SlideShare a Scribd company logo
Security Challenges and Solutions for
the Cloud (SaaS) & Cloud Storage
Copyright 2014 Trend Micro Inc.
Richard Ku
SVP, Enterprise and SMB Product and Services
Copyright 2014 Trend Micro Inc. 2
Security Challenges & Solutions
when moving to Cloud.
Ingram Cloud Market Integration
with Trend Micro + Partners
Q & A.
WHO is Trend Micro?
Fact about Trend Micro
 Founded in 1988, $1.2B Revenue (2012)
 Headquarter in Japan, Tokyo Exchange Nikkei Index,
Symbol 4704
 Largest Security focused company world wide
 Over 5200 Employees, 38 Business Units
37%Consumer
12%Small Business
13%
Midsize
Business
38%Enterprise & VLE
500k commercial customers;
9% of them in APAC.
Largest Security company
outside U.S.
Copyright 2014 Trend Micro Inc. 3
1st
LAN Server
Security
1st
Gateway/Mail
Security
1st
Threat
Management
Solution
1st
In Netbook
Security
1st
Integrated
Virtualization
Security
1st
Cloud
Computing
Security
1st
Comprehensive
Mobile App
Reputation
Technology
Innovation leadership
1995 2013
Copyright 2014 Trend Micro Inc.
Copyright 2014 Trend Micro Inc.
CENTRALIZED VISIBILITY & CONTROL
More then just an
antivirus company
Device Control
DLP
Encryption
Behavior
Monitoring
Vulnerability
Shielding
Social Engineering
Attack Protection
Memory
Inspection
Command &
Control Blocking
File
Reputation
Web
Reputation
Email
Reputation
Web Gateway
Email Gateway
or Server
1.4B in
Sept 2014
Malware
Sandbox
Application
Whitelisting
Office 365
SharePoint
Server
Investigation
Network
Inspection
300M in
Sept 2014
nspection
Application
Scanning
Market Leadership Position
Copyright 2014 Trend Micro Inc. 7
• Magic Quadrant for Endpoint Protection
Platforms, Gartner, January 2014
• http://www.av-test.org (Sept 2013 – Feb
2014 test results, Corporate Solutions on
Win XP,7 , 8 Systems)
#1 in protection and
performance
A “Leader” in the MQ
for Endpoint Protection
12 consecutive years
• IDC, Worldwide Endpoint Security
2014-1018 Forecast and 2013
Vendor Shares, August 2014
• expertON Group, Cloud Vendor
Benchmark, June 2014
• 2014 NSS Labs Breach Detection Tests
#1 in protection and
performance
• Canalyst Research
Global market leader in SMB
Content Security 3 years running
- 2011, 2012, 2013
• http://www.av-test.org (Sept
2013 – Feb 2014 test results,
Corporate Solutions on Win
XP,7 , 8 Systems)
100% of the
top 10 automotive
companies.
96% of the top
50 global
corporations.
100% of the
top 10 telecom
companies.
80% of the top
10 banks.
90% of the top
10 oil companies.
Customers
8Copyright 2014 Trend Micro Inc.
9
A world safe
for exchanging
digital information
Copyright 2014 Trend Micro Inc.
Our Mission: Defending Against Threats
Copyright 2014 Trend Micro Inc. 10
By protecting users against:
• Loss of productivity
• Loss of information
• Loss of identity
ITEmployees
By reducing risk to infrastructure:
• System integrity and availability
• Intellectual property protection
• Network protection
Attackers
Our Strategy
Copyright 2014 Trend Micro Inc. 11
Be the Threat Defense Expert
that adapts quickly to evolving:
• user behavior
• technology and infrastructure
• threat vectors
By leveraging our strengths:
• core competence is anti-threat
• view defense as a strategy
• laser-focused so can best adapt
Copyright 2014 Trend Micro Inc. 12
Security Challenges & Solutions
when moving to Cloud?
Ingram Cloud Market Integration
with Trend Micro + Partners
Q & A
WHO is Trend Micro?
Security and Privacy Concerns
Copyright 2014 Trend Micro Inc. 13
#1 - Consumerization
14Copyright 2014 Trend Micro Inc.
iOS &
Android
PC
A category that did not exist a few years ago
15
#2 - Cloud Applications, SaaS, Storage and File Services
Growth
<10% Cloud Services Providers Offer Enterprise Grade Security Capabilities
and Store Data with-in Jurisdictional Boundaries
#3 - Data No Longer Stored within Organization
Where is
your data?
Who has
access to it?
Do you know
when it’s
accessed?
Copyright 2014 Trend Micro Inc. 16
Data: Every 60 seconds, 1.8 petabytes of data is
created…
Copyright 2014 Trend Micro Inc. 17
1. IBM
2. www.DropBox.com
700,000 files2
278,000 tweets1
204M emails1
CRIMEWARE
DamagecausedbyCybercrime
#4 - Threats
2001 2003 2004 2005 2007 2010
Vulnerabilities
W orm
Outbreaks
Spam
Mass Mailers
Spyware
Intelligent
Botnets
Web
Threats
2011+
Targeted
Attacks
Mobile
Attacks
Confidential | Copyright 2014 Trend Micro Inc.
Copyright 2014 Trend Micro Inc. 19
Security Challenges & Solutions
when moving to Cloud?
Ingram Cloud Market Integration
with Trend Micro + Partners
Q & A
WHO is Trend Micro?
Dynamic
Infrastructure
Dynamic
Infrastructure
Web Mail SharePoint Sync Endpoint
Public Cloud Infrastructure – IaaS, PaaS Public Cloud - SaaS
Private Cloud - Virtualization
DynamicUser
DynamicUser
Customer Hybrid-
Cloud Environment
Dynamic
Infrastructure
Dynamic User
Social Network
Web Mail SharePoint Sync
On Premises + Mobile
Endpoint/
Mobile
Customer approach to cloud
Public Cloud EnvironmentPhysical Environment
Virtual Environment
Private Cloud
IaaS/PaaSSaaS
LAN
Security is a share responsibility when moving
to the cloud
• Facilities
• Physical security
• Network infrastructure
• Virtualization layer
Confidential © 2014 Trend Micro Inc. 22
• Operating system
• Applications
• Data
* Especially on IaaS &
SaaS
Cloud Provider Enterprise Customer
Security Solution in the new Hybrid-cloud
environment
Copyright 2014 Trend Micro Inc. 23
Management
Cloud Security Broker
Cloud Service Provider
Endpoint
OfficeScan/
Worry-Free
Cloud App Security
& Encryption
What should a Cloud (SaaS) Security Solution
has?
Copyright 2014 Trend Micro Inc. 24
Visibility Control
Security, Data
Protection &
Intelligence
End to End
Approaches to Cloud Adoption
Before Office 365, Google Drive, BOX..…
Copyright 2014 Trend Micro Inc. 26
Exchange
Gateway
APT
Protection
Compliance
Inbound email inspected for
zero-day malware
Outbound email scanned
for compliance
Multiple
security layers
Email data controlled by
organization
Network
boundary
OWA
MAPI
EAS
SMTP
APT
Protection
Now with Office 365, Google Drive, Box ……
Copyright 2015 Trend Micro Inc. 27
Included baseline
security lacks controls to
find hidden malware
and zero day threats
Network
boundary
OWA
Outlook
No opportunity
to inspect
External Collaboration + Consumerization Risk
Copyright 2015 Trend Micro Inc. 28
Partners,
Customers
Contractors,
Consultants
Remote
workers
Employees
Two Brand New Services
Copyright 2015 Trend Micro Inc. 29
Trend Micro
Cloud App Encryption Trend Micro
Cloud App Security
Trend Micro Cloud App Encryption
Maintain Data Ownership with Encryption
Copyright 2015 Trend Micro Inc. 30
Trend Micro
Cloud App Encryption
Direct API integration
(no SMTP routing)
maintains Office 365
user, admin, security
functionality
Keys managed on-
premise by customer or
hosted by Trend Micro
OWA
MAPI
EAS
zvFWyYA8VxNhemFydo
ghxozgRtKHbzMSoqII5r
nqB9YUARXdPjn8pw4r
Uvfi3kRbpTdAaCVd
Zach, I’d to meet with
you to discuss the
merger plan. Will you
be ready to meet on…
DecryptionProxy
Trend Micro Cloud App Security
Advanced Threat Detection, Data Leakage Protection & Visibility
Copyright 2015 Trend Micro Inc. 31
Advanced Threat Detection
• Finds zero-day malware
and hidden threats
• Sandbox malware
analysis in the cloud
DLP
• 200+ customizable
templates
Trend Micro
Cloud App Security
• Direct API integration
• No email re-routing, client
changes, or web proxy
Why Trend Micro for Office 365 Security?
Copyright 2015 Trend Micro Inc. 32
Cloud Scale
• 10 years offering cloud
services
• Direct cloud-to-cloud
integration offers high
performance and
usability
Control & Protection
• Advanced protection for
Office 365 email,
SharePoint, OneDrive
• Ranked #1 by NSS Labs
against zero-days and
other targeted attacks
Trusted Security Vendor
• 26 years focused on
security, now largest
pure-play
• Trusted by 48 of top 50
global corporations
• Microsoft Gold Partner
Copyright 2014 Trend Micro Inc. 33
Security Challenges & Solutions
when moving to Cloud?
Ingram Cloud Market Integration
with Trend Micro + Partners
Q & A
WHO is Trend Micro?
Ingram Cloud Marketplace Integration Architecture
with Parallels APS 2.0 and Trend Cloud Service Interfaces
Copyright 2014 Trend Micro Inc. 34
Monthly Auto-Renewal
Pre-Paid Subscription
Auto Provisioning
Service Bundling
Service Functions
Licensing
Service
Provisioning
Service
Functions
Interfaces
APS 2.0
Cloud ServicesCloud Marketplace
Worry-Free TM
Business Security Services
Hosted Email Security
Trend Micro Cloud Apps Security
…
Customer
Reseller
Ingram Cloud Marketplace Integration Architecture
with Parallels APS 2.0 and Trend Cloud Service Interfaces
Copyright 2014 Trend Micro Inc. 35
Monthly Auto-Renewal
Service Bundling
Cloud Marketplace
Auto Provisioning
Service Functions
Master PO with Detailed Transaction
Report
Account & service auto provisioning in seconds
Trend Micro Services
Zero-touched auto-renewal
Available for 3rd party service bundling
Agent download link on control panel
Parallels APS 2.0 Integration
Worry-Free
TM
Business Security Service
Trend APS 2.0 package
Aggregated PO/Invoice for billing
Completed by Dec 2014
Ingram Micro “Web-layer” and initial Trend Micro Worry-Free Services purchase
reseller flow in IM CMP
What does this mean to the partners?
• Stream line the business process
• More solutions for you to sell and grow your
business
• Work with Industry leading Cloud Security
Provider Trend Micro
• It’s Easy and Simple – all you have to do is sign-up
to become a Cloud Reseller at the Ingram Cloud
Market Place
Copyright 2014 Trend Micro Inc. 37
Thank you!
richard_ku@trendmicro.com

More Related Content

What's hot

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Trend Micro
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
IBM Security
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
Armor
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
YounesChafi1
 

What's hot (20)

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 

Viewers also liked

Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day
Acrodex
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
ISSA LA
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
Acrodex
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
Trend Micro
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
ISSA LA
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Trend Micro
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
festival ICT 2016
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Trend Micro
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
festival ICT 2016
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
festival ICT 2016
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
festival ICT 2016
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
ISSA LA
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
Trend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Trend Micro
 

Viewers also liked (19)

Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day Winnipeg Technology Innovation Day
Winnipeg Technology Innovation Day
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 

Similar to Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud Storage

Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
caesar92
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
Minh Le
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
Liwei Ren任力偉
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Symantec Brasil
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Cloud Security Alliance Lviv Chapter
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
Insights success media and technology pvt ltd
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
African Cyber Security Summit
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
 
Presentation World Hosting Days
Presentation World Hosting DaysPresentation World Hosting Days
Presentation World Hosting Days
Univention GmbH
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Storage Switzerland
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
Netmagic Solutions Pvt. Ltd.
 

Similar to Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud Storage (20)

Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
 
Presentation World Hosting Days
Presentation World Hosting DaysPresentation World Hosting Days
Presentation World Hosting Days
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 

More from Ingram Micro Cloud

Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's cloudsIngram Micro Cloud
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel securityIngram Micro Cloud
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalIngram Micro Cloud
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersIngram Micro Cloud
 
Clouds Over Holland
Clouds Over HollandClouds Over Holland
Clouds Over Holland
Ingram Micro Cloud
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP Conversion
Ingram Micro Cloud
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Ingram Micro Cloud
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Ingram Micro Cloud
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
Ingram Micro Cloud
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
Ingram Micro Cloud
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with Social
Ingram Micro Cloud
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
Ingram Micro Cloud
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud Business
Ingram Micro Cloud
 
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
Ingram Micro Cloud
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityIngram Micro Cloud
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram Micro
Ingram Micro Cloud
 
Cloud University: IDC
Cloud University: IDCCloud University: IDC
Cloud University: IDC
Ingram Micro Cloud
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 

More from Ingram Micro Cloud (20)

Imc master
Imc masterImc master
Imc master
 
Ibm
IbmIbm
Ibm
 
Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's clouds
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation final
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
 
Clouds Over Holland
Clouds Over HollandClouds Over Holland
Clouds Over Holland
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP Conversion
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with Social
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud Business
 
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape Opportunity
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram Micro
 
Cloud University: IDC
Cloud University: IDCCloud University: IDC
Cloud University: IDC
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud Storage

  • 1. Security Challenges and Solutions for the Cloud (SaaS) & Cloud Storage Copyright 2014 Trend Micro Inc. Richard Ku SVP, Enterprise and SMB Product and Services
  • 2. Copyright 2014 Trend Micro Inc. 2 Security Challenges & Solutions when moving to Cloud. Ingram Cloud Market Integration with Trend Micro + Partners Q & A. WHO is Trend Micro?
  • 3. Fact about Trend Micro  Founded in 1988, $1.2B Revenue (2012)  Headquarter in Japan, Tokyo Exchange Nikkei Index, Symbol 4704  Largest Security focused company world wide  Over 5200 Employees, 38 Business Units 37%Consumer 12%Small Business 13% Midsize Business 38%Enterprise & VLE 500k commercial customers; 9% of them in APAC. Largest Security company outside U.S. Copyright 2014 Trend Micro Inc. 3
  • 5. Copyright 2014 Trend Micro Inc. CENTRALIZED VISIBILITY & CONTROL More then just an antivirus company
  • 6. Device Control DLP Encryption Behavior Monitoring Vulnerability Shielding Social Engineering Attack Protection Memory Inspection Command & Control Blocking File Reputation Web Reputation Email Reputation Web Gateway Email Gateway or Server 1.4B in Sept 2014 Malware Sandbox Application Whitelisting Office 365 SharePoint Server Investigation Network Inspection 300M in Sept 2014 nspection Application Scanning
  • 7. Market Leadership Position Copyright 2014 Trend Micro Inc. 7 • Magic Quadrant for Endpoint Protection Platforms, Gartner, January 2014 • http://www.av-test.org (Sept 2013 – Feb 2014 test results, Corporate Solutions on Win XP,7 , 8 Systems) #1 in protection and performance A “Leader” in the MQ for Endpoint Protection 12 consecutive years • IDC, Worldwide Endpoint Security 2014-1018 Forecast and 2013 Vendor Shares, August 2014 • expertON Group, Cloud Vendor Benchmark, June 2014 • 2014 NSS Labs Breach Detection Tests #1 in protection and performance • Canalyst Research Global market leader in SMB Content Security 3 years running - 2011, 2012, 2013 • http://www.av-test.org (Sept 2013 – Feb 2014 test results, Corporate Solutions on Win XP,7 , 8 Systems)
  • 8. 100% of the top 10 automotive companies. 96% of the top 50 global corporations. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. Customers 8Copyright 2014 Trend Micro Inc.
  • 9. 9 A world safe for exchanging digital information Copyright 2014 Trend Micro Inc.
  • 10. Our Mission: Defending Against Threats Copyright 2014 Trend Micro Inc. 10 By protecting users against: • Loss of productivity • Loss of information • Loss of identity ITEmployees By reducing risk to infrastructure: • System integrity and availability • Intellectual property protection • Network protection Attackers
  • 11. Our Strategy Copyright 2014 Trend Micro Inc. 11 Be the Threat Defense Expert that adapts quickly to evolving: • user behavior • technology and infrastructure • threat vectors By leveraging our strengths: • core competence is anti-threat • view defense as a strategy • laser-focused so can best adapt
  • 12. Copyright 2014 Trend Micro Inc. 12 Security Challenges & Solutions when moving to Cloud? Ingram Cloud Market Integration with Trend Micro + Partners Q & A WHO is Trend Micro?
  • 13. Security and Privacy Concerns Copyright 2014 Trend Micro Inc. 13
  • 14. #1 - Consumerization 14Copyright 2014 Trend Micro Inc. iOS & Android PC A category that did not exist a few years ago
  • 15. 15 #2 - Cloud Applications, SaaS, Storage and File Services Growth <10% Cloud Services Providers Offer Enterprise Grade Security Capabilities and Store Data with-in Jurisdictional Boundaries
  • 16. #3 - Data No Longer Stored within Organization Where is your data? Who has access to it? Do you know when it’s accessed? Copyright 2014 Trend Micro Inc. 16
  • 17. Data: Every 60 seconds, 1.8 petabytes of data is created… Copyright 2014 Trend Micro Inc. 17 1. IBM 2. www.DropBox.com 700,000 files2 278,000 tweets1 204M emails1
  • 18. CRIMEWARE DamagecausedbyCybercrime #4 - Threats 2001 2003 2004 2005 2007 2010 Vulnerabilities W orm Outbreaks Spam Mass Mailers Spyware Intelligent Botnets Web Threats 2011+ Targeted Attacks Mobile Attacks Confidential | Copyright 2014 Trend Micro Inc.
  • 19. Copyright 2014 Trend Micro Inc. 19 Security Challenges & Solutions when moving to Cloud? Ingram Cloud Market Integration with Trend Micro + Partners Q & A WHO is Trend Micro?
  • 20. Dynamic Infrastructure Dynamic Infrastructure Web Mail SharePoint Sync Endpoint Public Cloud Infrastructure – IaaS, PaaS Public Cloud - SaaS Private Cloud - Virtualization DynamicUser DynamicUser Customer Hybrid- Cloud Environment Dynamic Infrastructure Dynamic User Social Network Web Mail SharePoint Sync On Premises + Mobile Endpoint/ Mobile
  • 21. Customer approach to cloud Public Cloud EnvironmentPhysical Environment Virtual Environment Private Cloud IaaS/PaaSSaaS LAN
  • 22. Security is a share responsibility when moving to the cloud • Facilities • Physical security • Network infrastructure • Virtualization layer Confidential © 2014 Trend Micro Inc. 22 • Operating system • Applications • Data * Especially on IaaS & SaaS Cloud Provider Enterprise Customer
  • 23. Security Solution in the new Hybrid-cloud environment Copyright 2014 Trend Micro Inc. 23 Management Cloud Security Broker Cloud Service Provider Endpoint OfficeScan/ Worry-Free Cloud App Security & Encryption
  • 24. What should a Cloud (SaaS) Security Solution has? Copyright 2014 Trend Micro Inc. 24 Visibility Control Security, Data Protection & Intelligence End to End
  • 26. Before Office 365, Google Drive, BOX..… Copyright 2014 Trend Micro Inc. 26 Exchange Gateway APT Protection Compliance Inbound email inspected for zero-day malware Outbound email scanned for compliance Multiple security layers Email data controlled by organization Network boundary OWA MAPI EAS SMTP
  • 27. APT Protection Now with Office 365, Google Drive, Box …… Copyright 2015 Trend Micro Inc. 27 Included baseline security lacks controls to find hidden malware and zero day threats Network boundary OWA Outlook No opportunity to inspect
  • 28. External Collaboration + Consumerization Risk Copyright 2015 Trend Micro Inc. 28 Partners, Customers Contractors, Consultants Remote workers Employees
  • 29. Two Brand New Services Copyright 2015 Trend Micro Inc. 29 Trend Micro Cloud App Encryption Trend Micro Cloud App Security
  • 30. Trend Micro Cloud App Encryption Maintain Data Ownership with Encryption Copyright 2015 Trend Micro Inc. 30 Trend Micro Cloud App Encryption Direct API integration (no SMTP routing) maintains Office 365 user, admin, security functionality Keys managed on- premise by customer or hosted by Trend Micro OWA MAPI EAS zvFWyYA8VxNhemFydo ghxozgRtKHbzMSoqII5r nqB9YUARXdPjn8pw4r Uvfi3kRbpTdAaCVd Zach, I’d to meet with you to discuss the merger plan. Will you be ready to meet on… DecryptionProxy
  • 31. Trend Micro Cloud App Security Advanced Threat Detection, Data Leakage Protection & Visibility Copyright 2015 Trend Micro Inc. 31 Advanced Threat Detection • Finds zero-day malware and hidden threats • Sandbox malware analysis in the cloud DLP • 200+ customizable templates Trend Micro Cloud App Security • Direct API integration • No email re-routing, client changes, or web proxy
  • 32. Why Trend Micro for Office 365 Security? Copyright 2015 Trend Micro Inc. 32 Cloud Scale • 10 years offering cloud services • Direct cloud-to-cloud integration offers high performance and usability Control & Protection • Advanced protection for Office 365 email, SharePoint, OneDrive • Ranked #1 by NSS Labs against zero-days and other targeted attacks Trusted Security Vendor • 26 years focused on security, now largest pure-play • Trusted by 48 of top 50 global corporations • Microsoft Gold Partner
  • 33. Copyright 2014 Trend Micro Inc. 33 Security Challenges & Solutions when moving to Cloud? Ingram Cloud Market Integration with Trend Micro + Partners Q & A WHO is Trend Micro?
  • 34. Ingram Cloud Marketplace Integration Architecture with Parallels APS 2.0 and Trend Cloud Service Interfaces Copyright 2014 Trend Micro Inc. 34 Monthly Auto-Renewal Pre-Paid Subscription Auto Provisioning Service Bundling Service Functions Licensing Service Provisioning Service Functions Interfaces APS 2.0 Cloud ServicesCloud Marketplace Worry-Free TM Business Security Services Hosted Email Security Trend Micro Cloud Apps Security … Customer Reseller
  • 35. Ingram Cloud Marketplace Integration Architecture with Parallels APS 2.0 and Trend Cloud Service Interfaces Copyright 2014 Trend Micro Inc. 35 Monthly Auto-Renewal Service Bundling Cloud Marketplace Auto Provisioning Service Functions Master PO with Detailed Transaction Report Account & service auto provisioning in seconds Trend Micro Services Zero-touched auto-renewal Available for 3rd party service bundling Agent download link on control panel Parallels APS 2.0 Integration Worry-Free TM Business Security Service Trend APS 2.0 package Aggregated PO/Invoice for billing Completed by Dec 2014
  • 36. Ingram Micro “Web-layer” and initial Trend Micro Worry-Free Services purchase reseller flow in IM CMP
  • 37. What does this mean to the partners? • Stream line the business process • More solutions for you to sell and grow your business • Work with Industry leading Cloud Security Provider Trend Micro • It’s Easy and Simple – all you have to do is sign-up to become a Cloud Reseller at the Ingram Cloud Market Place Copyright 2014 Trend Micro Inc. 37

Editor's Notes

  1. Commercial now 63% of business and growing
  2. Our solutions have been evolved and enhanced over the years to meet the demands of the changing threat landscape. Since 1988, Trend Micro has pioneered innovative technologies and security services that protect users against threats that target new and emerging platforms and devices. Each beneficial shift in the way people communicate and conduct business online has introduced new security challenges. Trend Micro has been there from the start, being the first to extend threat protection from the desktop to the server and then to the Internet gateway. And as mobility, virtualization, and cloud computing are enabling people to share digital information more easily, more quickly, and more affordably, Trend Micro continues to innovate with data encryption, agentless security for virtual and cloud environments, as well as mobile app reputation technology.  
  3. These solutions are supported by our ongoing investment in core technology including our big data-driven global threat intelligence, Smart Protection Network. And they are all able to be managed in one central place to provide customers with centralized visibility and control.
  4. We are leaders in the market. Trend Micro’s Complete User Protection solution has been a leader in the Gartner Magic Quadrant for 12 consecutive years. The latest Avtest scores also show Trend Micro as #1. IDC has recognized Trend as the leading provider of server security solutions, including physical, virtual and cloud servers, with a global market share of 27%, the 4th year in a row we’ve been recognized as the leader. Experton Group also has recognized Trend as the Cloud Leader now 2 years running. Trend Micro’s Custom Defense solution also received the top score in breach detection in a recent NSSLabs breach detection test for our Deep Discovery product. Canalyst also has recognized Trend Micro as the security leader in the small business market segment 3 years running
  5. Cybercriminals have been innovating and changing their tools and techniques over time. The most recent has been a shift to targeted attacks as well as a major shift towards the mobile platform.
  6. The on-premise perimeter is defined by network ….Firewall, VPNs, Ethernet Cables etc.. This work fine until the business extended beyond the sum of the network. The new boundary is the perimeter of the There are two areas Trend Micro only need to focus on to be the market leader in this new hybrid-cloud computing era The Dynamic Infrastructure The Dynamic User
  7. Email infrastructure contained with customers network Email data stored onsite Multiple security layers Email gateway at edge of network Exchange security for internal, mail store scans May have invested in breach detection or APT controls to look for zero day malware Outbound email scanned for compliance and other sensitive data Some endpoint devices had security but more of a problem these days with BYOD, devices off network, mobile devices w/o equivalent security controls to prevent threats or storage of compliance data