Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
Trend Micro Deep Security
#1 Security Platform for Virtualization and the cloud
Trend Micro Deep Discovery
Combating Advanced Persistent Treats (APT’s)
Trend Micro Mobile Security
Manage and control your mobile devices (BYOD)
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
Trend Micro Deep Security
#1 Security Platform for Virtualization and the cloud
Trend Micro Deep Discovery
Combating Advanced Persistent Treats (APT’s)
Trend Micro Mobile Security
Manage and control your mobile devices (BYOD)
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
Zero trust for everybody: 3 ways to get there fastCloudflare
The COVID-19 pandemic has exposed the weaknesses of the traditional ‘castle-and-moat’ security model. Remote work has expanded attack surfaces infinitely outwards, and more than ever, organizations need to start from the assumption that their ‘castle’ is already compromised. Zero Trust has emerged as a compelling security framework to address the failures of existing perimeter-based security approaches. It’s aspirational, but not unachievable.
At Cloudflare, we’re making complicated security challenges easier to solve. Since 2018, Cloudflare Access has helped thousands of organizations big and small take their first steps toward Zero Trust.
In this presentation, Cloudflare will share their perspective on what the most successful organizations do first on their journey to Zero Trust.
We’ll cover:
-The Zero Trust framework, and our recommended ZT security model
-How 3 organizations of differing size and security maturity have implemented Zero Trust access
-Cloudflare’s Zero Trust implementation and lessons learned
Cloud Security using NIST guidelines, using NIST Cloud Computing Security Reference Architecture
(NIST SP 500-299), NIST Cloud
Computing Reference Architecture (NIST SP 500-292), NIST's Guide for Applying the Risk Management Framework to Federal Information Systems (NIST SP 800-37)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Endpoint Protection - Introduction
- Symantec Endpoint Protection - Features
- Symantec Endpoint Protection - Architecture & Design
- Symantec Endpoint Protection - System Requirements
- Symantec Endpoint Protection - Licensing & Packaging
This provides a brief overview of Symantec Endpoint Protection (SEP). Please note all the information is based prior to February 2016 and the full integration of Blue Coat Systems's set of solutions.
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
The purpose of the session is to ensure security on the rapidly scaled work from Home situations during the COVID-19 outbreak. The objective is to ensure that they can securely and rapidly connect to all of their applications, including SaaS, cloud, and data-center applications.
The session will be delivered by Mohammad Faizan Sheikh, Channel Systems Engineer, India & SAARC for Palo Alto Networks..
These charts provide a high-level overview of IIB HA topologies:
• Comparison of active/active and active/passive HA
• Solutions for active/passive HA failover with IBM Integration Bus
• Solutions for active/active processing with IBM Integration Bus
• Adding Global Cache to active/active processing
• Combining all of the above
Only HTTP and JMS (MQ) workloads are shown
Productive and integrated digital media services for Trend Micro India by ADG Online Solutions.
We have put together a brief of our detailed efforts towards increasing the outreach of Trend Micro on the digital platform.
Attacks are evolving and so must the response – but how? This presentation explores how you get beyond the APT hype and strike a sensible balance between security expenditure and commercial risk. We explain what do you need to just keep doing, what’s new and what’s no longer effective.
Drawing from CrowdStrike's work, Cayce Beames will present evolving cybersecurity threats, discussed her thoughts on why traditional security is failing and shared a bit on what this "next generation endpoint protection" is about.
Cayce has been working in technology for over 25 years. From IT Systems Administration to Network Engineering and Internet Security, Risk Management and Compliance Auditing, Cayce has consulted with many Global corporations and traveled extensively. Cayce is currently a governance, risk and compliance analyst at CrowdStrike and founder of the not for profit, public benefit, education for kids organization called "The Computer Club" where she works to inspire kids and adults to address their fear of the unknown and make something awesome with technology.
Zero trust for everybody: 3 ways to get there fastCloudflare
The COVID-19 pandemic has exposed the weaknesses of the traditional ‘castle-and-moat’ security model. Remote work has expanded attack surfaces infinitely outwards, and more than ever, organizations need to start from the assumption that their ‘castle’ is already compromised. Zero Trust has emerged as a compelling security framework to address the failures of existing perimeter-based security approaches. It’s aspirational, but not unachievable.
At Cloudflare, we’re making complicated security challenges easier to solve. Since 2018, Cloudflare Access has helped thousands of organizations big and small take their first steps toward Zero Trust.
In this presentation, Cloudflare will share their perspective on what the most successful organizations do first on their journey to Zero Trust.
We’ll cover:
-The Zero Trust framework, and our recommended ZT security model
-How 3 organizations of differing size and security maturity have implemented Zero Trust access
-Cloudflare’s Zero Trust implementation and lessons learned
Cloud Security using NIST guidelines, using NIST Cloud Computing Security Reference Architecture
(NIST SP 500-299), NIST Cloud
Computing Reference Architecture (NIST SP 500-292), NIST's Guide for Applying the Risk Management Framework to Federal Information Systems (NIST SP 800-37)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Endpoint Protection - Introduction
- Symantec Endpoint Protection - Features
- Symantec Endpoint Protection - Architecture & Design
- Symantec Endpoint Protection - System Requirements
- Symantec Endpoint Protection - Licensing & Packaging
This provides a brief overview of Symantec Endpoint Protection (SEP). Please note all the information is based prior to February 2016 and the full integration of Blue Coat Systems's set of solutions.
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
The purpose of the session is to ensure security on the rapidly scaled work from Home situations during the COVID-19 outbreak. The objective is to ensure that they can securely and rapidly connect to all of their applications, including SaaS, cloud, and data-center applications.
The session will be delivered by Mohammad Faizan Sheikh, Channel Systems Engineer, India & SAARC for Palo Alto Networks..
These charts provide a high-level overview of IIB HA topologies:
• Comparison of active/active and active/passive HA
• Solutions for active/passive HA failover with IBM Integration Bus
• Solutions for active/active processing with IBM Integration Bus
• Adding Global Cache to active/active processing
• Combining all of the above
Only HTTP and JMS (MQ) workloads are shown
Productive and integrated digital media services for Trend Micro India by ADG Online Solutions.
We have put together a brief of our detailed efforts towards increasing the outreach of Trend Micro on the digital platform.
Attacks are evolving and so must the response – but how? This presentation explores how you get beyond the APT hype and strike a sensible balance between security expenditure and commercial risk. We explain what do you need to just keep doing, what’s new and what’s no longer effective.
Presentation from Virtualization Deep Dive Day 2011 on making VDI successful for all use cases by Tom Rose, Chief Marketing Officer, Unidesk Corporation.
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsNovell
With the adoption of virtualization in the end-user computing space, organizations require solutions that go beyond device management and embrace the dynamic nature of end-user environments. This session will introduce you to the Novell VDI solution, enhanced by Novell ZENworks Configuration Management, and its ability to provide a secure, automated and personalized hosted desktop environment. This session will also focus on the Novell endpoint management technologies that enhance virtual desktop infrastructure.
VDI & Storage:Deep Impact.
Virtual Desktop Infrastructure, or VDI, is hot. It‟s cool, secure, centrally managed, flexible - it‟s an IT manager‟s dream.
VDI comes in two flavours; Service Hosted VDI (Centralized, single-user remote vDesktop solution) and Client-Side VDI (local, single-user vDesktop solution).
18 ottobre 2011 VMware presenta al Virtualization day,evento patrocinato dalla Provincia di Roma e organizzato da S&Q a Palazzo Valentini, i suoi prodotti per la virtualizzazione dei desktop .L' Intervento di Michele Apa è stato molto interessante ed è stato apprezzato da tutta la platea
Per maggiori informazioni sull'evento : www.sqingegneria.com
Featuring eX5, the 5th generation of enterprise X-Architecture® from IBM, and based on the new Intel® Xeon® processor 7500 series and Intel Xeon processor 6500 series, these new systems radically expand the capabilities of the x86 platform, breaking through memory bottlenecks with exceptional scalable performance and advanced reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
TrendMicro
1. Magic Words of VDI Security:
“Agentless” and “Aware”
David Girard, Senior Security Advisor – Trend Micro Canada
1
1
2. Virtualization Project ?
Desktop Server Cloud Virtual Appliance
10/4/2010 Copyright 2009 Trend Micro Inc. 2
2
3. Security Built for VMware
The most comprehensive suite
of next-generation
virtualization security solutions
Desktop Server Cloud Virtual Appliance
10/4/2010 Copyright 2009 Trend Micro Inc. 3
3
4. Security Built for VMware
IT Operations Security Compliance
Consolidation rates Protect data Ensure
Operational efficiencies & applications compliance
Flexibility
Savings
10/4/2010 Copyright 2009 Trend Micro Inc. 4
4
5. Security Built for VMware
Desktop Server Cloud Virtual Appliance
10/4/2010 Copyright 2009 Trend Micro Inc. 5
5
6. Key Issue:
Resource Contention
High impact : Employee’s arrival or schedule scans
9:00am Scan
Typical AV
Console
If several, or all, VMs start a full anti-malware scan at the same time, the underlying
shared hardware will experience extreme load (memory, CPU, I/O), causing a
slowdown of all virtual systems on the server.
Large pattern file updates require significant memory and can impact, network and
storage I/O resources.
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 6
6
7. VDI Security option #1: OfficeScan
(First AV optimized for VDI)
Trend Micro OfficeScan
Protects virtual & physical endpoints
• VDI Intelligence with VDI plug-in
• Serializes updates and scans per VDI-host
• Leverages base-images to further shorten scan times
• Smart Scan limit Endpoints pattern updates since it is
mostly in the cloud
10/4/2010 Copyright 2009 Trend Micro Inc. 7
7
8. OfficeScan 10.5 has VDI-Intelligence
• Detects whether endpoints are physical or virtual
– With VMware View
• Serializes updates and scans per VDI-host
– Controls the number of concurrent scans and updates per VDI host
– Maintains availability and performance of the VDI host
– Faster than concurrent approach
• Leverages Base-Images to further shorten scan times
– Pre-scans and white-lists VDI base-images
– Prevents duplicate scanning of unchanged files on a VDI host
– Further reduces impact on the VDI host
Copyright 2009 Trend Micro Inc.
8
10. CPU
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 10
10
11. CPU - Analysis
• Only 10.5 can support 20+ desktop images with mixed user profile.
• With no AV, average CPU utilization while 4 heavy and 16 light user
script is running is 33%
• With 10.5 with ALL 4 heavy and 16 light user machines scanning,
CPU utilization is 41%. Very Impressive.
• With powerful machines typically used in VDI environment CPU’s
typically are not the breaking point.
• With 20 desktop images, 10.5 adds marginal load to CPU where as
other solutions can not even get to support baseline number of
desktop images
• With 10 desktop images, 10.5 adds only 11% CPU overhead
compared to baseline (no AV and no scanning) versus Symantec
which adds 29% CPU overhead , 10.1 which adds 50% CPU
overhead and McAfee which is the worst which adds 83% CPU
overhead
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 11
11
13. IOPS - Analysis
• Only 10.5 can support 20+ desktop images with mixed
user profile.
• With 10 desktop images, 10.5 has 4.25 IOPS, 10.1 has
10.95 IOPS, Symantec has 9.02 IOPS and McAfee has
whopping 22.39 IOPS
• Trend Micro Office Scan 10.5 IOPS has small deviation of
0.77 MB/s and 3.66 MB/s only from baseline and mixed
20 user profile
• Lets recap why 10.5 is so much better with IOPS
• 10.5 Serializes updates and scans per VDI-host
• Pre-scans and white-lists VDI base-images
• Prevents duplicate scanning of unchanged files on a VDI host
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 13
13
14. IOPS – How many Systems?
• A VDI environment sized for 20
desktop images with 4 heavy
and 16 light users.
• Keep IOPS between 6-8 and
see how many desktop images
can be supported with each AV
deployment (Apples to Apples
comparison)
• All about return of investment
• If you deploy McAfee, you can deploy ONLY 2 desktop images in an
environment which supports 20 images without AV
• If you deploy Symantec, you can deploy ONLY 4 desktop images in an
environment which supports 20 images without AV
• If you deploy Trend 10.5, you can deploy ALL 20 desktop images
Customers no longer have to choose
between Security and Return On Investment
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 14
14
16. Memory - Analysis
• Only 10.5 can support 20+ desktop images with mixed
user profile.
• Automatic Pool of 20 desktop images without AV in
Mixed user Profile is consuming around 7.74 GB of
Active Memory
• Trend Micro Office scan 10.5 is putting an overhead of
only 1.32 GB in maximum VDI Density environment.
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 16
16
17. Scan Time with 10.5
VDI Profile Other AV Solution Trend Micro 10.5
Mixed Maximum High Density Approx 1-2 Hours 16 Minutes
VDI Pool(4H &16 L)
Mixed Low Density VDI Pool Approx. 27- 49 minutes 2 Minutes
(1H & 3 L)
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 17
17
18. Scan Time - Analysis
• Trend Micro Office scan 10.5 is performing Approx. 15 -
25 times better in Mixed Low Density VDI pool and 4 -8
times better in Mixed Maximum High Density VDI pool.
• Trend Micro office scan 10.5 with its Smart Scan and VDI
aware capability is consuming remarkably less scan time
than other AV solutions.
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 18
18
19. VDI Security option #2:
Deep Security
Trend Micro Deep Security
Protects virtualized endpoints & servers
• First agent-less anti-malware solution
• Hypervisor-based introspection
• Eliminates “AV storms”
10/4/2010 Copyright 2009 Trend Micro Inc. 19
19
20. Security Built for VMware
Desktop Server Cloud Virtual Appliance
10/4/2010 Copyright 2009 Trend Micro Inc. 20
20
21. Key Issue:
Resource Contention
9:00am Scan
Typical AV
Console
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 21
21
22. Key Issue:
Instant On Gaps
Active, with
Active Dormant security
out-of-date
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 22
22
23. Key Issue:
Mixed Trust Level VMs
ERP Email Web Test CRM
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 23
23
24. Trend Micro Deep Security
IDS / IPS Integrity Log
Anti-Virus Firewall
Monitoring Inspection
Physical Virtual Cloud Desktop/Laptop
Core Protection for Virtual Machines or CPVM deliver Agent Less AV for ESX 3.5 and 4.0.
Deep Security 7.5 will go deeper with vShield on ESX or ESXi 4.1
10/4/2010 Copyright 2009 Trend Micro Inc. 24
24
31. Security Built for VMware
Desktop Server Cloud Virtual Appliance
10/4/2010 Copyright 2009 Trend Micro Inc. 31
31
32. Virtual Appliances
Virtual Appliance
Application
Operating
System
Hypervisor Hypervisor
Hardware Hardware
10/4/2010 Copyright 2009 Trend Micro Inc. 32
32
33. Virtual Appliance Benefits
Virtual Appliance
Costs
70%
IT Flexibility
Per-User
Improve Business Cost of Virtual
Continuity Appliance
A solution that scale over time. Don’t need to buy a bigger physical
appliance. Just add more resources. Don’t need to buy an extra box
for pre-production environment, just fire a new VM or install on any
box that can run CentOS or Red Hat.
10/4/2010 Copyright 2009 Trend Micro Inc. 33
33
34. Trend Micro
Security Virtual Appliances
Virtual Appliance
Web Security
Email Security
Other Trend Micro Product are offered as a virtual appliance :
-Data Loss Prevention Server
-Threat Discovery Virtual Appliance (part of Threat Management Services (TMS)
10/4/2010 Copyright 2009 Trend Micro Inc. 34
34
35. Security Built for VMware
Deep Security Deep Security Deep Security InterScan Web Security
OR AND InterScan Messaging
OfficeScan SecureCloud Security
Desktop Server Cloud Virtual Appliance*
Encryption of the *VMware Certified
virtual file system Appliances
10/4/2010 Copyright 2009 Trend Micro Inc. 35
35
36. Security Built for VMware
10/4/2010 Copyright 2009 Trend Micro Inc. 36
36
37. Trend Micro
Global leader in Internet content security and threat management.
Catalyst for faster adoption of virtualization.
Our Vision:
A world safe for exchanging digital information
Founded • United States in 1988
Headquarters • Tokyo, Japan
Offices • 23 countries
Employees • 4,350
Leadership • US $1 Billion annual revenue
• 3rd largest security company 1,000+ Threat Research Experts
10 labs. 24x7 ops
• “Global 100 Most Sustainable Corporations” Real-time alerts for new threats
• Top 3 in Messaging, Web and Endpoint security
• Leader in virtualization & cloud computing
security
Copyright 2009 Trend Micro Inc.
37
37
38. Questions?
Thank you, merci
New Threats Informations For more informations:
http://blog.trendmicro.com/ Technical:
david_girard@trendmicro.com
514-629-1680
User group Sales:
Groupe d’utilisateurs Michel_bouasria@trendmicro.com
Trend Micro du Québec 514-653-2257
http://www.linkedin.com/groups?gid=2296257 Jean_houle@trendmicro.com
514 893-1512
Classification 10/4/2010 Copyright 2009 Trend Micro Inc. 38
38