SlideShare a Scribd company logo
Trend Micro
Securing Your Virtual World

 Mihai Butu, Territory Sales Manager SEEUR
 Ondrej Kovac, Technical Sales Engineer EMEA
                                Copyright 2011 Trend Micro Inc.
Security That Fits
Trend Micro innovation enables benefits of next-generation IT platforms


                                                                                                       Founded in United States in
                                                                                           1st Cloud   1988; Headquarters in
                                                                  1st Integrated           Computing   Tokyo, Japan
                                                                  Virtualization           Security
                                              1st in
                                                                  Security
                                              Netbooks
                                              Security
                                 1st Threat                                                            Employees: 4,846;
                                 Management
                   1st Gateway   Solution
                                 (Network)                                                             Locations: 29 Offices
                   Security
                                                                                                       Worldwide
        1st LAN
        Server
        Security                                                                                       > $1 Billion Annual Revenue
                                                                                                       > $1.7 Billion Total Assets

                                                                                                       #1 in Virtualization &
                                                                                                       Corporate Server Security

                                                                                                       Top 3 in Messaging, Web
                                                                                                       and Endpoint Security


                                                                                                       A Leader in Cloud Security



                                                         Copyright 2011 Trend Micro Inc.
Security That Fits
     Trend Micro’s real-world protection validated by third-party test labs
     The Smart Protection Network infrastructure stops threats
     in the cloud, before they reach you
                                            New unique samples added to AV-Test's malware repository (2000-
                                                               Consumer Consumer  Corporate SMB        Consumer
                                            Corporate
                                            products
                                                     Corporate
                                                     products  products
                                                                        2010)
                                                                        products  products  products   products
                                            Jun 2010*1                 Jun 2010*1          Jul 2010*3              Sep 2010*4             Oct 2010*2             Oct 2010*2            Dec 2010*3
3.5 NEW                20,000,000
Threats Every
   Second                    1
                       18,000,000                                                                                                                                                                                  Dec
                             2
                       16,000,000                                                                                                                                                                                  Nov

Blocking                     3                                                                                                                                                                                     Oct
                       14,000,000
 Blocking
Billions of                                                                                                                                                                                                        Sep
Threats of
Billions                     4
 Threats
                       12,000,000                                                                                                                                                                                  Aug
Daily
                          Ranking




    Daily                    5                                                                                                                                                                                     Jul
                       10,000,000
                             6                                                                                                                                                                                     Jun
#1                      8,000,000
                                                                                                                                                                                                                   May
Real-world                   7
    #1
Online                  6,000,000                                                                                                                                                                                  Apr
Real-world
Testing                      8
  Online                                                                                                                                                                                                           Mar
                        4,000,000
 Testing                                                                                                                                                                                                           Feb
                             9                       4,040,017,176                                    39,408,960                                      5,751,120
                        2,000,000                                                                                                                                                                                  Jan
                            10
                                0
                            11                 2000          2001          2002          2003          2004          2005          2006           2007        2008         2009          2010
                                                                       Trend                    Symantec                McAfee                Kaspersky              ESET
                                                                       Micro                         102,736,240
                                                                        *1:http://www.trendmicro.co.jp/protection
                Note: If multiple products from one vendor were         *2:http://www.nsslabs.com/research/endpoint-security/anti-malware/q3-2009-endpoint-protection-group-test-report-socially-engineered-malware.html
                evaluated, then vendor’s vest performance is listed.    *3:http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf
                                                                                                   4,085,177,256
                                                                        *4:http://www.nsslabs.com/research/endpoint-security/anti-malware/consumer-anti-malware-products:-group-test-report-q3-2010.html




                                                                                                                Copyright 2011 Trend Micro Inc.
Trend Micro – Leader in Datacenter Security




- #1 in server security, #1 in virtualization security

- First and only agentless security suite built for virtualization

- First company to offer security for the cloud

- 2011 VMware Technology Alliance Partner of the Year


                                   Copyright 2011 Trend Micro Inc.
Platform-specific Security Risks

Physical                      Virtual                                      Cloud
Manageability                 Performance & Threats                        Visibility & Threats
• Glut of security products   • Security degrades                          • Less visibility
                                performance
• Less security                                                            • More external risks
                              • New VM-based threats
• Higher TCO




Reduce Complexity             Increase Efficiency                          Deliver Agility

                      Integrated Security
                  Single Management Console
                                         Copyright 2011 Trend Micro Inc.
Security Inhibitors to Virtualization

1      Resource Contention                                             3:00am Scan


2         Instant-on Gaps




                                                                              
                                                                       
3   Inter-VM Attacks / Blind Spots



4     Management Complexity




                                     Copyright 2011 Trend Micro Inc.
Trend Micro Deep Security
A server security platform for:


 Physical                   Virtual                                             Cloud




                                Deep Packet Inspection
            Anti-                                                                  Integrity  Log
                     Firewall                        Web App. Application
           malware                IDS / IPS                                        Monitoring Inspection
                                                     Protection Control




                                              Copyright 2011 Trend Micro Inc.
Deep Security 8
Agentless Security for VMware

                Trend Micro Deep Security
Integrates                                Agentless
with                                                              1
                       IDS / IPS                                         VMsafe
vCenter
                                                                         APIs
                       Web Application Protection

                       Application Control                                               Security
                                                                                         Virtual    v
                       Firewall
                                                                                         Machine    S
                                         Agentless                                                  p
                                                                  2
                             Antivirus
                                                                         vShield                    h
                                                                         Endpoint                   e
                                         Agentless
                                                                  3
                                                                                                    r
                      Integrity Monitoring                               vShield                    e
                                                                         Endpoint

                                     Agent-based
                                                                  4
                         Log Inspection
                                                                     Security agent
                                                                     on individual VMs
                                       Copyright 2011 Trend Micro Inc.
Deep Security 8
Agent-based Anti-malware


                  Deep Packet
                                 Firewall
                   Inspection




                       Anti-malware

WEB REPUTATION
  SERVICES                                                        VDI Local Mode
                                                                                   Hyper-V & Xen-based
                   Integrity       Log                                                Virtual Servers
                  Monitoring    Inspection




• New Agent-based form factor extends protection to physical operating
  systems – Windows and Linux
• Agent-based AV also protects Hyper-V & Xen-based virtual servers, and
  virtual desktops in local mode
• Web reputation services through integration with Smart Protection
  Network protects systems/users from access to malicious websites
                                            Copyright 2011 Trend Micro Inc.
Deep Security Architecture
                                                  Deep Security
                  Single Pane                     Manager
                  Scalable
                  Redundant



           1                                                                                                      Threat
                             Reports                                                                              Intelligence
                                                                                                                  Manager
                                                                                          5


                          Deep Security

  2
                          Agent
                                              3                                                   4       SecureCloud


Deep Security                               Deep Security
Agent                                       Virtual Appliance                                          Cloud
                                                                                                    Integration
Modules:
• DPI & FW                                Modules:
• Anti-malware                            • DPI & FW                                          Modules:
• Integrity Monitoring                    • Anti-malware                                      • Data Protection
• Log Inspection                          • Integrity Monitoring



                                                        Copyright 2011 Trend Micro Inc.
Increasing data security


 Servers authentication
  before being granted access
  to sensitive data
 Data is secured using strong
  encryption
 Protecting data at Rest and in
  Motion
 Combination of host-based
  security, encrypted
  data, and strong server
  authentication

                                   Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
How It Works

      Enterprise Datacenter
        or SaaS Offering                 Cloud Service Provider

                                          VM
                                       Corporate                 VM     VM   VM
                                         App

                                                                Hypervisor

                Trend Micro
       SecureCloud Console



                                                            Shared Storage

          Enterprise Key
                                        My Data




                              Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
How It Works
  Key Management                                                          Encryption Support
 Deployment Options
                                                                          VM VM VM VM    vSphere
      Trend Micro                                                                         Virtual
     SaaS Solution                                                                       Machines



                                                                           VM VM VM VM
                                                                                          Private
                                                                                          Clouds

          Or
                          SecureCloud
       Data Center          Console                                        VM VM VM VM    Public
   Software Application                                                                   Clouds




                                        Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
Fitting Into a VMware Ecosystem

 Trend Micro
 SecureCloud                                                        vCloud Director



                                                                    VMware vCloud
                            VMware
                            vSphere

                          Data Center                     Private Cloud        Public Cloud



                     VM VM VM VM                        VM VM VM VM          VM VM VM VM




         Encryption throughout your cloud journey—
         data protection for virtual & cloud environments
                                  Copyright 2011 Trend Micro Inc.
Deep Security 8: Key benefits
 Provides layered defense                                                                 Supports more PCI
  against sophisticated attacks                                                             DSS 2.0, NIST, HIPAA
                                                                                            & other regulations
 Shields against known and
  unknown vulnerabilities Prevents Data                                                         Detailed reports
                            Breaches &                    Enables                                document
 Monitors system and                                     Compliance                             prevented attacks
                            Business
  hypervisor integrity                                                                           & compliance
                            Disruptions
                                                                                                 status
 Web reputation
  prevents malicious
  website access

                                     Supports
    Prioritize secure
                                     Operational
     coding efforts                                                                       Agentless architecture
                                     Cost                                                  accelerates realize
         Manage unscheduled         Reductions                                            virtualization savings
          patching
                                                                                Integration to enterprise platforms &
         Cloud-based event whitelisting &                                       apps lowers costs
          Trusted events simplify FIM mgmt
                                             Copyright 2011 Trend Micro Inc.
Thank you
                              for your attention!
Mihai_butu@trendmicro.com
Ondrej_kovac@trendmicro.com
                               Copyright 2011 Trend Micro Inc.

More Related Content

What's hot

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
Trend Micro (EMEA) Limited
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
CTI Group
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
VSD infotech
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
Djadja Sardjana
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
Zsolt Nemeth
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
Marketing Network marcus evans
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
eircom
 

What's hot (20)

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 

Viewers also liked

Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztWie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztDigicomp Academy AG
 
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
Andrew Wong
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Rahul Neel Mani
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
UNIT4 IT Solutions
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
Mark Nunnikhoven
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep security
Mark Nunnikhoven
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
Amazon Web Services
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 

Viewers also liked (13)

Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztWie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
 
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 

Similar to Trend Micro - 13martie2012

IT FUTURE 2011 - Symantec
IT FUTURE 2011 - SymantecIT FUTURE 2011 - Symantec
IT FUTURE 2011 - Symantec
Fujitsu France
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
AT Kishore
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
CloudExpoEurope
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
WP101 Fundamental Principles of Network Security
WP101   Fundamental Principles of Network SecurityWP101   Fundamental Principles of Network Security
WP101 Fundamental Principles of Network SecuritySE_NAM_Training
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp
 
IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'Intel
Fujitsu France
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
Jim Kaskade
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
vFS3 - Detailed Agenda
vFS3 - Detailed AgendavFS3 - Detailed Agenda
vFS3 - Detailed Agenda
v-FS3 Industry Models User Group
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing pointsouthmos
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DX
masaaki murakami
 

Similar to Trend Micro - 13martie2012 (20)

IT FUTURE 2011 - Symantec
IT FUTURE 2011 - SymantecIT FUTURE 2011 - Symantec
IT FUTURE 2011 - Symantec
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
WP101 Fundamental Principles of Network Security
WP101   Fundamental Principles of Network SecurityWP101   Fundamental Principles of Network Security
WP101 Fundamental Principles of Network Security
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
 
IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'Intel
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
vFS3 - Detailed Agenda
vFS3 - Detailed AgendavFS3 - Detailed Agenda
vFS3 - Detailed Agenda
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing point
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DX
 

More from Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
Agora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
Agora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
Agora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
Agora Group
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
Agora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
Agora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
Agora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
Agora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
Agora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
Agora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

More from Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Trend Micro - 13martie2012

  • 1. Trend Micro Securing Your Virtual World Mihai Butu, Territory Sales Manager SEEUR Ondrej Kovac, Technical Sales Engineer EMEA Copyright 2011 Trend Micro Inc.
  • 2. Security That Fits Trend Micro innovation enables benefits of next-generation IT platforms Founded in United States in 1st Cloud 1988; Headquarters in 1st Integrated Computing Tokyo, Japan Virtualization Security 1st in Security Netbooks Security 1st Threat Employees: 4,846; Management 1st Gateway Solution (Network) Locations: 29 Offices Security Worldwide 1st LAN Server Security > $1 Billion Annual Revenue > $1.7 Billion Total Assets #1 in Virtualization & Corporate Server Security Top 3 in Messaging, Web and Endpoint Security A Leader in Cloud Security Copyright 2011 Trend Micro Inc.
  • 3. Security That Fits Trend Micro’s real-world protection validated by third-party test labs The Smart Protection Network infrastructure stops threats in the cloud, before they reach you New unique samples added to AV-Test's malware repository (2000- Consumer Consumer Corporate SMB Consumer Corporate products Corporate products products 2010) products products products products Jun 2010*1 Jun 2010*1 Jul 2010*3 Sep 2010*4 Oct 2010*2 Oct 2010*2 Dec 2010*3 3.5 NEW 20,000,000 Threats Every Second 1 18,000,000 Dec 2 16,000,000 Nov Blocking 3 Oct 14,000,000 Blocking Billions of Sep Threats of Billions 4 Threats 12,000,000 Aug Daily Ranking Daily 5 Jul 10,000,000 6 Jun #1 8,000,000 May Real-world 7 #1 Online 6,000,000 Apr Real-world Testing 8 Online Mar 4,000,000 Testing Feb 9 4,040,017,176 39,408,960 5,751,120 2,000,000 Jan 10 0 11 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Trend Symantec McAfee Kaspersky ESET Micro 102,736,240 *1:http://www.trendmicro.co.jp/protection Note: If multiple products from one vendor were *2:http://www.nsslabs.com/research/endpoint-security/anti-malware/q3-2009-endpoint-protection-group-test-report-socially-engineered-malware.html evaluated, then vendor’s vest performance is listed. *3:http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf 4,085,177,256 *4:http://www.nsslabs.com/research/endpoint-security/anti-malware/consumer-anti-malware-products:-group-test-report-q3-2010.html Copyright 2011 Trend Micro Inc.
  • 4. Trend Micro – Leader in Datacenter Security - #1 in server security, #1 in virtualization security - First and only agentless security suite built for virtualization - First company to offer security for the cloud - 2011 VMware Technology Alliance Partner of the Year Copyright 2011 Trend Micro Inc.
  • 5. Platform-specific Security Risks Physical Virtual Cloud Manageability Performance & Threats Visibility & Threats • Glut of security products • Security degrades • Less visibility performance • Less security • More external risks • New VM-based threats • Higher TCO Reduce Complexity Increase Efficiency Deliver Agility Integrated Security Single Management Console Copyright 2011 Trend Micro Inc.
  • 6. Security Inhibitors to Virtualization 1 Resource Contention 3:00am Scan 2 Instant-on Gaps   3 Inter-VM Attacks / Blind Spots 4 Management Complexity Copyright 2011 Trend Micro Inc.
  • 7. Trend Micro Deep Security A server security platform for: Physical Virtual Cloud Deep Packet Inspection Anti- Integrity Log Firewall Web App. Application malware IDS / IPS Monitoring Inspection Protection Control Copyright 2011 Trend Micro Inc.
  • 8. Deep Security 8 Agentless Security for VMware Trend Micro Deep Security Integrates Agentless with 1 IDS / IPS VMsafe vCenter APIs Web Application Protection Application Control Security Virtual v Firewall Machine S Agentless p 2 Antivirus vShield h Endpoint e Agentless 3 r Integrity Monitoring vShield e Endpoint Agent-based 4 Log Inspection Security agent on individual VMs Copyright 2011 Trend Micro Inc.
  • 9. Deep Security 8 Agent-based Anti-malware Deep Packet Firewall Inspection Anti-malware WEB REPUTATION SERVICES VDI Local Mode Hyper-V & Xen-based Integrity Log Virtual Servers Monitoring Inspection • New Agent-based form factor extends protection to physical operating systems – Windows and Linux • Agent-based AV also protects Hyper-V & Xen-based virtual servers, and virtual desktops in local mode • Web reputation services through integration with Smart Protection Network protects systems/users from access to malicious websites Copyright 2011 Trend Micro Inc.
  • 10. Deep Security Architecture Deep Security Single Pane Manager Scalable Redundant 1 Threat Reports Intelligence Manager 5 Deep Security 2 Agent 3 4 SecureCloud Deep Security Deep Security Agent Virtual Appliance Cloud Integration Modules: • DPI & FW Modules: • Anti-malware • DPI & FW Modules: • Integrity Monitoring • Anti-malware • Data Protection • Log Inspection • Integrity Monitoring Copyright 2011 Trend Micro Inc.
  • 11. Increasing data security  Servers authentication before being granted access to sensitive data  Data is secured using strong encryption  Protecting data at Rest and in Motion  Combination of host-based security, encrypted data, and strong server authentication Copyright 2011 Trend Micro Inc.
  • 12. Trend Micro SecureCloud How It Works Enterprise Datacenter or SaaS Offering Cloud Service Provider VM Corporate VM VM VM App Hypervisor Trend Micro SecureCloud Console Shared Storage Enterprise Key My Data Copyright 2011 Trend Micro Inc.
  • 13. Trend Micro SecureCloud How It Works Key Management Encryption Support Deployment Options VM VM VM VM vSphere Trend Micro Virtual SaaS Solution Machines VM VM VM VM Private Clouds Or SecureCloud Data Center Console VM VM VM VM Public Software Application Clouds Copyright 2011 Trend Micro Inc.
  • 14. Trend Micro SecureCloud Fitting Into a VMware Ecosystem Trend Micro SecureCloud vCloud Director VMware vCloud VMware vSphere Data Center Private Cloud Public Cloud VM VM VM VM VM VM VM VM VM VM VM VM Encryption throughout your cloud journey— data protection for virtual & cloud environments Copyright 2011 Trend Micro Inc.
  • 15. Deep Security 8: Key benefits  Provides layered defense  Supports more PCI against sophisticated attacks DSS 2.0, NIST, HIPAA & other regulations  Shields against known and unknown vulnerabilities Prevents Data  Detailed reports Breaches & Enables document  Monitors system and Compliance prevented attacks Business hypervisor integrity & compliance Disruptions status  Web reputation prevents malicious website access Supports  Prioritize secure Operational coding efforts  Agentless architecture Cost accelerates realize  Manage unscheduled Reductions virtualization savings patching  Integration to enterprise platforms &  Cloud-based event whitelisting & apps lowers costs Trusted events simplify FIM mgmt Copyright 2011 Trend Micro Inc.
  • 16. Thank you for your attention! Mihai_butu@trendmicro.com Ondrej_kovac@trendmicro.com Copyright 2011 Trend Micro Inc.

Editor's Notes

  1. Today’s threat landscape is about volume and profit with the majority of threats coming from the Web. Cybercriminals are releasing 3 new threats every second in order to avoid detection. This shift is putting pressure on all vendors to improve their ability to source, analyze and provide protection from new threats faster than ever before. Their goal is to steal data and data is now everywhere – which means protection has to secure networks, endpoints, remote devices, data centers and virtualized environments. [Click to advance to Threat Tracker slide] At Trend Micro, we’ve spend the last 6 years developing our Smart Protection Network cloud-client infrastructure and we own all the technology. It sources threats from millions of sensors, honeypots, customers and partners around the world in order to gather the latest threat intelligence. The Smart Protection Network is integrated into all of our solutions and TrendLabs researches analyze terabytes of threat data every day. By correlating this information across multiple threat vectors – email, file and Web, we are able to provide proactive protection faster than anyone else in this industry. It’s blocking billions of threats every dayThe Smart Protection Network provides the latest protection immediately to all of our customers around the globe, no matter where they connect. How well is this working? [Click to bring up Labs results] Trend Micro consistently dominates in real-world tests from multiple labsReal-World tests evaluate a product's ability to detect threats coming from the Internet in real-time, whether they arrive in the form of a URL hosting malicious content, an email with a malicious link, or an infected file. (TrendLabsSM identified 92% of threats come from the Internet). Unlike traditional static detection testing which only detects infected files after they've landed on your computer, Real-World tests provide a more realistic assessment of the efficacy of security solutions today. They introduce the threat in its original form and allow multiple layers of protection to identify and block the attack. Trend Micro products, cloud-powered by the Trend Micro™ Smart Protection Network™, are proven by multiple testing labs to protect better than our competition.