SlideShare a Scribd company logo
The Art of
Cybersecurity
© 2019 Trend Micro Inc.2
Cyber threats are ugly.
Chaotic. Overwhelming.
They are preventing
organizations from
being their best.
Cybercriminals are relentless, more skilled:
• 350k new threats/day
• 99.99% exploits use known vulnerabilities
• Cleverly blend in (e.g. fileless malware)
• Leveraging AI in creative ways
Enterprises claim 80%
likelihood they will suffer
one or more successful
cyber attacks this year
© 2019 Trend Micro Inc.3
Unknown threats detected and stopped over time by
Trend Micro within financial services organizations.
Created with real data by artist Brendan Dawes.
…cybersecurity can
be beautiful.
We believe that when
you can prepare for,
withstand and rapidly
recover from threats…
© 2019 Trend Micro Inc.4
What We Hear
CISO OPPORTUNITY
Operate smoothly within budget
Report to the Executive and the
Board with confidence
Rapidly respond to cyber attacks
Be a strategic partner to the
business; help unlock full
potential by mitigating risk
Achieve compliance
CISO CHALLENGES
Too many siloed security tools
Difficult to gain meaningful
visibility for rapid incident
response across environment
Rapidly shifting user behaviors,
IT infrastructure and threats
More stringent regulations
Skills shortage
WHAT’S NEEDED
Connected solutions, ability to
consolidate vendors
Centralized visibility across layers,
with ability to do total incident
root cause and impact analysis
Market-leading security that
seamlessly fits the landscape
Ability to report with confidence
More automated detection and
response, and a trusted partner
© 2019 Trend Micro Inc.5
Why Trend Micro?
© 2019 Trend Micro Inc.6
We’ve turned cybersecurity into an art form,
uniquely combining…
Proven Foresight XGenTM
Security Strategy Passionate People
© 2019 Trend Micro Inc.7
For three decades, we’ve successfully bet on
upcoming technology trends— proactively
securing new environments so customers can
take full advantage of them
1988
Peace of mind
computing
1998
Your Internet
Virus Wall
2008
Securing Your
Journey to the Cloud
2018
Securing Your
Connected World
Proven Foresight
© 2019 Trend Micro Inc.8
Threats Vulnerabilities
& Exploits
Cybercriminal
Undergrounds
IoT OT / IIoTAI & ML Future Threat
Landscape
Targeted
Attacks
Trend Micro Core
Technology & Products
Responsible disclosure to
software/hardware vendors
Public/private partnerships
(e.g. law enforcement)
Threat intelligence and research for
consumers, businesses and governments
© 2019 Trend Micro Inc.9
CONNECTED
Speeds time to protect,
detect and respond
OPTIMIZED
Minimizes IT impact
SMART
Maximizes protection
XGenTM
Security Strategy
© 2019 Trend Micro Inc.10
At Trend Micro, we share
our customers’ goals and
partner to achieve them,
every step of the way.
We Love What We Do, and it Shows!
Passionate People
6600+ Trenders
50+ countries
Common values
© 2019 Trend Micro Inc.11
Solid, Sustainable, and Trusted Globally
• CEO Eva Chen co-founded the company in 1988 in the US
• Headquartered in Japan, Tokyo Exchange Nikkei Index
• Over 30 years focused on cybersecurity with a consistent vision
to “Make the World Safe for Exchanging Digital Information”
• Annual sales of approximately US $1.5 billion
• Profitable every quarter since going public mid-1998
• Protect over 500k commercial customers and over 250M
endpoints around the world
© 2019 Trend Micro Inc.12
10 of Top 10 Telecom
9 of Top 10 Petroleum
9 of Top 10 Healthcare
8 of Top 10 Banking
8 of Top 10 Automotive
© 2019 Trend Micro Inc.13
The market leader
in server security
since 2009
Named a Leader Once Again in the
Gartner Magic Quadrant for Endpoint
Protection Platforms, Jan 2018
BEST Protection with outstanding
performance
• IDC, Securing the Server Compute Evolution: Hybrid Cloud Has
Transformed the Datacenter, January 2017 #US41867116
• Gartner, Market Guide for Cloud Workload Protection Platforms, Neil
MacDonald, March 26, 2018
• NSS Labs Breach Detection Test Results (2014-2018);
NSS NGIPS Test Results, 2018
• Gartner, 2018 Magic Quadrant for Intrusion Detection & Prevention (IDPS)
• Gartner ,2018 Magic Quadrant for Endpoint Protection Platforms
• https://www.av-test.org/en/news/av-test-awards-2018-go-to-trend-micro/
Recommended Breach Detection System
for 5 straight years, and
Recommended Next-generation IPS
Leader in Gartner Magic Quadrant for
Intrusion Detection and Prevention
Systems, January 2018
Trend Micro delivers the most cloud
security controls (23 of 26) of all
evaluated vendors.
© 2019 Trend Micro Inc.14
prepare for, withstand
.
Unknown threats detected and stopped over
time by Trend Micro. Created with real data
by artist Brendan Dawes.

More Related Content

What's hot

4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G Evolution
Manoj Singh
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
Leonardo
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
Ritesh Dwivedi
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Sachithra Gayan
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
grantlerc
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Firewalls
FirewallsFirewalls
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
The TNS Group
 
The essential role of AI in the 5G future
The essential role of AI in the 5G futureThe essential role of AI in the 5G future
The essential role of AI in the 5G future
Qualcomm Research
 
IoT
IoTIoT
IoT
Mphasis
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoT
Qualcomm Research
 
Fog computing
Fog computingFog computing
Fog computing
Ankit_ap
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
 
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Mojtaba HOUSHMAND
 

What's hot (20)

4G to 5G Evolution
4G to 5G Evolution4G to 5G Evolution
4G to 5G Evolution
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
The essential role of AI in the 5G future
The essential role of AI in the 5G futureThe essential role of AI in the 5G future
The essential role of AI in the 5G future
 
IoT
IoTIoT
IoT
 
Network security
Network securityNetwork security
Network security
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoT
 
Fog computing
Fog computingFog computing
Fog computing
 
Security Culture
Security CultureSecurity Culture
Security Culture
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
 

Similar to Trend Micro Solutions Overview

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
John D. Haden
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
NeetaSahay1
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Marie Wilcox
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
caesar92
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
Nixu Corporation
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
Match-Maker Ventures
 

Similar to Trend Micro Solutions Overview (20)

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Trend Micro Solutions Overview

  • 2. © 2019 Trend Micro Inc.2 Cyber threats are ugly. Chaotic. Overwhelming. They are preventing organizations from being their best. Cybercriminals are relentless, more skilled: • 350k new threats/day • 99.99% exploits use known vulnerabilities • Cleverly blend in (e.g. fileless malware) • Leveraging AI in creative ways Enterprises claim 80% likelihood they will suffer one or more successful cyber attacks this year
  • 3. © 2019 Trend Micro Inc.3 Unknown threats detected and stopped over time by Trend Micro within financial services organizations. Created with real data by artist Brendan Dawes. …cybersecurity can be beautiful. We believe that when you can prepare for, withstand and rapidly recover from threats…
  • 4. © 2019 Trend Micro Inc.4 What We Hear CISO OPPORTUNITY Operate smoothly within budget Report to the Executive and the Board with confidence Rapidly respond to cyber attacks Be a strategic partner to the business; help unlock full potential by mitigating risk Achieve compliance CISO CHALLENGES Too many siloed security tools Difficult to gain meaningful visibility for rapid incident response across environment Rapidly shifting user behaviors, IT infrastructure and threats More stringent regulations Skills shortage WHAT’S NEEDED Connected solutions, ability to consolidate vendors Centralized visibility across layers, with ability to do total incident root cause and impact analysis Market-leading security that seamlessly fits the landscape Ability to report with confidence More automated detection and response, and a trusted partner
  • 5. © 2019 Trend Micro Inc.5 Why Trend Micro?
  • 6. © 2019 Trend Micro Inc.6 We’ve turned cybersecurity into an art form, uniquely combining… Proven Foresight XGenTM Security Strategy Passionate People
  • 7. © 2019 Trend Micro Inc.7 For three decades, we’ve successfully bet on upcoming technology trends— proactively securing new environments so customers can take full advantage of them 1988 Peace of mind computing 1998 Your Internet Virus Wall 2008 Securing Your Journey to the Cloud 2018 Securing Your Connected World Proven Foresight
  • 8. © 2019 Trend Micro Inc.8 Threats Vulnerabilities & Exploits Cybercriminal Undergrounds IoT OT / IIoTAI & ML Future Threat Landscape Targeted Attacks Trend Micro Core Technology & Products Responsible disclosure to software/hardware vendors Public/private partnerships (e.g. law enforcement) Threat intelligence and research for consumers, businesses and governments
  • 9. © 2019 Trend Micro Inc.9 CONNECTED Speeds time to protect, detect and respond OPTIMIZED Minimizes IT impact SMART Maximizes protection XGenTM Security Strategy
  • 10. © 2019 Trend Micro Inc.10 At Trend Micro, we share our customers’ goals and partner to achieve them, every step of the way. We Love What We Do, and it Shows! Passionate People 6600+ Trenders 50+ countries Common values
  • 11. © 2019 Trend Micro Inc.11 Solid, Sustainable, and Trusted Globally • CEO Eva Chen co-founded the company in 1988 in the US • Headquartered in Japan, Tokyo Exchange Nikkei Index • Over 30 years focused on cybersecurity with a consistent vision to “Make the World Safe for Exchanging Digital Information” • Annual sales of approximately US $1.5 billion • Profitable every quarter since going public mid-1998 • Protect over 500k commercial customers and over 250M endpoints around the world
  • 12. © 2019 Trend Micro Inc.12 10 of Top 10 Telecom 9 of Top 10 Petroleum 9 of Top 10 Healthcare 8 of Top 10 Banking 8 of Top 10 Automotive
  • 13. © 2019 Trend Micro Inc.13 The market leader in server security since 2009 Named a Leader Once Again in the Gartner Magic Quadrant for Endpoint Protection Platforms, Jan 2018 BEST Protection with outstanding performance • IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116 • Gartner, Market Guide for Cloud Workload Protection Platforms, Neil MacDonald, March 26, 2018 • NSS Labs Breach Detection Test Results (2014-2018); NSS NGIPS Test Results, 2018 • Gartner, 2018 Magic Quadrant for Intrusion Detection & Prevention (IDPS) • Gartner ,2018 Magic Quadrant for Endpoint Protection Platforms • https://www.av-test.org/en/news/av-test-awards-2018-go-to-trend-micro/ Recommended Breach Detection System for 5 straight years, and Recommended Next-generation IPS Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention Systems, January 2018 Trend Micro delivers the most cloud security controls (23 of 26) of all evaluated vendors.
  • 14. © 2019 Trend Micro Inc.14 prepare for, withstand .
  • 15. Unknown threats detected and stopped over time by Trend Micro. Created with real data by artist Brendan Dawes.