Trend Micro Deep Security
#1 Security Platform for Virtualization and the cloud
Trend Micro Deep Discovery
Combating Advanced Persistent Treats (APT’s)
Trend Micro Mobile Security
Manage and control your mobile devices (BYOD)
In a general sense, virtualization, is the creation of a virtual, rather than an actual, version of something.
For example:
Google Earth, It is a virtual image of Earth which hold every detail about earth.
From a computing perspective, we might have already done some virtualization if you’ve ever partitioned a hard disk drive into more than one “virtual” drive.
Virtualization in a computing environment can be present in many different forms, some of which are:
Hardware virtualization
Storage and data virtualization
Software virtualization
Network virtualization
In a general sense, virtualization, is the creation of a virtual, rather than an actual, version of something.
For example:
Google Earth, It is a virtual image of Earth which hold every detail about earth.
From a computing perspective, we might have already done some virtualization if you’ve ever partitioned a hard disk drive into more than one “virtual” drive.
Virtualization in a computing environment can be present in many different forms, some of which are:
Hardware virtualization
Storage and data virtualization
Software virtualization
Network virtualization
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...Randy Shoup
eBay architects Randy Shoup and Dan Pritchett give a guided tour of the eBay architecture. They cover the evolution of the technology stack from Perl to C++ to Java. And they discuss scaling strategies for the data tier, application tier, search, and operations.
Trust is no longer a factor of geography - your users have left the building aka your inside perimeter. Trust No One and secure your data and digital assets through adaptive access.
Akamai Security World Tour Stockholm May 14, 2019
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your “new” setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success now…and tomorrow.
This was one of Trend Micro's sessions presented at VMworld 2017.
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...Randy Shoup
eBay architects Randy Shoup and Dan Pritchett give a guided tour of the eBay architecture. They cover the evolution of the technology stack from Perl to C++ to Java. And they discuss scaling strategies for the data tier, application tier, search, and operations.
Trust is no longer a factor of geography - your users have left the building aka your inside perimeter. Trust No One and secure your data and digital assets through adaptive access.
Akamai Security World Tour Stockholm May 14, 2019
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your “new” setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success now…and tomorrow.
This was one of Trend Micro's sessions presented at VMworld 2017.
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
Dave Asprey, VP-Cloud Security of Trend Micro presented to members of the SDforum in Jan. 2011. This is an adapted version of is presentation which covers key considerations addressing data privacy concerns in the Cloud.
More than 80% of Today’s Top Malware Arrives via Web. More than 80% of Today’s Top Malware Arrives via Web. And
Security Demands on cloud service providers will increase. See the rest of Trend Micro's predictions for 2011.
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
Il cash flow è la ricostruzione dei flussi monetari (differenza tra tutte le entrate e le uscite monetarie) di una azienda nell’arco del periodo di analisi e rappresenta una misura dell’autofinanziamento aziendale. Può essere calcolato a partire dal conto economico e dai dati di bilancio dell’impresa; l’insieme dei flussi di cassa è importante per stabilire in che misura ed in che maniera possono essere remunerati i centri di costo.
Partendo dall’analisi dei bilanci di alcune PMI italiane, cercheremo di analizzare le eventuali criticità emerse nella gestione del proprio cash flow e metteremo in evidenza l’importanza e i vantaggi di un flusso di cassa positivo, identificando quali strumenti utilizzare per creare liquidità, con particolare riferimento al procurement di prodotti ICT.
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
Oggi tutti parlano di UX Design, e finalmente si sta diffondendo la consapevolezza di quanto sia fondamentale una solida progettazione per determinare il successo o l’insuccesso di un prodotto o di un servizio. Nonostante questo, tuttavia ancora molti progetti soffrono di un design carente. In questo talk parleremo di come non cadere negli errori più comuni e di quali siano le best practices principali della UX Mobile di cui tenere conto quando si progetta una Mobile App, alla ricerca della felicità dell’utente (e nostra).
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
Le problematiche che sorgono in seguito all’utilizzo dei prodotti e dei servizi dell’IoT sono molteplici. Tra queste, le maggiori sono:
a) Asimmetria informativa e mancanza di controllo sui propri dati: la condivisione di dati personali tra produttori dei dispositivi, sviluppatori di sw, provider e analisti, comporta per le persone la difficoltà ad esercitare un adeguato controllo sugli stessi, e, soprattutto, sulle finalità perseguite diverse da quelle associate al dispositivo;
b) Consenso informato: estrema difficoltà per l’utilizzatore dei dispositivi IoT di prestare un consapevole e libero consenso al trattamento dei suoi dati personali;
c) Profilazione intrusiva: l’elevata quantità di dati personali e sensibili, rende altamente possibile una profilazione sempre più sofisticata delle abitudini degli utenti;
d) Sicurezza: le attuali tecnologie IoT non hanno ancora raggiunto un livello di sicurezza adeguato.
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
A talk given by Kyle Wilhoit and Marco Balduzzi from Trend Micro's Forward Looking Threat Research team, along with independent researcher Alessandro Pasta.
Abstract:
In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS, which is currently a mandatory installation for all passenger ships and ships over 300 metric tonnes, works by acquiring GPS coordinates and exchanging vessel’s position, course and information with nearby ships, offshore installation, i.e. harbors and traffic controls, and Internet tracking and visualizing providers.
With an estimated number of 400,000 installation, AIS is currently the best system for collision avoidance, maritime security, aids to navigation and accident investigations.
Given its primary importance in marine traffic safety, we conducted a comprehensive security evaluation of AIS, by tackling it from both a software and a hardware, radio frequency perspective.
In this talk, we share with you our finding, i.e how we have been able to hijack and perform man-in-the-middle attacks on existing vessels, take over AIS communications, tamper with the major online tracking providers and eventually fake our own yacht!.
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
Oggi Investire in risorse è sicuramente più conveniente che investire in licenze, I prodotti software open source sono altrettanto performanti e competitivi di quelli proprietari, il web è il loro veicolo principe la dove si manifestano con forza e penetrazione.
Il web è condivisione, Web Advisor è un programma di condivisione e aggiornamento per tutti, esperti, fornitori e clienti; per restare competitivi nel business digitale, per fare network, per restare informati e vivi!
Condividere la conoscenza con i propri clienti e partners è un paradosso commerciale da superare, Scopri le nuove regole del business open source!
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
VMware and Trend Micro have teamed up to deliver the first and only agentless anti-virus solution built for VMware virtualised desktops and data centres, the industry's first VDI-optimised endpoint security solution and the first product to successfully complete all test cases in the VMsafe appliance certification testing.
Antivirus específicos para entornos virtualizadosNextel S.A.
Ponencia de Álvaro Sierra, Major Account Manager de Trend Micro, durante la Jornada Tecnológica 2011 de Nextel S.A.
http://www.nextel.es/eventos_/jornada-tecnologica/
In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments.
In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks.
This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012
The world of computing is moving to the cloud – shared infrastructures, shared systems, instant provisioning and pay-as-you-go services. And users can enjoy anytime, anywhere access to services and their data. But how secure is your data in the cloud and do conventional security products offer the optimal approach to securing your virtualised environments?
In this presentation we examine security and performance concerns along your journey to the cloud and explore new technologies from VMware and Trend Micro. These innovations are all ready helping thousands of businesses to address the security challenges with Physical, Virtual and cloud platforms.
RSA 2012 Virtualization Security February 2012Symantec
At RSA 2012 Symantec and VMware announced five new security integrations with the VMware cloud infrastructure suite designed to deliver extensive protection for virtual and cloud environments along with operational cost savings. With new VMware integrations, Symantec enables joint customers to completely protect their virtual infrastructure and business-critical applications with data loss prevention, IT risk an compliance, data center protection, security information and event management (SIEM) and endpoint protection solutions – delivering unparalleled security, scalability and cost reductions for rapid services delivery and enhanced business agility for the cloud.
How do you secure your most sensitive data in the cloud? How can you provide the right level of authentication controls or encryption services? These are some of the key challenges of virtualization in the cloud. Intel IT responded by creating an architecture called a High Trust Zone (HTZ). This architecture greatly increases flexibility and focuses on rapid detection of compromise and survivability. In particular, it uses zones of trust that provide more flexible, dynamic, and granular controls than do traditional enterprise security models.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Secure Your Virtualized Environment. Protection from Advanced Persistent Threats (APTs)
1. Agenda:
Secure Your
Rob Tanner
Virtualized
Deep Security
Environment
Jay Kammerer Protection from
Deep Discovery
Advanced Persistent
Jamie Haggett Threats (APTs)
Mobile Security
Q&A
2.
3. Server and Desktop Virtualization Security
What's new from Trend Micro
• Trend Micro Deep Security
#1 Security Platform for Virtualization and the cloud
• Trend Micro Deep Discovery
Combating Advanced Persistent Treats (APT’s)
• Trend Micro Mobile Security
Manage and control your mobile devices (BYOD)
2/6/2013 Copyright 2012 Trend Micro Inc. 3
5. Virtualization
is shrinking
the datacenter
but what
about shrinking
security overhead?
2/6/2013 5
6. vCenter and vCloud
are accelerating
VM provisioning
Is you security provisioning
keeping pace?
2/6/2013 |Copyright 2012 Trend Micro Inc. 6
7. Data Center
Physical Virtual Cloud
By 2016, 71% of server workloads
will be virtualized*
• Increased business agility
• Instant scalability
• Lower capital and operational costs
Source: Gartner, Forecast Analysis: Data Center, Worldwide, 2010-2016,
1Q12 Update, Jonathon Hardcastle, 16 May, 2012
Confidential | Copyright 2012 Trend Micro Inc.
8. Data Center
Physical Virtual Cloud
Security Challenges
Manage Risk
Ensure compliance
Protect the brand
Reduce Costs
Performance impact
Management overhead
Confidential | Copyright 2012 Trend Micro Inc.
9. Virtualization Security
Challenge: Resource Contention
Typical AV
Console
3:00am Scan
Antivirus Storm
Automatic security scans overburden the system
2/6/2013 Copyright 2012 Trend Micro Inc. 9
10. Virtualization Security
Challenge: Instant-on Gaps
Reactivated with
Active Dormant security Cloned
out dated
Reactivated and cloned VMs can have out-of-date security
2/6/2013 Copyright 2012 Trend Micro Inc. 10
11. Virtualization Security
Challenge: Inter-VM Attacks / Blind Spots
Attacks can spread across VMs
2/6/2013 Copyright 2012 Trend Micro Inc. 11
12. Virtualization Security
Challenge: Complexity of Management
Provisioning Reconfiguring Rollout Patch
new VMs agents patterns agents
VM sprawl inhibits compliance
2/6/2013 Copyright 2012 Trend Micro Inc. 12
13. Lower Costs with Agent-less Security
Trend Micro Deep Security
Web Intrusion Firewall Integrity
Anti-Malware
Reputation Prevention Monitoring
The Old Way With Deep Security
More VMs
Security
VM VM VM Virtual
Appliance
VM VM VM VM VM
Higher Fewer Easier Stronger
Density Resources Manageability Security
14. Virtualization Security
Increased ROI with Agentless Security
Example: Agentless Antivirus
VM servers per host
Agentless AV 75
Traditional AV 25 3X higher VDI VM consolidation ratios
0 10 20 30 40 50 60 70 80
3-year Savings on 1000 VDI VMs = $539,600
Sources: Tolly Enterprises Test Report, Trend Micro Deep Security vs. McAfee and Symantec, February 2011;
Saving estimate based on VMware ROI calculations
2/6/2013 Copyright 2012 Trend Micro Inc. 14
15. Deep Security 9
Deeper Integration with VMware Platform
• Support for latest vSphere and vShield platform capabilities
– 4th-generation enhancements across broadest agentless security
suite
• Improved performance
– Antivirus and integrity scan caching/de-dupe across VMs
• Significant storage I/O benefits for further VDI consolidation
– Tuning of IPS policies to guest
application
• Stronger protection
– Hypervisor boot integrity – chain of
trust from VM file integrity to H/W
Trend Micro Confidential-NDA Required
16. Vulnerabilities and Patching - under control?
NVD Statistical Data
Year # Vulns % Total
1997 145 57.54
1998 134 54.47
1999 424 47.43
2000 452 44.31
2001 773 46.09
2002 1,004 46.57
Critical ―Software Flaw‖
2095 Vulnerabilities in 2010
2003
2004
678
969
44.40
39.53
• Common Vulnerabilities & Exposures
(―CVE‖): Score 7-10 2005 2,038 41.32
2006 2,760 41.77
2007 3,159 48.50
2008 2,841 50.44
2009 2,722 47.48
2010 2,095 45.16
7 critical alerts every day! 2011* 1,658 43.87
17. Virtualization Security
What is the Solution? Virtual Patching
Rules are developed and delivered
automatically to protect
• Before patches are available
• Unsupported OSs and apps
• Legacy web applications
• Devices that are difficult to patch—
ATM kiosk, point of sale, medical
devices, etc.
Prevent business disruption
and data breach.
Keep your virtual systems, applications, and data secure
2/6/2013 Copyright 2012 Trend Micro Inc. 17
17
18. Security Vulnerability in Java 7
Already targeted by hacker tools
Details
• In early January 2013, a vulnerability was discovered in Java
7, impacting Windows, Mac, and Linux users
• The vulnerability is being exploited in toolkits like:
– Blackhole Exploit Kit (BHEK)
– Cool Exploit Kit (CEK)
• The toolkits distribute malware, most notably ransomware that
locks systems and requires fees (~$200-$300) to unlock
• Oracle made a patch available on Sunday, January 13, 2013
• However, the Department of Homeland Security and other security
consultants still advise disabling Java unless running the software
is business critical
http://blog.trendmicro.com/trendlabs-security-intelligence/java-zero-day-exploit-in-the-wild-spreading-ransomware/
http://blog.trendmicro.com/trendlabs-security-intelligence/java-zero-day-exploit-and-ruby-on-rails-vulnerabilities/
2/6/2013 Confidential | Copyright 2013 Trend Micro Inc. 18
19. Trend Micro Customers are Already Shielded
Deep Security
The Power of Virtual Patching in Deep Security
• Deep Security Labs obtains information about this vulnerability from
public information sources
• Trend Micro protects users from this zero-day vulnerability via its
Deep Security update (DSRU13-002) and rule 1005177 (Rule: Restrict
Java Bytecode File (Jar/Class) Download)
• The rule blocks the .JAR and class files, preventing users from
downloading all related malware
• At first a patch was not available from Oracle for this vulnerability
• This Trend Micro update provided immediate vulnerability shielding for
Deep Security and OfficeScan customers
• Oracle released a patch on Sunday, January 13, 2013
• Trend Micro customers can roll out the actual Oracle patch during a
regularly scheduled maintenance update
2/6/2013 Confidential | Copyright 2013 Trend Micro Inc. 19
20. Automated Security Reduces Costs
Trend Micro Deep Security
Instant and Automated Protection for Virtual and Cloud workloads
Deep Security Manager
vSphere & vCloud
Anti-Malware Firewall
Web Integrity
Reputation Monitoring
Intrusion Log
Prevention Inspection
Physical Virtual Cloud
Desktop & Server Private,
Dedicated Server
Virtualization Hybrid &
Public
Cloud
21. Automate Security 19
controls
15
controls Web Exchange
Server Servers
Virtual
Appliance
• Discover VMs & servers
requiring protection 73
controls
28
controls
– vSphere and vCloud
8 Oracle SAP
– Amazon Web Services controls Web
Server
• Identify and Implement Provisioning
Infrastructure
unique security controls vSphere
required vCloud Deep Security
• Scalable
• Redundant
– OS, applications,
patch-levels, vulnerabilities
Public
Cloud
21
22. Automate Security 19 12
controls
15 7
controls Web Exchange
Server Servers
Virtual
Appliance
• Refresh security
28 5
profiles after patching 73 24
controls
controls
to remove 87
controls Web
Oracle SAP
unnecessary rules Server
Provisioning
• Example, SAP now
Infrastructure
vSphere
requires only 5 vCloud Deep Security
• Scalable
controls • Redundant
Public
Cloud
22
23. What Sets our Solution Apart?
Only true server security platform:
• Comprehensive, modular security
controls
• Optimized for virtualization and cloud
– Higher density, better performance
– Truly agentless
Only true server
– Multi-tenant management
security platform:
• Automated management gain freedom and
confidence for your
– Enforced policy based on OS, applications cloud journey!
– Policy follows VM
– Consistent policies across
physical, virtual, cloud
24. As Virtualization Security Leader,
We Can Help You
• Automate tedious and
costly security provisioning
• Add Confidence to virtualization
and cloud deployments
• Accelerate deployment of
virtualization and cloud
24
25. How does it work?
2/6/2013 Copyright 2012 Trend Micro Inc. 25
26. IDC: Trend Micro Leader
with 27% Global share
Top ratings for
Virtualization Security
Only Enterprise Class Security product validated on Cisco UCS
First Content security solution certified on VCE Vblock in April 2012
Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011
Source: IDC, 2012
27. Over 1500 Customers: Differing Security Priorities
Virtual Compliance Defense in
Virtualization
Patching Depth
Confidential | Copyright 2012 Trend Micro Inc.
28. Trend Micro: VMware #1 Security Partner and
2011 Technology Alliance Partner of the Year
Improves Security Improves Virtualization
by providing the most by providing security solutions
secure virtualization infrastructure, architected to fully exploit
with APIs, and certification programs the VMware platform
VMworld: Trend Micro Dec: Deep Security 7.5
virtsec customer Nov: Deep Security 7 w/ Agentless AntiVirus
May: Trend with virtual appliance Vmworld: Announce
acquires RSA: Trend Micro Deep Security 8
Feb: Join Third Brigade Demos Agentless w/ Agentless FIM
VMsafe
program Sale of DS 7.5 RSA: Other vendors
Before GA ―announce‖ Agentless
2008 2009 2010 2011
July: Q1: VMware buys
RSA: Trend Micro VMworld: Announce
CPVM Deep Security for
announces Coordinated Deep Security 7.5
GA Internal VDI Use
approach & Virtual pricing
And shows Vmsafe demo Q4: Joined EPSEC 2010:
RSA: Trend Micro
vShield Program >100 customers
announces virtual
>$1M revenue
appliance
31. Traditional Security Protection is Insufficient
APTs & Empowere Elastic
Targeted Attacks d Perimeter
APTs & Targeted Attacks Employees
―The New Norm‖ — IDC
Copyright 2012 Trend Micro Inc.
32. APTs and Targeted Attacks
-- The New Norm - IDC
Trend Micro finds
over 90% of
enterprise networks
A Cyber Intrusion contain active malicious
Every 5 Minutes… malware
according to US-CERT
33. Most Targeted Industries
Most common industry targets of APT-related spear phishing
Copyright 2012 Trend Micro Inc.
34. Trend Micro Custom Defense
A complete lifecycle to combat the attacks that matter to you
Specialized threat detection
Detect capability at network and
protection points
Deep analysis uses custom
Analyze sandboxing & relevant global
intel to fully assess threats
Custom security blacklists & Deep Discovery
Adapt signatures block further attack
at network, gateway,
endpoints
Attack profiles and network-
Respond wide event intelligence guide
rapid containment &
remediation
35. Deep Discovery Inspector
Deep Discovery provides the network-wide
visibility, insight and control needed to
protect your company against APTs and targeted attacks
• Visualization
• Analysis Network
• Alarms
• Reporting
Visibility, Analysis
& Control
Threat Virtual Watch Threat SIEM
Detection Analyzer List Connect Connect
Network Inspection
Network Inspection Platform Platform
Malicious Content
Deep Discovery Suspect Communication
Attacker Behavior
35
36. Threat Analyzer
Custom Sandbox Simulation & Analysis
• Tracking of malicious actions &
events
• Detection of malicious destinations
and connections to C&C servers
• Specific detection rules for Office,
PDF and Flash docs
• General detection rules for all
executables
• Exportable reports & PCAP files
Fully Customizable Attack Surface using standard VMware tools
- Operating system, Office version, Service Packs
- Browsers and standard applications
- Custom applications
37. Deep Discovery – How It Works
Watch List
Simulate
GeoPlotting
Detect
Correlate
Alerts, Reports,
Out of band feed Evidence Gathering
of all network Detect Malicious
traffic Content &
Communication
Identify Attack Behavior Threat
Connect
& Reduce False Positives
Visibility – Real-time Dashboards
Insight – Risk-based Analysis
Action – Remediation Intelligence
2/6/2013 Confidential | Copyright 2012 Trend Micro Inc. 37
38. Threat Connect
Information Portal
Threat profile: What are the
characteristics, origins and
variants of this malware.
Related IPs/Domains: What are
the known C&C comms for this
attack.
Attack Group/Campaign: Who
and what is behind this threat.
Containment and remediation:
What to look for, how to
remediate and eradicate.
39. Deep Discovery Advisor
Threat Intelligence Center
• In-Depth Contextual Analysis including simulation
results, asset profiles and additional security events
• Integrated Threat Connect Intelligence included in
analysis results
• Enhanced Threat Investigation and Visualization
capabilities
• Highly Customizable Dashboard, Reports & Alerts
• Centralized Visibility and Reporting across Deep
Discovery Inspector units
Threat Connect
Intelligence
40. Deep Discovery Advisor
Completing the Custom Defense Lifecyle
Deep
Discovery
Inspector Detect
Deep Discovery Analyze
Advisor
Adapt
Advanced
Protection
Forensics, Respond
Containment,
Solutions Remediation
Security
Updates
41. Why Deep Discovery
Detection Intelligence
• Beyond MSFT & sandboxing • Smart Protection Network
– Mobile, Mac, … & Researchers
• Custom sandboxing • Threat Connect Portal
• Beyond malware
– Attacker behavior, lateral movement, …
TCO The Bigger Picture
• Single appliance • Custom Defense Solution
• Flexible form factors • Services & strategic value
• Competitive pricing • Trend commitment to customer
success
Visibility
Insight
Control
Deep Discovery
2/6/2013
43. Acrodex/ Public Sector
Edmonton, February 2013
Jamie Haggett (@jhaggett)
Global Architect – Enterprise Mobility
Empowering the Mobile Workforce
in the Age of Consumerization, Cloud and Cyber Threats
Copyright 2012 Trend Micro Inc.
44. 1 Million Users
9
Days
9
Months
9
Years
Source: ReadWriteWeb, March 2012
46. Hard Drive
2000
Windows MS Office LAN
PC + Email + File
Server
+ Dialup
Windows LAN
Mac VPN
2012
MS Office Hard Drive
iOS
Android
+ Email + Cloud + Wi-Fi
Cellular
VDI Cloud
49. Personal Productivity Impacting
User Expectations and Demands at Work
I want to be …
• Always connected...
• Using the devices and
apps that I like…
• In a way that is fast & easy!
52. • Now it’s personal!
Changing Threat Landscape • Financially motivated
Evolution to Cybercrime • Targeting most valuable
information
CRIMEWARE Mobile
Attacks
DAMAGE CAUSED
Targeted
Attacks
Web
Threats
Intelligent
Botnets
Spyware
Spam
Mass
Worm
Mailers
Outbreaks
Vulnerabilities
2001 2003 2004 2005 2007 2010 2012
53. Collaboration
File/Folder & (SharePoint,
Removable Cloud/Sync) Social
Media Networking
Mobile
Web
Email &
Messaging
Solution: Complete End User Protection
Intrusion Data Loss
Anti-Malware Mobile Security Encryption
Prevention Prevention
Centralized Policy | Simple Administration
54. Trend Micro Mobile Security 8.0
Manage Device Data Protection Mobile Device Application
Management Security Management
• Device Discovery • Encryption Enforcement • Anti-Malware • App Black Listing
• Device Enrollment • Remote Wipe • Firewall • App White Listing
• Device Provisioning • Selective Wipe • Web Threat Protection • App Push
• Asset Tracking • Remote Lock • Call Filtering • Required
• S/W Management • Feature Lock • SMS/WAP Anti-Spam • Optional
• Remote Control • Password Policy • Jail break detection • App Inventory
• Reporting
• Summary Views
Centralized Policy Management – Single Platform
• Summery Reports
Integrates directly into OfficeScan as a Plug in
55. Smart
Real-time protection powered by
innovative solutions, big data analytics
and deep threat expertise
Simple
Specialized solutions that are easy
to deploy and manage
Security That Fits
Seamless integration with your
ecosystem – maximizing
existing investments, COMPLETE DATA CENTER
not replacing them END USER
PROTECTION
CUSTOM
& CLOUD
SECURITY
DEFENSE
56. Secure Your Virtualized
Environment
Protection from
Advanced Persistent
Threats (APTs)
software@acrodex.com
Editor's Notes
We’ll start with virtualization security. Not only does this protect your virtual data centers, but also protects the cloud [click]For companies with virtualization in production, over the next 12 months, the average percentage of servers virtualized will jump from 46 to 63%. Similarly the percentage of desktops that are virtualized will jump from 44 to 63%.[click]As virtualization expands to cover more critical applications and data, effective security becomes even more important. To achieve this, we must first understand the security challenges specific to virtual environments.
Your data center is evolving. Most of you are already well on your journey to the cloud, likely still maintaining some physical servers, but transitioning many of these to virtual machines, and even leveraging some resources in a private, public or hybrid cloud environment.Virtual servers are already outpacing physical ones, and Gartner predicts that in a few short years 71% of server works loads will be virtualized.From our cloud survey: If using virtualization in pilot or production, also using private or public cloud (over 60%)We know that virtualization and cloud hold great promises.Embracing these new environments enables you to…Lower capital and operational costs -- consolidating the number of servers used and turning on VMs only as the business demands itIncreased business agility – offering new services quickly and easily…even firing up a whole new environment on Amazon, for example, in a matter of minutesInstant scalability – turning on and off VMs as requiredAnywhere, anytime access – offering business services to your users who are in the office, at home or on a mobile device
More than half of the respondents indicated that apprehension over security is a key reason holding back their adoption of cloud technique and that shared storage is vulnerable without encryption.More than half expressed more willingness to consider using the cloud if cloud providers took a more hands on approach to securing data or if they knew more about how to secure their data in the cloud.But just because the data center is evolving to include new platforms doesn’t mean the threat landscape is changing—we still have threats like data-stealing malware, targeted attacks, botnets, and more. Security concerns are the #1 barrier to adoption of virtual and cloud.Exploits are happening faster than patches are available. Zero-day vulnerabilities are now our reality.With an ever-changing threat landscape, how can you be sure that your servers and virtual machines have not been altered…have not been turned on in a virtual environment without the right patches in place?And if you do put security agents in place on the VMs, how do you maintain performance?Moving into the cloud has huge advantages of agility, but one of the biggest issues is the loss of visibility…the loss of control over your resources, your data. And if you are in a cloud environment, especially one that is multi-tenant, how sure are you that your data is for your eyes only?With so many parts in this environment, it stands to reason that integrated security is needed across all of three of these platforms to defend against these threats, and to achieve the lower cost/higher agility promise of virtualization and cloud.
Survey data shows us that IT departments spend one third of their time doing patching. Yet three quarters of them are simply not satisfied with their existing patch management solution. Why is that? All software is created by humans and to err is human.There were 2095 critical vulnerabilities in 2010 (according to the National Vulnerability Db)Even in vendors come out with patches for these bugs, there are simply too many patches for enterprises to keep up with. Microsoft security intelligence report from this year says that less than one percent of all attacks and infections were due to zero-day attacks. That means companies are simply not patching enough.
And our strength in virtualization has furthered our leadership in overall server security.We were recognized by Network World magazine as being the clear choice winner for virtualization security.As well, we are the only Enterprise Class security solution, and the only agentless solution for Vmware, validated on Cisco UCS.And finally we were the first content security provider to be certified on VCE Vblcok in April 2012
This rapid adoption of mobile devices is also affecting the adoption of consumer-friendly applications. For example, it took AOL 9 years to get to 1 million users…9 months to do the same for Facebook…but only 9 DAYS for DrawSomething!!How is this rapid adoption changing our landscape from an IT perspective?
This chart shows the platforms that have shipped over the past 35 years or so.Not surprisingly, this growth of mobile devices is changing our landscape forever.<click to show first bubble>Only 15 years ago, there was really only one dominant platform to support. Windows on the PC. And maybe some Mac as well.<click for second bubble>Now, with the rapid adoption of new technologies, mobile devices now outsell PCs. And we are about to see an individual mobile platform (Android) to overtake the PC.<click to zoom>And these mobile devices are not just for home use. The global install base of tablets, for example, will be 760 million by 2016, with 375 million sold just in that year. And according to Forrester, one third of them will be sold to businesses. This platform evolution will change your jobs in IT irreversibly.
Remember when your environments looked like this…? Maybe you had some Macs too. Maybe some additional productivity apps…but overall it was pretty consistent.With the changes in technology and the pressure to support the changing demands of the users, the new reality looks like this…
Let’s talk about how this changing landscape has affected you.As Risk and Security leaders in this fast-paced world, you can no longer afford to react to business requests; you are proactively transforming the business, empowering users to take full advantage of this strategic information … while effectively managing the risk involved in the feeding and caring of this information
Let’s talk more about Consumerization – the business benefits and concerns you may have – and how Trend can help you empower the business while managing the risks involved
Consumerization isn’t just about BYOD, it is about changing user expectations. People want to be able to use the same mobile, collaboration and social networking tools that they use in their personal lives when they’re at work too. They want the same familiar, easy, fast devices and applications at work.
Let’s consider the dynamics of mobile devices as they not only present the complication of additional platform support, but they are also accelerating the adoption of many of these cloud apps.First, mobile devices and apps, while super convenient, can leak sensitive data. An action that might be natural to do in our personal lives can put sensitive corporate and customer information at risk! Mobile devices and apps are prime targets for data-stealing malware, socially engineered and more advanced attacks.And…of course this data is at risk if the device is left on an airplane or stolen. More than ever, we’re seeing mobile devices lost and stolen.10% of laptopswill be lost or stolen 12,000/week in US airports1Data not protected on 2/3 of laptops 2Lost laptops the number one cause of a data breach.Removable Media loss is escalating51% store confidential information on USBs39% have lost themAirports: : Ponemon (sponsored by Dell), 2008: Airport Insecurity: The case of Missing & Lost Laptops2/3 Laptops: Worldwide Endpoint Encryption 2010 – 2014 Forecast : Data Security for EveryoneLost laptops
And with the freedom of a mobile device, it is easy to see why some employees may mistakenly share a confidential document with others outside the organization.The separation of personal and corporate information is a valid concern.
The threat environment has evolved over the years. All of these threats still exists out there, but new and more damaging threats are being developed each year. Now, we are dealing with targeted attacks, advanced persistent threats and creative mobile attacks that take advantage of new vulnerabilities, social engineering and mobile proximity.They are stealthy and are designed to fly under the radar, undetected, and to steal your valuable data. And your data is everywhere--in the cloud, on virtualized servers, and on mobile devices. It needs to be protected, w/out slowing you downStreet crime is down 20%. Why? It is becoming so much more profitable and lucrative to enter into the world of cybercrime. And it is getting easier.Cyber criminals use a seemingly endless array of techniques to compromise and infiltrate nearly every aspect of our electronic environment. As our lives, and for that matter, the entire global economy, have become increasingly dependent on Web-based systems and interconnectivity to operate smoothly, cyber-attacks have emerged to stalk us nearly every step of the way. In fact, they’ve grown so complex and varied that traditional IT system defenses such as antivirus (AV) software and intrusion prevention systems (IPSs) are not enough on their own. Cybercrime has become big business with commercialized exploit kits and cybercriminal counter intelligence available to the hackers. This has greatly accelerated the volume, variety and velocity of threats we are dealing with.There are specific emerging trends in cyber-attack: Professionalization and Commoditization of Exploit Kits. i.e. BlackHole Exploit Kit Modularization: We have also observed a high degree of modularization in more advanced malware like SpyEye and FLAME. Increased Sophistication with Traffic Direction Systems (TDS): Traffic Direction Systems (TDS) are used as initial landing pages, also known as “doorway pages”, which direct traffic to content. RansomwareNew Exploitation Vectors Introduced via HTML5 •Evolution of Mobile ThreatsContinued Exploitation of Social Networks As these threats evolve, it is clear that traditional techniques won’t be able to prevent all threats. Additional layered security and specialized visibility into these attacks is needed.
The nice thing is that wherever you are on that spectrum, we can support you. Consider the range of activities that users engage in every day? Email, web, mobile access, saving files to disk or USB, collaboration over SharePoint or cloud-based service, and of course Facebook.How can you be sure that all of these activities, devices and data are protected at all times?<click>Our solution is designed to provide complete end user protection – essentially providing protection for all end user activities.Our solution enables you deploy a centralized policy so that you can ensure consistent enforcement across all user activities. And, we provide a single console to administer all endpoints, making it faster and easier for you to manage security for users on their laptops, desktops or mobile devices.<click>With a plug and play architecture, we provide all of the essential capabilities you need to protect your users, their devices, their applications and data.We deliver market leading anti-malware, protecting users from viruses, spam, malicious file attachments and moreTo help you address concerns with mobile devices, we have complete Mobile Security integratedas part of our endpoint solution. This enables you to manage and secure devices (whether these are corporate or employee-owned), mobile applications and data. For example, devices can be seamlessly enrolled and managed. They can be remotely located and wiped to reduce risk of lost devices. Applications can be vetted and pushed out to secure and devices to ease distribution.Intrusion prevention protects against vulnerabilities – essentially offering you virtual patching against new, yet-to-be-addressed exploits Data Loss Prevention (DLP) is fully integrated into the solution making it MUCH easier to deploy than other offerings, and automatically preventing sensitive information from leaking out of the organization via email or removable media.Encryption protects sensitive information on users’ desktops, removable media, in email and more, making it easier to comply with most regulations.With our Complete End User Protection, all user activities are safeguarded, reducing risk of sensitive information loss. ____________________________________________________________________More specifically on mobile <if you want to go into details or pick out example features>:Mobile Device ManagementDevice DiscoveryDevice EnrollmentDevice ProvisioningS/W ManagementRemote ControlReportingInventory Man.Remote LocateSummary ViewsData ProtectionEncryption EnforcementRemote WipeSelective WipeRemote LockSIM Change/ WatchFeature Control / LockPassword PolicyMobile Device SecurityAnti-MalwareFirewall Web Threat Protection Call FilteringSMS/WAP Anti-SpamJail break detectionApplication ManagementApp Black ListingApp White ListingApp PushRequiredOptionalApp Inventory Mobile Device Management
Why do WE think YOU should choose Trend Micro for your toughest security challenges???Our solutions are Smart, Simple and provide Security that Fits!Our solutions are Smart –providingreal-time protection powered by innovative solutions, big data analytics and 1200 threat researchers.Our team of experts is 100% focused on security. It is in our DNAOur solutions are Simple – with specialized solutions open and scalable easy to deploy and manageWe deliver Security that Fits – our solutions fit seamlessly with your ecosystem TODAY and in the FUTURE – helping you maximize your existing investments, not replace them. Please come visit our experts at our solution showcase to learn more about our solutions and how they will help you tackle the latest issues surrounding Consumerization, Virtualization and Cloud, or advanced cyber threats.Thank you!