SlideShare a Scribd company logo
Trend Micro
Corporate Overview
March, 2020
Ā© 2020 Trend Micro Inc.3
DIGITAL
TRANSFORMATION
McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019
MANUFACTURING: Automation, robotics & AI
improve efficiencies & operations in unsafe working
environments: can reduce planned outages by 50%!
HEALTHCARE: Digitally-enabled tools for
diagnosis, treatment & management:
prevents up to 95% of adverse drug events!
FINANCIAL SERVICES: Mobile, blockchain & big data
AI drive customer engagement at a lower cost:
mobile payments will break $1T in 2019!
RETAIL: Omni-channel, IoT, augmented reality &
hyper-personalization drive customer experience
& revenue: in 5 years, 25% of malls will be gone!
Ā© 2020 Trend Micro Inc.4
DIGITAL
TRANSFORMATION
Cloud,
Big data, AI, IoT,
Automationā€¦
Ā© 2020 Trend Micro Inc.5
Top 2 risk issues are organizational
misalignment and overall complexity
Lack of visibility and connectivity across
environments introduces significant risk
73% of organizations had at least one
data breach in 2019, 21% had 7 or more
DIGITAL
TRANSFORMATION
Cyber Risk Index
Ā© 2020 Trend Micro Inc.6
Eva Chen, CEO & Co-founder
Trend Micro
ā€¢ Cybersecurity focused for 30+ years
ā€¢ Profitable since going public in 1998,
with over $1.5B in sales (FY2019)
ā€¢ 500,000+ commercial customers
ā€¢ 6700+ people passionate about
security across 65+ countries
A world safe for exchanging digital information
Ā© 2020 Trend Micro Inc.7
Trend Micro instantly stops and gives us visibility on zero-
day attacks without us having to intervene, enabling our
small team to deal with protecting a complex environment
while delivering the right information for board-level
reporting and education.Pete Statia, InfoSec
ā€œ
ā€œ
Ā© 2020 Trend Micro Inc.8
Extended network
and operational
technologies
Services moving to
the cloud, users
more mobile
Branch Office
Multi-cloud migration and
new cloud-native applications
Ā© 2020 Trend Micro Inc.9
Data Center
Workloads
Cloud migration1
Workloads Workloads
Hybrid & multi-cloud
Evolving security processes
Windows relevance
Performance
Central visibility
IT & CLOUD OPS TEAMS
By 2021, over 75% of midsize & large organizations
will have adopted multi-cloud or hybrid IT strategy.
Gartner ; ā€œ5 Approaches to Cloud Applications Integrationā€ | Smarter with Gartner | 14 May 2019
Ā© 2020 Trend Micro Inc.10
Data Center
Workloads
Cloud migration1
Workloads Workloads
Ransomware
On-premises security controls, like IPS and
anti-malware, are often not optimized for
the scale and automation requirements of
the cloud, leaving security gaps
Unpatched OS
Unpatched OS
C&C communications
Ā© 2020 Trend Micro Inc.11
Developers
Commit
Code
Repository
Push
Build
Automation
Build
Container Registry
Data Center
Workloads WorkloadsWorkloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Security causing delays
Automation in CI/CD pipeline
Too many tools
Heavy use of Linux
DEVOPS TEAMS
By 2022, 90% of software development
projects will claim to be following DevOps
practices, up from 40% in 2019.
Gartner; ā€œIntegrating Security Into the DevSecOps Toolchainā€ | 15 November 2019 |
G00377293 | Mark Horvath, Neil MacDonald
Cloud-native applications2
Ā© 2020 Trend Micro Inc.12
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud-native applications2
Customer
Open to
malicious file
upload
Container image
vulnerabilities
Code
vulnerabilities
SQL injection3rd party app
vulnerability
Code re-use, DevOps and new
compute models like containers
and serverless expand your
attack surface
Developers Code
Repository
Build
Automation
Ā© 2020 Trend Micro Inc.13
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Rapid growth in new cloud services
Learning curve for configuration
Many teams using cloud services
Lack of visibility
Proving compliance
CLOUD CENTERS OF EXCELLENCE
Through 2023, at least 99% of cloud
security failures will be the customerā€™s fault.
Gartner; ā€Innovation Insight for Cloud Security Posture Managementā€ | 25 January 2019 |
G00377795 | Neil MacDonald
Developers Code
Repository
Build
Automation
Ā© 2020 Trend Micro Inc.14
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Cross-account
access to repository
Open to
Internet
Keys not rotated
frequently enough
Misconfigured cloud
formation templates
Explosion of new cloud services
creates a steep learning curve
resulting in misconfiguration
and vulnerabilities
Developers Code
Repository
Build
Automation
Ā© 2020 Trend Micro Inc.15
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Container
security
File storage
security
Network
securityConformity
Workload
security
Application
security
Need optimized security
across the environment
to mitigate risk
Developers Code
Repository
Build
Automation
Ā© 2020 Trend Micro Inc.17
ā€¢ Flexible to secure your entire hybrid,
multi-cloud environment
ā€¢ Automated so you can deliver
scalable security-as-code
ā€¢ All-in-one solution minimizes
complexity with the right security
tools for all your cloud use cases
Ā© 2020 Trend Micro Inc.18
Trend Micro has been named a
leader with highest score in
current offering and strategy
categories in The Forrester
Waveā„¢: Cloud Workload
Security, Q4 2019
Source: The Forrester Waveā„¢: Cloud Workload Security, Q4 2019
by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on
a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is
based on best available resources. Opinions reflect judgment at the time and are subject to change.
Ā© 2020 Trend Micro Inc.19
8 of 8
Core Controls*
2019 Market Guide for
Cloud Workload Protection Platforms
Trend Microā€™s assessment shows
that we deliver the most cloud
security controls and criteria. *
21 of 25
Additional Criteria*
*Based on Trend Microā€™s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms;
8 April 2019 | G00356240 | Neil MacDonald.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its
research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartnerā€™s research organization and shouldnot be
construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
Ā© 2020 Trend Micro Inc.20
Source: IDC, Worldwide Software Defined Compute Workload
Security Market Shares, 2018 (DOC #US45638919, November 2019)
#1 market share
for Hybrid Cloud Workload
Security with 35.5%
Ā© 2020 Trend Micro Inc.21
Mario Mendoza
Security Architecture
With Trend Microā€™s SaaS-based cloud solution, PCI
compliance has moved from hours of work to a click of a
button. We not only get complete protection, but also time
savings for our team.
ā€œ ā€œ
Ā© 2020 Trend Micro Inc.22
Branch Office
Ā© 2020 Trend Micro Inc.23
Wants fast detection & response on
endpoints
Visibility beyond the endpoint
(cross-layer)
SOC/IR TEAMS
Wants effective ransomware
protection
Less time re-imaging
IT OPS TEAMS (Endpoint & Email)
By 2025, cloud-delivered EPP solutions
will grow from 20% of new deals to 95%.
Gartner; ā€œMagic Quadrant for Endpoint Protection Platformsā€ |
20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al.
By 2021, Gartner expects 70% of public & private
companies to be using cloud email services.
Gartner; ā€œMarket Guide for Email Securityā€ | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
Ā© 2020 Trend Micro Inc.24
S
Vulnerable
operating systems
Non-malware fraud (e.g. business email compromise,
credential compromise) focuses here, and 94% of
malware attacks arrive via email*.
*Verizon Data Breach Investigation Report, May 2019
Todayā€™s attacks are stealthy
and often file-less, evading
outdated defenses.
Itā€™s challenging to patch all
endpoints in a timely
fashion. New OS exploits
can spread quickly.
Attack starts with
spear-phishing
Employee tricked into
revealing credentials /
install malware
Lateral movement via
unpatched
vulnerabilities
Users vulnerable to
social engineering
Outdated
defenses
Ā© 2020 Trend Micro Inc.25
Detection of malware,
phishing & fraud
(Office 365 / G Suite)
Modern Endpoint Protection
(advanced detection
techniques + built-in EDR)
Email security must not only
detect malware, but also the
latest social engineering attacks
with advanced features like
writing style analysis
Virtual patching blocks exploits
of unpatched operating system
vulnerabilities, buying time
ahead of patches
Modern endpoint security requires
pre-execution and runtime detection,
with ability to catch file-less threats
e.g. malicious PowerShell
Ā© 2020 Trend Micro Inc.27
ā€¢ Prevent the broadest range of
threats with the right technique, at
the right time
ā€¢ Detect more, faster with integrated
detection and response across
endpoints and email
ā€¢ Complete visibility for holistic
investigation and response
Ā© 2020 Trend Micro Inc.28
Gartner Magic Quadrant for
Endpoint Protection Platforms
August 2019
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from http://www.gartner.com/reprints/trend-micro---
canada?id=1-1OEJAQ6E&ct=190819&st=sb
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner's research organization and should not be construed as statements of
fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Ā© 2020 Trend Micro Inc.29
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
THE FORRESTER WAVETM
Endpoint Security Suites
Q3 2019
www.trendmicro.com/en_ca/business/products/user
-protection.html?modal=rb-forrester-wave-endpoint-
see-how-07a253
Ā© 2020 Trend Micro Inc.30
https://resources.trendmicro.com/Forrester-Wave-Email.html
THE FORRESTER WAVETM
Enterprise Email Security
Q2 2019
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
Ā© 2020 Trend Micro Inc.31
Leon Backbier
ICT Manager
Trend Micro gives us an easy-to-deploy solution
for security and GDPR compliance, including
integrated management, visibility, and security that
has no performance impact on the endpoint.
ā€œ ā€œ
Ā© 2020 Trend Micro Inc.32
Branch Office
Ā© 2020 Trend Micro Inc.33
Branch Office
Wants visibility and security
for the converging OT
environment, & expanding
cloud deployments.
NETWORK SECURITY TEAMS
Wants visibility to
network activity to
help detection &
response
SOC/IR TEAMS
By 2023, 30% of industrial enterprises will have
full, on-premises deployments of IIoT platforms,
up from 15% in 2019
Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019.
By 2021, 50% of all workloads will be run outside
the enterprise data center, either in cloud & data
center infrastructures or at the network edge.
Uptime Institute Annual Data Center Survey, 2019.
Ā© 2020 Trend Micro Inc.34
Branch Office
Cloud deployments arenā€™t
protected by existing
network security
Unpatched OS & app
vulnerabilities in cloud
deployments
OT environments have wide variety
of device types and patching levels.
IT network security doesnā€™t fit OT.
Endpoint security & EDR
canā€™t see unprotected
endpoints / IT devices Unprotected contractor
endpoints
Vulnerable IT
and OT Devices
OS vulnerability
exploit
Compromised hosts
communicating with C&C
Outbound
C&C Traffic
OT exploit from
infected workloads
Contractor laptop as
initial attack vector
Ā© 2020 Trend Micro Inc.35
Branch Office
Cloud IPS
IDS/IPS
Network Analytics
Specialized IDS/IPS
for OTVirtually patching against
exploits protects
unpatched endpoints
The network is the first
line of defense against
threats, and the only
defense for many devices
Ā© 2020 Trend Micro Inc.37
ā€¢ Wire-speed, network-layer protection
against against the broadest range of
threats
ā€¢ Flexible network security that
seamlessly extends to the cloud and
OT environments
ā€¢ Insightful to detect previously
unknown threats in your environment
and share that threat intelligence
with other security layers
Ā© 2020 Trend Micro Inc.38
ā€œRecommendedā€
Breach Detection System 5
5 Years in a Row and 98.7%
Detection Rate
ā€œRecommendedā€
Data Center
Intrusion Prevention System
NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report
RECOMMENDED RECOMMENDED
Ā© 2020 Trend Micro Inc.39
Claudia Anania
CIO
With visibility and protection across multiple
environments, weā€™ve been able to increase our speed
for incident response by 90%, while reducing our
effort for compliance reporting by 90%.
ā€œ ā€œ
Ā© 2020 Trend Micro Inc.40
Branch Office
Ā© 2020 Trend Micro Inc.41
Branch Office
User behavior
Endpoint
Vulnerabilities
Social engineering
risk
Code from 3rd party
repositories
Network
vulnerabilities
Application
Vulnerabilities
Old operating
systems
Vulnerable OT
devices
MisconfigurationsRisks & vulnerabilities
across multiple
environments
Ā© 2020 Trend Micro Inc.42
Branch Office
Wants fast detection &
response across
entire environment
SOC/IR TEAMS
88% of organizations will increase spending on
detection and response in the next 18 months to
address cross-layer visibility gaps.
ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
Ā© 2020 Trend Micro Inc.43
Branch Office
Today, the SOC gets
siloed insight into
endpoints (EDR)ā€¦
ā€¦and limited visibility to
threats affecting cloud
workloads
ā€¦a separate siloed
view into network
eventsā€¦
SOC / IR
Analyst
Ā© 2020 Trend Micro Inc.44
SOC / IR
Analyst
Branch Office
Generating incomplete,
noisy SIEM alerts without
any context
Ā© 2020 Trend Micro Inc.45
Spread to cloud
via compromised
credentials
Branch Office
SOC / IR
Analyst
Threat arrived via
email to another
endpoint
Additional apps
impacted
Spread from cloud to
OT infrastructure
There was more to the
story! Itā€™s important to
see the whole picture.
Ā© 2020 Trend Micro Inc.46
Branch Office
SOC / IR
Analyst
XDR breaks down the
silos and tells a story
instead of noise
XDR
Ā© 2020 Trend Micro Inc.48
Branch Office
VISIBILITY, DETECTION
& RESPONSE (XDR)
Ā© 2020 Trend Micro Inc.49
THE FORRESTER WAVETM
Enterprise Detection
and Response (EDR)
Q1 2020
https://resources.trendmicro.com/Forrester-Wave-EDR.html
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and
Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a
graphical representation of Forrester's call on a market and is plotted using a
detailed spreadsheet with exposed scores, weightings, and comments. Forrester
does not endorse any vendor, product, or service depicted in the Forrester Wave.
Information is based on best available resources. Opinions reflect judgment at the
time and are subject to change.
Ā© 2020 Trend Micro Inc.50 Quotes need to be finalized
Trend Micro enabled me to reduce my breach risk across
ClubCorp AND save almost 30% off my cyber insurance
premiums based on the protection & visibility I now have.
Ed Martinez, CISO
ā€œ ā€œ
Ā© 2020 Trend Micro Inc.51
Why Trend Micro?
People, Research, Technology
Ā© 2020 Trend Micro Inc.52
Every Trender is passionate about
making the world a safer and a
better place for everyone.
Donated $4.5M+ to those in
need, and built homes for
1800+ families
Educated 20,000+ small businesses,
1000+ university students, and
2.5M+ kids and families
Trained 300+ new cybersecurity
experts, and enhanced a culture of
diversity and inclusion
500,000+ commercial customers
and millions of consumers
protected
Ā© 2020 Trend Micro Inc.53
Threats Vulnerabilities
& Exploits
Cybercriminal
Undergrounds
IoT OT / IIoTAI & ML Future Threat
Landscape
Targeted
Attacks
Trend Micro Core
Technology & Products
Responsible disclosure to
software/hardware vendors
Public/private partnerships
(e.g. law enforcement)
Threat intelligence and research for
consumers, businesses & governments
Ā© 2020 Trend Micro Inc.54
Zero Day Initiative
ā€¢ 3500+ independent
vulnerability researchers
ā€¢ Discovered over half the
vulnerabilities in 2018
Source: IHS Markit, 2018 Public Vulnerability Market
Market Leader in Vulnerability Disclosure
52.3%
13.5%
12.4%
7.2%
5.3%
4.4%
1.8% 1.3%
0.8%
0.7%
0.4%
0.1%
Trend Micro
Cisco
Google
Check Point
Palo Alto
Secunia
Fortinet
iDefense
McAfee
Kaspersky Lab
CERT/CC
SecureAuth
Ā© 2020 Trend Micro Inc.55
The Trusted Source For Law Enforcement
Ā© 2020 Trend Micro Inc.56
VISIBILITY, DETECTION
& RESPONSE (XDR)
Technology Advantage:
Singular focus, years of expertise,
but we always anticipate and adapt
Ā© 2020 Trend Micro Inc.57
Investigation & Response (XDR)
Custom Sandbox Analysis
Intrusion Prevention (IPS) & Firewall
Early Zero-Day Protection
Exploit Prevention & File/Web Reputation
Variant Protection
Application Control
Integrity Monitoring
Pre-execution Machine Learning
Behavioral Analysis
Runtime Machine Learning
Network Content Correlation
SMART
XGen
TM
Security Strategy Maximizes Protection
LEGEND
Known
Good Data
Known
Bad Data
Unknown
Data
Noise
Cancellation
Malicious files &
actions blocked
Safe files &
actions allowed
Ā© 2020 Trend Micro Inc.58
OPTIMIZED
Minimizes IT impact
and operational
challenges
VISIBILITY, DETECTION
& RESPONSE (XDR)
Ā© 2020 Trend Micro Inc.59
VISIBILITY, DETECTION
& RESPONSE (XDR)
CONNECTED
Speeds time to protect,
detect and respond
Ā© 2020 Trend Micro Inc.60
Enable rapid response
through shared threat
intelligence and delivery of
real-time security updates
Detect advanced malware,
suspicious behavior and
communications invisible to
standard defenses
Assess potential
vulnerabilities and
proactively protect
endpoints, servers and
applications
PROTECT
DETECT
RESPOND
Gain holistic visibility, and
rapidly investigate and
respond to threats across
the environment
VISIBILITY, DETECTION
& RESPONSE (XDR)
Enabling Resilience with a Connected Threat Defense
Ā© 2020 Trend Micro Inc.61
ā€¢ Enable automated threat correlation and alerting on
high priority issues by processing massive amounts of
data in the cloud
ā€¢ Continuous development and delivery of new
capabilities to solve your needs faster
ā€¢ Simplify the purchase process with innovative, flexible
pricing aligned to the cloud
ā€¢ Deliver security via SaaS, lowering operational impacts
and enabling you to focus on business-critical projects
Our Strategy: Cloud Excellence
Ā© 2020 Trend Micro Inc.62
Trend Microā€™s connected solutions enabled us to go from four
consoles to one with complete visibility, reducing our
operational workload while protecting us with ZERO breaches
since we deployed.Adrian Foo, IT Manager
ā€œ ā€œ
Ā© 2020 Trend Micro Inc.63
In this era of digital
transformation, we enable
organizations to be RESILIENT,
freeing them to go further
and do more.
Trend Micro deployment shifts over timeā€”from
on-premises to SaaS-based solutions. Created
with real data by artist Stefanie Posavec.
Ā© 2020 Trend Micro Inc.65
Extras
Ā© 2020 Trend Micro Inc.66
9 of Top 10 Telecom
8 of Top 10 Petroleum
8 of Top 10 Healthcare
8 of Top 10 Automotive
7 of Top 10 Banking
Ā© 2020 Trend Micro Inc.67
ā€¢ 250M+ sensors globally
& threat telemetry from
500,000 commercial
customers
ā€¢ Hundreds of researchers
across 15 global threat
centers
Global Threat Research
Ā© 2020 Trend Micro Inc.68
Working with Industry Partners
Ā© 2020 Trend Micro Inc.69
1990 2000 2010 2012 2014 2016 2018 2019
Gateway
scanning of
SMTP, HTTP, FTP
LAN security
for Microsoft
& Novell
Specialized
security
datacenter
servers
Optimized
security for
VMware
Optimized security
for Microsoft Azure
workloads
IoT Reputation
Service
Cloud workload
protection platform
with integrated
container security
XDR with endpoint,
email, servers, &
network combinedAI-based writing-style DNA
analysis for email fraud
Broadest cloud
security platform
as a serviceOptimized
security for
AWS workloads
2020
Specialized
IPS for OT
Continuous Industry Firsts
Ā© 2020 Trend Micro Inc.70
FREE! Phishing Awareness Service
Send users a realistic
phishing campaign
Raise user awareness
with training
Analyze the results
https://phishinsight.trendmicro.com
Ā© 2020 Trend Micro Inc.71
FREE Cyber Risk Awareness Tool
http://www.trendmicro.com/cyberrisk
Assess your organizationā€™s cyber preparedness,
experience, and future outlook
Ā© 2020 Trend Micro Inc.72
Free security assessment service that scans
O365 inboxes and endpoints to gauge the
overall security posture
A simple way for a security professional to:
ā€¢ Check their O365 inboxes for undiscovered
email threats
ā€¢ Check key endpoints for undiscovered
threats
ā€¢ Review a final report in PDF form to share
with stakeholders outlining any threats
existing in their environments
Cybersecurity Assessment Service
https://assessment.xdr.trendmicro.com

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
Ā 
Techowl- Wazuh.pdf
Techowl- Wazuh.pdfTechowl- Wazuh.pdf
Techowl- Wazuh.pdf
AbhishekChaudhary518667
Ā 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
Terranovatraining
Ā 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
Ā 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standards
Wilson Musyoka
Ā 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionConor Ryan
Ā 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdf
ReZa AdineH
Ā 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
Ā 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Infosec
Ā 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
Liberteks
Ā 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
The TNS Group
Ā 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
Ā 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
Ā 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
Ā 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
Ā 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
Ā 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
Ā 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
Ā 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond
Ā 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Ā 
Techowl- Wazuh.pdf
Techowl- Wazuh.pdfTechowl- Wazuh.pdf
Techowl- Wazuh.pdf
Ā 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
Ā 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Ā 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standards
Ā 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
Ā 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdf
Ā 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Ā 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Ā 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
Ā 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
Ā 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Ā 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
Ā 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Ā 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
Ā 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
Ā 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Ā 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
Ā 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
Ā 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Ā 

Similar to Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
John D. Haden
Ā 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
Ā 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
Redington Value Distribution
Ā 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
IMC Institute
Ā 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza
Ā 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
Ā 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
VARINDIA
Ā 
ProtectĀ your hybrid workforceĀ across the attack chain
ProtectĀ your hybrid workforceĀ across the attack chainProtectĀ your hybrid workforceĀ across the attack chain
ProtectĀ your hybrid workforceĀ across the attack chain
David J Rosenthal
Ā 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
Ā 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Metaorange
Ā 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
NeetaSahay1
Ā 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
Ā 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Appian
Ā 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
SrikanthRaju7
Ā 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
Hugo Rodrigues
Ā 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
Ā 
2019 Enterprise IT Predictions
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT Predictions
Mike Pastore
Ā 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
Ā 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
PT Datacomm Diangraha
Ā 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
WSO2
Ā 

Similar to Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro (20)

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
Ā 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Ā 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
Ā 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
Ā 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Ā 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Ā 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
Ā 
ProtectĀ your hybrid workforceĀ across the attack chain
ProtectĀ your hybrid workforceĀ across the attack chainProtectĀ your hybrid workforceĀ across the attack chain
ProtectĀ your hybrid workforceĀ across the attack chain
Ā 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Ā 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Ā 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
Ā 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Ā 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Ā 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Ā 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
Ā 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Ā 
2019 Enterprise IT Predictions
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT Predictions
Ā 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Ā 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
Ā 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
Ā 

More from Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
Prime Infoserv
Ā 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
Prime Infoserv
Ā 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
Prime Infoserv
Ā 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Prime Infoserv
Ā 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Prime Infoserv
Ā 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
Ā 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
Prime Infoserv
Ā 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
Ā 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
Ā 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
Prime Infoserv
Ā 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
Prime Infoserv
Ā 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
Prime Infoserv
Ā 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
Prime Infoserv
Ā 
Email Security ā€“ Everyone is a Target
Email Security ā€“ Everyone is a TargetEmail Security ā€“ Everyone is a Target
Email Security ā€“ Everyone is a Target
Prime Infoserv
Ā 
Secure Access ā€“ Anywhere by Prisma, PaloAlto
Secure Access ā€“ Anywhere by Prisma, PaloAltoSecure Access ā€“ Anywhere by Prisma, PaloAlto
Secure Access ā€“ Anywhere by Prisma, PaloAlto
Prime Infoserv
Ā 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Prime Infoserv
Ā 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
Ā 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
Prime Infoserv
Ā 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
Ā 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv
Ā 

More from Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
Ā 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
Ā 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
Ā 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Ā 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Ā 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Ā 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
Ā 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Ā 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Ā 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
Ā 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
Ā 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
Ā 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
Ā 
Email Security ā€“ Everyone is a Target
Email Security ā€“ Everyone is a TargetEmail Security ā€“ Everyone is a Target
Email Security ā€“ Everyone is a Target
Ā 
Secure Access ā€“ Anywhere by Prisma, PaloAlto
Secure Access ā€“ Anywhere by Prisma, PaloAltoSecure Access ā€“ Anywhere by Prisma, PaloAlto
Secure Access ā€“ Anywhere by Prisma, PaloAlto
Ā 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Ā 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Ā 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
Ā 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Ā 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Ā 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
Ā 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
Ā 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ā 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Ā 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Ā 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Ā 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Ā 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Ā 

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

  • 2. Ā© 2020 Trend Micro Inc.3 DIGITAL TRANSFORMATION McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019 MANUFACTURING: Automation, robotics & AI improve efficiencies & operations in unsafe working environments: can reduce planned outages by 50%! HEALTHCARE: Digitally-enabled tools for diagnosis, treatment & management: prevents up to 95% of adverse drug events! FINANCIAL SERVICES: Mobile, blockchain & big data AI drive customer engagement at a lower cost: mobile payments will break $1T in 2019! RETAIL: Omni-channel, IoT, augmented reality & hyper-personalization drive customer experience & revenue: in 5 years, 25% of malls will be gone!
  • 3. Ā© 2020 Trend Micro Inc.4 DIGITAL TRANSFORMATION Cloud, Big data, AI, IoT, Automationā€¦
  • 4. Ā© 2020 Trend Micro Inc.5 Top 2 risk issues are organizational misalignment and overall complexity Lack of visibility and connectivity across environments introduces significant risk 73% of organizations had at least one data breach in 2019, 21% had 7 or more DIGITAL TRANSFORMATION Cyber Risk Index
  • 5. Ā© 2020 Trend Micro Inc.6 Eva Chen, CEO & Co-founder Trend Micro ā€¢ Cybersecurity focused for 30+ years ā€¢ Profitable since going public in 1998, with over $1.5B in sales (FY2019) ā€¢ 500,000+ commercial customers ā€¢ 6700+ people passionate about security across 65+ countries A world safe for exchanging digital information
  • 6. Ā© 2020 Trend Micro Inc.7 Trend Micro instantly stops and gives us visibility on zero- day attacks without us having to intervene, enabling our small team to deal with protecting a complex environment while delivering the right information for board-level reporting and education.Pete Statia, InfoSec ā€œ ā€œ
  • 7. Ā© 2020 Trend Micro Inc.8 Extended network and operational technologies Services moving to the cloud, users more mobile Branch Office Multi-cloud migration and new cloud-native applications
  • 8. Ā© 2020 Trend Micro Inc.9 Data Center Workloads Cloud migration1 Workloads Workloads Hybrid & multi-cloud Evolving security processes Windows relevance Performance Central visibility IT & CLOUD OPS TEAMS By 2021, over 75% of midsize & large organizations will have adopted multi-cloud or hybrid IT strategy. Gartner ; ā€œ5 Approaches to Cloud Applications Integrationā€ | Smarter with Gartner | 14 May 2019
  • 9. Ā© 2020 Trend Micro Inc.10 Data Center Workloads Cloud migration1 Workloads Workloads Ransomware On-premises security controls, like IPS and anti-malware, are often not optimized for the scale and automation requirements of the cloud, leaving security gaps Unpatched OS Unpatched OS C&C communications
  • 10. Ā© 2020 Trend Micro Inc.11 Developers Commit Code Repository Push Build Automation Build Container Registry Data Center Workloads WorkloadsWorkloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Security causing delays Automation in CI/CD pipeline Too many tools Heavy use of Linux DEVOPS TEAMS By 2022, 90% of software development projects will claim to be following DevOps practices, up from 40% in 2019. Gartner; ā€œIntegrating Security Into the DevSecOps Toolchainā€ | 15 November 2019 | G00377293 | Mark Horvath, Neil MacDonald Cloud-native applications2
  • 11. Ā© 2020 Trend Micro Inc.12 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud-native applications2 Customer Open to malicious file upload Container image vulnerabilities Code vulnerabilities SQL injection3rd party app vulnerability Code re-use, DevOps and new compute models like containers and serverless expand your attack surface Developers Code Repository Build Automation
  • 12. Ā© 2020 Trend Micro Inc.13 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Rapid growth in new cloud services Learning curve for configuration Many teams using cloud services Lack of visibility Proving compliance CLOUD CENTERS OF EXCELLENCE Through 2023, at least 99% of cloud security failures will be the customerā€™s fault. Gartner; ā€Innovation Insight for Cloud Security Posture Managementā€ | 25 January 2019 | G00377795 | Neil MacDonald Developers Code Repository Build Automation
  • 13. Ā© 2020 Trend Micro Inc.14 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Cross-account access to repository Open to Internet Keys not rotated frequently enough Misconfigured cloud formation templates Explosion of new cloud services creates a steep learning curve resulting in misconfiguration and vulnerabilities Developers Code Repository Build Automation
  • 14. Ā© 2020 Trend Micro Inc.15 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Container security File storage security Network securityConformity Workload security Application security Need optimized security across the environment to mitigate risk Developers Code Repository Build Automation
  • 15. Ā© 2020 Trend Micro Inc.17 ā€¢ Flexible to secure your entire hybrid, multi-cloud environment ā€¢ Automated so you can deliver scalable security-as-code ā€¢ All-in-one solution minimizes complexity with the right security tools for all your cloud use cases
  • 16. Ā© 2020 Trend Micro Inc.18 Trend Micro has been named a leader with highest score in current offering and strategy categories in The Forrester Waveā„¢: Cloud Workload Security, Q4 2019 Source: The Forrester Waveā„¢: Cloud Workload Security, Q4 2019 by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 17. Ā© 2020 Trend Micro Inc.19 8 of 8 Core Controls* 2019 Market Guide for Cloud Workload Protection Platforms Trend Microā€™s assessment shows that we deliver the most cloud security controls and criteria. * 21 of 25 Additional Criteria* *Based on Trend Microā€™s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms; 8 April 2019 | G00356240 | Neil MacDonald. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartnerā€™s research organization and shouldnot be construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
  • 18. Ā© 2020 Trend Micro Inc.20 Source: IDC, Worldwide Software Defined Compute Workload Security Market Shares, 2018 (DOC #US45638919, November 2019) #1 market share for Hybrid Cloud Workload Security with 35.5%
  • 19. Ā© 2020 Trend Micro Inc.21 Mario Mendoza Security Architecture With Trend Microā€™s SaaS-based cloud solution, PCI compliance has moved from hours of work to a click of a button. We not only get complete protection, but also time savings for our team. ā€œ ā€œ
  • 20. Ā© 2020 Trend Micro Inc.22 Branch Office
  • 21. Ā© 2020 Trend Micro Inc.23 Wants fast detection & response on endpoints Visibility beyond the endpoint (cross-layer) SOC/IR TEAMS Wants effective ransomware protection Less time re-imaging IT OPS TEAMS (Endpoint & Email) By 2025, cloud-delivered EPP solutions will grow from 20% of new deals to 95%. Gartner; ā€œMagic Quadrant for Endpoint Protection Platformsā€ | 20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al. By 2021, Gartner expects 70% of public & private companies to be using cloud email services. Gartner; ā€œMarket Guide for Email Securityā€ | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
  • 22. Ā© 2020 Trend Micro Inc.24 S Vulnerable operating systems Non-malware fraud (e.g. business email compromise, credential compromise) focuses here, and 94% of malware attacks arrive via email*. *Verizon Data Breach Investigation Report, May 2019 Todayā€™s attacks are stealthy and often file-less, evading outdated defenses. Itā€™s challenging to patch all endpoints in a timely fashion. New OS exploits can spread quickly. Attack starts with spear-phishing Employee tricked into revealing credentials / install malware Lateral movement via unpatched vulnerabilities Users vulnerable to social engineering Outdated defenses
  • 23. Ā© 2020 Trend Micro Inc.25 Detection of malware, phishing & fraud (Office 365 / G Suite) Modern Endpoint Protection (advanced detection techniques + built-in EDR) Email security must not only detect malware, but also the latest social engineering attacks with advanced features like writing style analysis Virtual patching blocks exploits of unpatched operating system vulnerabilities, buying time ahead of patches Modern endpoint security requires pre-execution and runtime detection, with ability to catch file-less threats e.g. malicious PowerShell
  • 24. Ā© 2020 Trend Micro Inc.27 ā€¢ Prevent the broadest range of threats with the right technique, at the right time ā€¢ Detect more, faster with integrated detection and response across endpoints and email ā€¢ Complete visibility for holistic investigation and response
  • 25. Ā© 2020 Trend Micro Inc.28 Gartner Magic Quadrant for Endpoint Protection Platforms August 2019 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/reprints/trend-micro--- canada?id=1-1OEJAQ6E&ct=190819&st=sb Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 26. Ā© 2020 Trend Micro Inc.29 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. THE FORRESTER WAVETM Endpoint Security Suites Q3 2019 www.trendmicro.com/en_ca/business/products/user -protection.html?modal=rb-forrester-wave-endpoint- see-how-07a253
  • 27. Ā© 2020 Trend Micro Inc.30 https://resources.trendmicro.com/Forrester-Wave-Email.html THE FORRESTER WAVETM Enterprise Email Security Q2 2019 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 28. Ā© 2020 Trend Micro Inc.31 Leon Backbier ICT Manager Trend Micro gives us an easy-to-deploy solution for security and GDPR compliance, including integrated management, visibility, and security that has no performance impact on the endpoint. ā€œ ā€œ
  • 29. Ā© 2020 Trend Micro Inc.32 Branch Office
  • 30. Ā© 2020 Trend Micro Inc.33 Branch Office Wants visibility and security for the converging OT environment, & expanding cloud deployments. NETWORK SECURITY TEAMS Wants visibility to network activity to help detection & response SOC/IR TEAMS By 2023, 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms, up from 15% in 2019 Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019. By 2021, 50% of all workloads will be run outside the enterprise data center, either in cloud & data center infrastructures or at the network edge. Uptime Institute Annual Data Center Survey, 2019.
  • 31. Ā© 2020 Trend Micro Inc.34 Branch Office Cloud deployments arenā€™t protected by existing network security Unpatched OS & app vulnerabilities in cloud deployments OT environments have wide variety of device types and patching levels. IT network security doesnā€™t fit OT. Endpoint security & EDR canā€™t see unprotected endpoints / IT devices Unprotected contractor endpoints Vulnerable IT and OT Devices OS vulnerability exploit Compromised hosts communicating with C&C Outbound C&C Traffic OT exploit from infected workloads Contractor laptop as initial attack vector
  • 32. Ā© 2020 Trend Micro Inc.35 Branch Office Cloud IPS IDS/IPS Network Analytics Specialized IDS/IPS for OTVirtually patching against exploits protects unpatched endpoints The network is the first line of defense against threats, and the only defense for many devices
  • 33. Ā© 2020 Trend Micro Inc.37 ā€¢ Wire-speed, network-layer protection against against the broadest range of threats ā€¢ Flexible network security that seamlessly extends to the cloud and OT environments ā€¢ Insightful to detect previously unknown threats in your environment and share that threat intelligence with other security layers
  • 34. Ā© 2020 Trend Micro Inc.38 ā€œRecommendedā€ Breach Detection System 5 5 Years in a Row and 98.7% Detection Rate ā€œRecommendedā€ Data Center Intrusion Prevention System NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report RECOMMENDED RECOMMENDED
  • 35. Ā© 2020 Trend Micro Inc.39 Claudia Anania CIO With visibility and protection across multiple environments, weā€™ve been able to increase our speed for incident response by 90%, while reducing our effort for compliance reporting by 90%. ā€œ ā€œ
  • 36. Ā© 2020 Trend Micro Inc.40 Branch Office
  • 37. Ā© 2020 Trend Micro Inc.41 Branch Office User behavior Endpoint Vulnerabilities Social engineering risk Code from 3rd party repositories Network vulnerabilities Application Vulnerabilities Old operating systems Vulnerable OT devices MisconfigurationsRisks & vulnerabilities across multiple environments
  • 38. Ā© 2020 Trend Micro Inc.42 Branch Office Wants fast detection & response across entire environment SOC/IR TEAMS 88% of organizations will increase spending on detection and response in the next 18 months to address cross-layer visibility gaps. ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
  • 39. Ā© 2020 Trend Micro Inc.43 Branch Office Today, the SOC gets siloed insight into endpoints (EDR)ā€¦ ā€¦and limited visibility to threats affecting cloud workloads ā€¦a separate siloed view into network eventsā€¦ SOC / IR Analyst
  • 40. Ā© 2020 Trend Micro Inc.44 SOC / IR Analyst Branch Office Generating incomplete, noisy SIEM alerts without any context
  • 41. Ā© 2020 Trend Micro Inc.45 Spread to cloud via compromised credentials Branch Office SOC / IR Analyst Threat arrived via email to another endpoint Additional apps impacted Spread from cloud to OT infrastructure There was more to the story! Itā€™s important to see the whole picture.
  • 42. Ā© 2020 Trend Micro Inc.46 Branch Office SOC / IR Analyst XDR breaks down the silos and tells a story instead of noise XDR
  • 43. Ā© 2020 Trend Micro Inc.48 Branch Office VISIBILITY, DETECTION & RESPONSE (XDR)
  • 44. Ā© 2020 Trend Micro Inc.49 THE FORRESTER WAVETM Enterprise Detection and Response (EDR) Q1 2020 https://resources.trendmicro.com/Forrester-Wave-EDR.html The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 45. Ā© 2020 Trend Micro Inc.50 Quotes need to be finalized Trend Micro enabled me to reduce my breach risk across ClubCorp AND save almost 30% off my cyber insurance premiums based on the protection & visibility I now have. Ed Martinez, CISO ā€œ ā€œ
  • 46. Ā© 2020 Trend Micro Inc.51 Why Trend Micro? People, Research, Technology
  • 47. Ā© 2020 Trend Micro Inc.52 Every Trender is passionate about making the world a safer and a better place for everyone. Donated $4.5M+ to those in need, and built homes for 1800+ families Educated 20,000+ small businesses, 1000+ university students, and 2.5M+ kids and families Trained 300+ new cybersecurity experts, and enhanced a culture of diversity and inclusion 500,000+ commercial customers and millions of consumers protected
  • 48. Ā© 2020 Trend Micro Inc.53 Threats Vulnerabilities & Exploits Cybercriminal Undergrounds IoT OT / IIoTAI & ML Future Threat Landscape Targeted Attacks Trend Micro Core Technology & Products Responsible disclosure to software/hardware vendors Public/private partnerships (e.g. law enforcement) Threat intelligence and research for consumers, businesses & governments
  • 49. Ā© 2020 Trend Micro Inc.54 Zero Day Initiative ā€¢ 3500+ independent vulnerability researchers ā€¢ Discovered over half the vulnerabilities in 2018 Source: IHS Markit, 2018 Public Vulnerability Market Market Leader in Vulnerability Disclosure 52.3% 13.5% 12.4% 7.2% 5.3% 4.4% 1.8% 1.3% 0.8% 0.7% 0.4% 0.1% Trend Micro Cisco Google Check Point Palo Alto Secunia Fortinet iDefense McAfee Kaspersky Lab CERT/CC SecureAuth
  • 50. Ā© 2020 Trend Micro Inc.55 The Trusted Source For Law Enforcement
  • 51. Ā© 2020 Trend Micro Inc.56 VISIBILITY, DETECTION & RESPONSE (XDR) Technology Advantage: Singular focus, years of expertise, but we always anticipate and adapt
  • 52. Ā© 2020 Trend Micro Inc.57 Investigation & Response (XDR) Custom Sandbox Analysis Intrusion Prevention (IPS) & Firewall Early Zero-Day Protection Exploit Prevention & File/Web Reputation Variant Protection Application Control Integrity Monitoring Pre-execution Machine Learning Behavioral Analysis Runtime Machine Learning Network Content Correlation SMART XGen TM Security Strategy Maximizes Protection LEGEND Known Good Data Known Bad Data Unknown Data Noise Cancellation Malicious files & actions blocked Safe files & actions allowed
  • 53. Ā© 2020 Trend Micro Inc.58 OPTIMIZED Minimizes IT impact and operational challenges VISIBILITY, DETECTION & RESPONSE (XDR)
  • 54. Ā© 2020 Trend Micro Inc.59 VISIBILITY, DETECTION & RESPONSE (XDR) CONNECTED Speeds time to protect, detect and respond
  • 55. Ā© 2020 Trend Micro Inc.60 Enable rapid response through shared threat intelligence and delivery of real-time security updates Detect advanced malware, suspicious behavior and communications invisible to standard defenses Assess potential vulnerabilities and proactively protect endpoints, servers and applications PROTECT DETECT RESPOND Gain holistic visibility, and rapidly investigate and respond to threats across the environment VISIBILITY, DETECTION & RESPONSE (XDR) Enabling Resilience with a Connected Threat Defense
  • 56. Ā© 2020 Trend Micro Inc.61 ā€¢ Enable automated threat correlation and alerting on high priority issues by processing massive amounts of data in the cloud ā€¢ Continuous development and delivery of new capabilities to solve your needs faster ā€¢ Simplify the purchase process with innovative, flexible pricing aligned to the cloud ā€¢ Deliver security via SaaS, lowering operational impacts and enabling you to focus on business-critical projects Our Strategy: Cloud Excellence
  • 57. Ā© 2020 Trend Micro Inc.62 Trend Microā€™s connected solutions enabled us to go from four consoles to one with complete visibility, reducing our operational workload while protecting us with ZERO breaches since we deployed.Adrian Foo, IT Manager ā€œ ā€œ
  • 58. Ā© 2020 Trend Micro Inc.63 In this era of digital transformation, we enable organizations to be RESILIENT, freeing them to go further and do more.
  • 59. Trend Micro deployment shifts over timeā€”from on-premises to SaaS-based solutions. Created with real data by artist Stefanie Posavec.
  • 60. Ā© 2020 Trend Micro Inc.65 Extras
  • 61. Ā© 2020 Trend Micro Inc.66 9 of Top 10 Telecom 8 of Top 10 Petroleum 8 of Top 10 Healthcare 8 of Top 10 Automotive 7 of Top 10 Banking
  • 62. Ā© 2020 Trend Micro Inc.67 ā€¢ 250M+ sensors globally & threat telemetry from 500,000 commercial customers ā€¢ Hundreds of researchers across 15 global threat centers Global Threat Research
  • 63. Ā© 2020 Trend Micro Inc.68 Working with Industry Partners
  • 64. Ā© 2020 Trend Micro Inc.69 1990 2000 2010 2012 2014 2016 2018 2019 Gateway scanning of SMTP, HTTP, FTP LAN security for Microsoft & Novell Specialized security datacenter servers Optimized security for VMware Optimized security for Microsoft Azure workloads IoT Reputation Service Cloud workload protection platform with integrated container security XDR with endpoint, email, servers, & network combinedAI-based writing-style DNA analysis for email fraud Broadest cloud security platform as a serviceOptimized security for AWS workloads 2020 Specialized IPS for OT Continuous Industry Firsts
  • 65. Ā© 2020 Trend Micro Inc.70 FREE! Phishing Awareness Service Send users a realistic phishing campaign Raise user awareness with training Analyze the results https://phishinsight.trendmicro.com
  • 66. Ā© 2020 Trend Micro Inc.71 FREE Cyber Risk Awareness Tool http://www.trendmicro.com/cyberrisk Assess your organizationā€™s cyber preparedness, experience, and future outlook
  • 67. Ā© 2020 Trend Micro Inc.72 Free security assessment service that scans O365 inboxes and endpoints to gauge the overall security posture A simple way for a security professional to: ā€¢ Check their O365 inboxes for undiscovered email threats ā€¢ Check key endpoints for undiscovered threats ā€¢ Review a final report in PDF form to share with stakeholders outlining any threats existing in their environments Cybersecurity Assessment Service https://assessment.xdr.trendmicro.com