend Micro extends its market share lead over closest competitor Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 Copyright 2013 Trend Micro Inc.
  • 43.
    Organizations Need aSmart Protection Strategy Smart protection for information Simple yet flexible to manage and deploy  Centralized  Automated  Lightweight  Flexible Security that fits an evolving ecosystem  Open  Optimized  Focused  Innovative …and more  Interconnected  Real-time  Transparent  Layered Copyright 2013 Trend Micro Inc.
  • 44.