SlideShare a Scribd company logo
1 of 18
Trend Micro Discussion
Stephen FT Porter
Alliance & SI Business Manager
Simon Young
EMEA Alliances Director
                             Copyright 2012 Trend Micro Inc.
Product Approach
       Core Platform – Security Capabilities




• Anti-Malware   • Anti-Malware                         • Anti-Malware                          •   Policy
• Mobile         • Data-Loss                            • IDS/IPS                               •   Reporting
• Data-Loss        Prevention                           • File Integrity                        •   Threat Intel
  Prevention     • Application ID                       • Log Inspection                        •   Dashboard
• Encryption     • Mobile                               • Data-Loss                             •   Configuration
• SafeSync       • Web/DB                                 Prevention                            •   Update
                                                        • Encryption

 Endpoint         Network                                     Data Center                       Management
 Platform         Platform                                     Platform                          Platform




                                                               2


                          Trend Micro Confidential 3/6/2012   Copyright 2012 Trend Micro Inc.
Trend is No.1 in Server and Virtualization Security

       Physical                                         Virtual                                                       Cloud




                                                                                                                  Trend
                                Trend
                                                                                                                  Micro
                                Micro
                                                                                                                  13%
                                23.7%




                                          Worldwide Endpoint Security
                                        Revenue Share by Vendor, 2010
                                                    Source: IDC, 2011




          Worldwide Endpoint Security
        Revenue Share by Vendor, 2010                                                      Source: 2011 Technavio – Global
                    Source: IDC, 2011                                                   Virtualization Security Management
                                                                                                                  Solutions
                                                                Copyright 2012 Trend Micro Inc.
Virtualization Journey Stages
Stage 1                Stage 2                                       Stage 3
Server Consolidation   Expansion & Desktop                           Private > Public Cloud

                                                                                              85%
                                         Servers


                       Desktops
                                                                     70%


                       30%



        15%                   THE SECURITY INHIBITORS
                              TO VIRTUALIZATION


                                   Copyright 2012 Trend Micro Inc.
The Ever-Changing Threat Landscape




      2009                  2011                                   2013

                 Global Threat Distributions

               Based on estimations by a panel of
                experts within Trend Micro, 2012




                                 Copyright 2012 Trend Micro Inc.
Outside-in Perimeter Defense
              Isn’t Enough…




Empowered
Employees
        Advanced
        Targeted
        Threats
                   Re-Perimeterization
                   Virtualization, Cloud
                   Consumerization & Mobility
                         Copyright 2012 Trend Micro Inc.

                                                           Source: Forrester
Cloud Era Revolution


 Cloud Infrastructure                                Cloud Application


                        Hybrid Cloud
                        Management
                        • Physical
                        • Virtual
                        • Cloud                                      Threat Landscape

     Cloud Data                                                Consumerization
                                                                   Targeted Attack
                                                                        APT
                                                                 andTechnology Evolution
                                                                      Mobility
                                                                        Cloud Computing
                                                                        Endpoint Mobility
                                                                            Customer Behaviour
                                                                           Data Risk /compliance
                                                                           Management

                             Copyright 2012 Trend Micro Inc.
The Enterprise Endpoint Evolution




                                                                                              Cloud
                                                                                        50%

                                        Mobile Devices/SaaS


                                               DataCenter Management




                                                                                              Virtual
                                                       Driven

20%                                                                                     15%
                                                                      Virtual


         Laptops/PCs




                                                                                              Physical
80%                                                                                     35%
             EndPoint Management
                    Driven


      2011                            2013                                      3-5 Years

                                   Cross-over year
                                        Copyright 2012 Trend Micro Inc.
                                                                    9
Consumerisation
                                              iPhone
                                                                         Windows
                                                                         phone

                                                               iPad

                                                            • Challenges:
                                                             – Manage mobile devices
                                                             – Provide secure access to
                                                               applications and data
                                                             – Defend against social media-
                                                               based attacks
                                                             – Data protection for BYOIT

                  • 47%: Mobile workers who have a personally owned
                    tablet that they use for at least some work
                          Copyright 2012 Trend Micro Inc.
                                                                   10   Copyright 2011 Trend Micro Inc.
Mobile Device Market


      Mid-Market
       (~250-2500)
                                                   Mobile Devices
                                                  In the Enterprise
                                                     Hype Cycle



           Enterprise
            (~2500+)




                                2012




                        Copyright 2012 Trend Micro Inc.
Mobile Device Protection Requirements




 Manage Efficiently            Protect the Data                             Secure the Devices
 • Device Discovery            • Encryption                                 • Anti-Malware
 • Device Enrollment           • Remote Wipe                                • Firewall
 • Device Provisioning         • Remote Lock                                • Web Threat Protection
 • Asset Tracking              • SIM Change/ Watch                          • Email Security
 • S/W Management              • Feature Lock                               • Call/ SMS Anti-Spam
 • Remote Control              • Password Policy                            • App Control/Lock-down



                         Central Policy Management

                                          Copyright 2012 Trend Micro Inc.
Deep Security
An Agentless Security Environment

                     Deep Security Virtual Appliance
            • Anti-malware                • Intrusion Prevention
            • Integrity Monitoring        • Web App Protection
            • Firewall                    • Application Control


  The Old Way                                   With Deep Security
                                                                                            More VMs

                                              Security
    VM          VM       VM                   Virtual                       VM   VM   VM   VM VM
                                              Appliance




      Higher             Fewer                        Easier                          Stronger
      Density           Resources             Manageability                            Security

                                     Copyright 2012 Trend Micro Inc.   13
VDI Example – Cost Breakdown

                                                  STD                                VDI   VDI+ Security



                                         1000                                  1250        875


                                         2480                                  1160        928


                                         1360                                  440         396


                                         4840                                  2850        2199



               Classification 3/6/2012    Copyright 2012 Trend Micro Inc. 14
SecureCloud: Enterprise Controlled
Data Protection for the Cloud




                                                My
                                               Data




                                                        15
                      Copyright 2012 Trend Micro Inc.
Deep Security / Secure Cloud Example


            Customer 1                                                       Customer 2

   Unix/
    Win
   Server




                                    Vmware                             Vsphere ESX




                                                                        Customer          Test




                         Classification 3/6/2012   Copyright 2012 Trend Micro Inc. 16
Dashboard (Threat Intelligence Map)




                   Classification   Copyright 2012 Trend Micro Inc. 17
Enterprise Security Manager


                                                                                        •     Risk Assessment
                                                                                        •     Risk Mitigation
                                                                                        •     Risk Escalation
                                                                                        •     Configuration
                                                                                              Management
                                                                                        •     Update Management
                                                                                        •     Log Management
                                                                                        •     Alert Management



                                   Threat Intelligence Manager
                                                                                            3rd Party Products
                                        Control Manager

      Threat Discovery Appliance
                                                                                             OSCE, DSM, IDF
                                                                                             Servers

              IxSVA                         Trend Endpoints




                                       Corporate Network

                                      3/6/2012   Copyright 2012 Trend Micro Inc.   18
Q&A


      Copyright 2012 Trend Micro Inc.

More Related Content

What's hot

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesNiranjana Padmanabhan
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping ITFujitsu France
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 

What's hot (19)

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
An Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud ResourcesAn Architecture for Providing Security to Cloud Resources
An Architecture for Providing Security to Cloud Resources
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping IT
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 

Similar to Smart, Data-Centric Security for the Post-PC Era

Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secureKappa Data
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM (Middle East and Africa)
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 

Similar to Smart, Data-Centric Security for the Post-PC Era (20)

Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secure
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 

More from Trend Micro (EMEA) Limited

Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudTrend Micro (EMEA) Limited
 
Thomson Reuters: Transforming the workplace with desktop virtualisation
Thomson Reuters: Transforming the workplace with desktop virtualisationThomson Reuters: Transforming the workplace with desktop virtualisation
Thomson Reuters: Transforming the workplace with desktop virtualisationTrend Micro (EMEA) Limited
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsTrend Micro (EMEA) Limited
 

More from Trend Micro (EMEA) Limited (6)

Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
The year that shook the world
The year that shook the worldThe year that shook the world
The year that shook the world
 
Thomson Reuters: Transforming the workplace with desktop virtualisation
Thomson Reuters: Transforming the workplace with desktop virtualisationThomson Reuters: Transforming the workplace with desktop virtualisation
Thomson Reuters: Transforming the workplace with desktop virtualisation
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Smart, Data-Centric Security for the Post-PC Era

  • 1. Trend Micro Discussion Stephen FT Porter Alliance & SI Business Manager Simon Young EMEA Alliances Director Copyright 2012 Trend Micro Inc.
  • 2. Product Approach Core Platform – Security Capabilities • Anti-Malware • Anti-Malware • Anti-Malware • Policy • Mobile • Data-Loss • IDS/IPS • Reporting • Data-Loss Prevention • File Integrity • Threat Intel Prevention • Application ID • Log Inspection • Dashboard • Encryption • Mobile • Data-Loss • Configuration • SafeSync • Web/DB Prevention • Update • Encryption Endpoint Network Data Center Management Platform Platform Platform Platform 2 Trend Micro Confidential 3/6/2012 Copyright 2012 Trend Micro Inc.
  • 3. Trend is No.1 in Server and Virtualization Security Physical Virtual Cloud Trend Trend Micro Micro 13% 23.7% Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: IDC, 2011 Worldwide Endpoint Security Revenue Share by Vendor, 2010 Source: 2011 Technavio – Global Source: IDC, 2011 Virtualization Security Management Solutions Copyright 2012 Trend Micro Inc.
  • 4. Virtualization Journey Stages Stage 1 Stage 2 Stage 3 Server Consolidation Expansion & Desktop Private > Public Cloud 85% Servers Desktops 70% 30% 15% THE SECURITY INHIBITORS TO VIRTUALIZATION Copyright 2012 Trend Micro Inc.
  • 5. The Ever-Changing Threat Landscape 2009 2011 2013 Global Threat Distributions Based on estimations by a panel of experts within Trend Micro, 2012 Copyright 2012 Trend Micro Inc.
  • 6. Outside-in Perimeter Defense Isn’t Enough… Empowered Employees Advanced Targeted Threats Re-Perimeterization Virtualization, Cloud Consumerization & Mobility Copyright 2012 Trend Micro Inc. Source: Forrester
  • 7. Cloud Era Revolution Cloud Infrastructure Cloud Application Hybrid Cloud Management • Physical • Virtual • Cloud Threat Landscape Cloud Data Consumerization Targeted Attack APT andTechnology Evolution Mobility Cloud Computing Endpoint Mobility Customer Behaviour Data Risk /compliance Management Copyright 2012 Trend Micro Inc.
  • 8. The Enterprise Endpoint Evolution Cloud 50% Mobile Devices/SaaS DataCenter Management Virtual Driven 20% 15% Virtual Laptops/PCs Physical 80% 35% EndPoint Management Driven 2011 2013 3-5 Years Cross-over year Copyright 2012 Trend Micro Inc. 9
  • 9. Consumerisation iPhone Windows phone iPad • Challenges: – Manage mobile devices – Provide secure access to applications and data – Defend against social media- based attacks – Data protection for BYOIT • 47%: Mobile workers who have a personally owned tablet that they use for at least some work Copyright 2012 Trend Micro Inc. 10 Copyright 2011 Trend Micro Inc.
  • 10. Mobile Device Market Mid-Market (~250-2500) Mobile Devices In the Enterprise Hype Cycle Enterprise (~2500+) 2012 Copyright 2012 Trend Micro Inc.
  • 11. Mobile Device Protection Requirements Manage Efficiently Protect the Data Secure the Devices • Device Discovery • Encryption • Anti-Malware • Device Enrollment • Remote Wipe • Firewall • Device Provisioning • Remote Lock • Web Threat Protection • Asset Tracking • SIM Change/ Watch • Email Security • S/W Management • Feature Lock • Call/ SMS Anti-Spam • Remote Control • Password Policy • App Control/Lock-down Central Policy Management Copyright 2012 Trend Micro Inc.
  • 12. Deep Security An Agentless Security Environment Deep Security Virtual Appliance • Anti-malware • Intrusion Prevention • Integrity Monitoring • Web App Protection • Firewall • Application Control The Old Way With Deep Security More VMs Security VM VM VM Virtual VM VM VM VM VM Appliance Higher Fewer Easier Stronger Density Resources Manageability Security Copyright 2012 Trend Micro Inc. 13
  • 13. VDI Example – Cost Breakdown STD VDI VDI+ Security 1000 1250 875 2480 1160 928 1360 440 396 4840 2850 2199 Classification 3/6/2012 Copyright 2012 Trend Micro Inc. 14
  • 14. SecureCloud: Enterprise Controlled Data Protection for the Cloud My Data 15 Copyright 2012 Trend Micro Inc.
  • 15. Deep Security / Secure Cloud Example Customer 1 Customer 2 Unix/ Win Server Vmware Vsphere ESX Customer Test Classification 3/6/2012 Copyright 2012 Trend Micro Inc. 16
  • 16. Dashboard (Threat Intelligence Map) Classification Copyright 2012 Trend Micro Inc. 17
  • 17. Enterprise Security Manager • Risk Assessment • Risk Mitigation • Risk Escalation • Configuration Management • Update Management • Log Management • Alert Management Threat Intelligence Manager 3rd Party Products Control Manager Threat Discovery Appliance OSCE, DSM, IDF Servers IxSVA Trend Endpoints Corporate Network 3/6/2012 Copyright 2012 Trend Micro Inc. 18
  • 18. Q&A Copyright 2012 Trend Micro Inc.

Editor's Notes

  1. So, what can enterprises do to actually benefit from Consumerization and make it work to their advantage? Well, the first thing Trend suggests is to accept the fact that consumerization is happening. It can’t be stopped - and it doesn’t make sense to try. You can embrace Consumerization in order to unlock its full business potential.So how do you go about it?Trend Micro recommends a three-step approach to embrace consumerization: 1--Have a plan. Take a strategic approach to Consumerization. IT cannot do this in a vacuum: engage your lines of business owners (marketing, sales, HR, product development), involve your early adopters in the company, ask them what they use, what they like, and what they find most useful to support their work activities. Pull from their consumer experience rather than push your IT perspective onto them.2--Say yes…but not to everything…and not to everyone. Develop a set of policies that clearly define which technologies are fully supported vesus tolerated or prohibited. Profile your internal users based on their role, line of business and location. Then map technologies to user profiles and define an Service Level Agreement (SLA) for each intersection. 3--Put the right infrastructure into place. Deploy enterprise-grade tools and infrastructure specifically designed to secure and manage consumer technology in the enterprise. No single vendor can provide one solution that covers all functional requirements across all platforms. And several vendors from adjacent product segments offer overlapping core functionality. For a start, you will probably have to look at security vendors for Internet content security, mobile anti-malware and mobile data protection. And look to Mobile Device Management vendors for system provisioning and application management. And to Telecom Expense Management solutions for procurement, support and cost control of voice and data services.Additional resources:Go to Trend Micro Global Sales Toolkit (GST) for access to the internal-only Gartner reports on mobile data protection and mobile device management: http://sales.trendmicro.com/pr/tm/en-us/assets/view-document.aspx?rid=139894Trend Micro Mobile Security (TMMS) assets on GST:http://sales.trendmicro.com/pr/tm/en-us/assets/home.aspx?s21574=20::25189
  2. Now that we’ve looked at the threat landscape, I’d like to talk a bit about general security approaches. Here we see the traditional outside-in perimeter defense. This security model is based on the assumption that data stays inside the system and application, and that systems and applications stay inside the network. [click]Anything on the outside is inspected and potentially blocked at the perimeter, if flagged as a threat. Multiple layers work together to stop threats at the earliest possible point in the network.
  3. The outside-in approach is still important, but, alone, is not sufficient in today’s evolving data center. Disgruntled employees are already within the perimeter. Advanced Persistent Threats are unique attacks that will not be stopped by many traditional perimeter defenses. And the changing nature of IT is causing deperimeterization with new technologies like virtualization, cloud computing, and consumerization. New security approaches must be added to the traditional outside-in protection.
  4. #5 - ConsumerizationAlready well covered in the general sessions, but you really cannot understate how much pain this is creating for IT decision-makers Social media is close behind it devices:30 billion pieces of content are shared on Facebook every month 78% of social media users think their privacy settings are sufficient Social engineering is giving way to social media engineering MDM in downward phase of Hype Cycle, but managing devices still primary concern for customers, so having a solution is a great way to get on their radar MDM still preferred approach in regulated environments - doctors coats now being made with pockets big enough to hold iPad, need to take a stronger centrally managed approach to management and access Not just about smartphones and tablets and apps - also about data sharing and even supporting Mac laptops SF customer who is heading towards 50% of their environment (6000 clients) being Macs.As of early 2011, 30 billion pieces of content (links, photos, notes, etc) are shared on Facebook every month (source: Royal Pingdom, “Internet 2010 in Numbers,” 12 January 2011), and 50 percent of active users log into Facebook every day (source: eConsultancy.com). A Harris Interactive poll found that 65 percent of U.S. adults use social media and say that they have received a positive benefit as a result (source: Harris Interactive, “The Pros, Cons and Learning Curve of Social Media,” 18 January 2011), and that 78 percent of social media users felt that their privacy settings were sufficient to prevent potentially negative social media experiences, even as the number of malicious applications and frequency of social media-related data breaches were increasing.The consumerization of IT is already happening, and it is about more than smartphones and tabletsMobile devices have overtaken PCs as the predominant means of connecting to the cloudData must be accessible to employees and partners from many locations outside the traditional networkSocial media and cloud-based services are essential components of any business’ growth strategyThe Consumerization of IT also carries many potential risks and costsIncreased operational costs due to managing a de-standardized, heterogeneous environmentIncreased capital costs to port applications, scale data centers and deliver corporate data to a heterogeneous endpoint environmentIncreased risk of data loss and business disruption in a difficult-to-secure IT environmentTrend Micro has seen the advent of this new world of end user and have designed a portfolio of solutions to help businesses embrace consumerization, unlocking its opportunities while containing its costs
  5. We’ve “borrowed” the idea of the Hype Cycle to show the journey that most enterprises are experiencing with mobile devices. The trigger is usually BYOD and that causes security owners to react the way they’ve reacted to end-user security in the past decade: by controlling the device and everything on it. This is what most MDM vendors are focused on. This is a great start, but both security and business owners quickly realize that it’s not the devices that matter, but the data on the devices. When they move to make the MDM solutions solve this challenge they quickly realize that it’s just not possible to segregate the corporate and personal data on the devices and maintain the usability of the device – this leads to the equivalent of the trough of disillusionment.But a new technology has emerged recently that gives Enterprises the flexibility to manage not only the apps on the devices, but also the data that belongs to the apps. Very few Enterprises globally have made the transition out of the trough, but many of them will be making the move in 2012 and it’s interesting to note that they don’t always choose the same vendor for Mobile Application Management as they do for Mobile Device Management.Mid-Market customers are about 12-18 months behind the average Enterprise customer. So in 2012, we plan to address the needs of the Enterprise by moving into Mobile Application Management and the Mid-Market by ensuring we have an easy to use, easy to deploy Hosted Mobile Device Management solution. But in the meantime, we have a very competitive MDM solution on the market in TMMS.
  6. Threat Intelligence Map enable user to visualize global and local SPN (Feedback loop) infection trail in 24 hours or 7 days fashion.User can either select top 20 ranking or manually query malware name from console to render detection trails.
  7. TIM rollout topology working with Trend and 3rd party logs