3. Kuinka teemme
Keitä olemme
Globaali markkinajohtaja konesalien
tietoturvaratkaisuissa fyysisille,
virtuaalisille ja pilviympäristöille
1,300 tietoverkon uhkien torjuntaan
erikoistunutta asiantuntijaa ympäri
maailman; 1,500 tuotekehitysinsinööriä
Eva Chen: toimitusjohtaja & perustaja
Innovatiiviset tietoturvaratkaisut –
kyberuhkat, kuluttajistuminen ja
pilvipalvelut
400 milj. dollaria ja 500 asiantuntijaa
investoitu viimeisen 4 vuoden aikana
pilvipohjaisten tietoturvaratkaisuiden
kehittämiseen
Mitä teemme
Suojaa yritysten ja kuluttajien
digitaalista tiedonjakoa kohdennetuilla
turvallisuus- ja uhkienhallintaratkaisuilla.
Global Threat Intelligence
Perustamisvuosi:
1988
Toimipisteitä:
36
Työntekijöitä:
5000+
Liikevaihto (2012):
$1.2B USD
Kassavarat:
$1.9B USD
Liikevoittoprosentti:
24 %
Pääkonttori:
Tokio
Trend Micro on maailman suurin riippumaton tietoturvaratkaisujen toimittaja
Copyright 2013 Trend Micro Inc.
4. Innovatiiviset tietoturvaratkaisut
Panostus innovaation on näkynyt läpi Trend Micron historian ja jatkuu
vahvana myös tulevaisuudessa!
PLATFORM EVOLUTION
1st in Notebook
Security
1st LAN Server
Security
1995
Copyright 2013 Trend Micro Inc.
1st Gateway
Security
1st integrated
Virtualization
Security
1st Cloud
Computing
Security
1st Comprehensive
Mobile App.
Reputation
Technology
1st Threat
Management
Solution Network
2013
5. Palvelinturvallisuuden markkinajohtaja
Trend Micro
31%
Top ratings for
Virtualization Security
Source: IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013
Copyright 2013 Trend Micro Inc.
6. Älykäs suojaus
pohjautuu globaaliin
tutkimustietoon
• Email reputation
• File reputation
• Web reputation
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Copyright 2013 Trend Micro Inc.
•
•
•
•
•
•
•
Whitelisting
Network traffic rules
Mobile app reputation
Vulnerabilities/Exploits
Threat Actor Research
Enhanced File Reputation
Enhanced Web Reputation
CLOUD BASED
GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN
GLOBAL THREAT
INTELLIGENCE
NOW!
13. • Kattava suojaus
• Yksi jaettu alusta & hallinta
• Optimoitu virtualisoituihin ja/tai
pilviympäristöihin
Security
Data Center Ops
Copyright 2013 Trend Micro Inc.
Since 1988, Trend Micro has pioneered innovative technologies and security services that protect users against threats that target new and emerging platforms and devices. Each beneficial shift in the way people communicate and conduct business online has introduced new security challenges. Trend Micro has been there from the start, being the first to extend threat protection from the desktop to the server and then to the Internet gateway. And as mobility, virtualization, and cloud computing are enabling people to share digital information more easily, more quickly, and more affordably, Trend Micro continues to innovate with data encryption, agentless security for virtual and cloud environments, as well as mobile app reputation technology.
And our strength in virtualization has furthered our leadership in overall server security, as recognized for multiple years by IDC.We have the first enterprise-class security product validated on Cisco UCS (a Unified Computing System), and in April 2012 we were also the first content security solution certified on VCE Vblock (a seamlessly integrated compute, network and storage solution) – both designed to accelerate deployment of a new-age data center.And VMWare has recognized our strong integration by awarding Trend Micro the Technology Alliance Partner of the Year (in 2011).
At Trend, we believe that Smart Protection begins with global threat intelligence. When Trend first began, we delivered signature-based anti-virus, protecting against virus-based threats, worms and other malware. <click>Recognizing the increase in the velocity and variety of threats, we were the first to deliver cloud based global threat intelligence, called the Smart Protection Network, in 2008, It delivers faster protection for email, web, and file based threats. <click>Since that time we have been continuously evolving the Smart Protection Network in response to a much more sophisticated and changing threat landscape. Now we offer big data analytics driven global threat intelligence, providing a much broader range of protection.And our global threat intelligence is integrated into all our solutions, from consumer to enterprise.
Our portfolio of solutions, all powered by the Smart Protection Network, enables you to best empower your business while efficiently mitigating against the growing risks you are facing.This is Smart Protection.
We help you address all these risks with our Complete End User Protection solution, the risks from traditional activities and the newer ones introduced through consumerization.With a plug and play architecture, we provide all of the essential capabilities you need to protect your users, their devices, their applications and data.We deliver market leading anti-malware, protecting users from viruses, zero-day exploits, bad web URLs, malicious file attachments and moreContent Filtering protects the productivity of your users, filtering away annoying spam and enabling you to restrict users from visiting undesirable web sites Data protection, includes Data Loss Prevention (DLP) to automatically prevent sensitive information from leaking out of the organization via email or removable media as well as Encryption to protect sensitive information on users’ desktops, removable media, in email and more – both of which make it easier to comply with most regulations.Device management allows you to easily provision and manage devices, including corporately or personally owned mobile devicesAnd Application Control enables you to determine which applications should be available to users across their workspace<click>And all of our solutions leverage our cloud-based global threat intelligence called Smart Protection Network, that provides real-time threat protectionWith our Complete End User Protection, all user activities are safeguarded, reducing risk of sensitive information loss. From the IT and Security perspective, they are happy as this solution protects the user across any device, any application, anywhere.
Our solution provides a unified dashboard making it easy to understand security status across the enterprise. It also includes centralized policy management that makes it easier to configure and maintain security across the endpoints, devices and gateways And our Risk-based health status that provides better, more meaningful visibility into the status of security across the solution
To address these targeted attacks and advanced persistent threats, we offer a Custom Defense solution.Similar to the other solutions we’ve discussed, we offer a range of capabilities designed to enable you to not only detect and analyze these attacks, but fight back against your attackers.At the heart of the Custom Defense solution is a specialized threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications and attacker behaviors that are invisible to standard security defenses. The Custom sandboxes run suspect code in a safe, controlled environment that can be optimized for performance and configured to evade hacker techniques that are on the lookout for sandboxing solutions. Upon detection, the Custom Defense solution best enables organizations to analyze the risk, origin and characteristics of the attack, and uniquely delivers actionable intelligence that guides the organization on how to contain and remediate the attack, correlating the attack with our global threat intelligence, the Smart Protection NetworkTo immediately adapt and strengthen protection against further attacks, the Custom Defense solution automatically updates the global threat intelligence network and issues these custom security updates to Trend Micro gateway, endpoint and server enforcement points.Finally, you can also leverage the threat tools and specialized expertise from Trend Micro to deal with these attacks.
Here’s an example of the advanced threat analytics possible with this solution – providing in-depth, actionable intelligence about the attack and the attackers
To address the risks of evolving your data center, we have a single platform and administration that secures your physical, virtual and cloud environments.Our solution is open, automated and highly scalable, fitting your existing infrastructure, seamlessly integrating with key applications like VMware or cloud environments like Amazon Web Services.Like our end user protection solution, this solution is plug-and-play in nature – allowing you to extend and grow your solution as your business needs change.Block and remove malicious software with Anti-Malware.Protect against known and zero-day vulnerabilities with Intrusion Prevention. This provides you with “virtual patching” -- protecting you before you patch.Achieve segmentation of systems and reduce the attack surface with a host-based Firewall.Identify expected and unexpected (malicious) system changes with Integrity Monitoring.Gain additional visibility and correlation of system and application events with Log Inspection. This can be integrated with your existing SIEM for further insight.Protect sensitive data, particularly when using cloud service providers with Encryption.<click>And just like our other solutions, it is powered by our Smart Protection Network, protecting against real-world threats faster.Our Cloud and Data Center Solution protects you on your journey to the cloud – now and in the future.
This solution provides comprehensive protection through a single platform and administration.It is truly optimized for virtual and cloud environments… In a VMWare environment, the essential capabilities are provided in a way that automatically protects each VM without requiring dedicated software for each VM. This is called “agentless” security. This approach maximizes security without compromising efficiency.This solution is also optimized for Amazon Web Services, enabling you to automatically apply the appropriate security as you spin up new instances.