Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
1.
2. Enabling a Smart Protection Strategy
in the age of Consumerization, Cloud and new Cyber Threats
Gastone Nencini
Trend Micro Italy Leader and Snr. Technical
Manager Trend Micro Southern Europe
3. Copyright 2013 Trend Micro Inc.
2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook
Users4
427M
Smart Phones Sold
Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
4. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Source: IBM
2.5 QUINTILLION
BYTES OF DATA/DAY!90% CREATED IN
LAST 2 YEARS
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
5. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
6. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
7. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
NEW THREAT CREATED
EVERY SECOND
90% ORGANIZATIONS HAVE
ACTIVE MALWARE
55%1 NOT EVEN AWARE OF
INTRUSIONS
COMMERCIAL EXPLOIT KITS
USED BY VIRTUALLY ALL
EASTERN EUROPEAN CYBERCRIMINALS
AVERAGE COST
OF DATA BREACH$3.7M
8. Copyright 2013 Trend Micro Inc.
Empower the business:
Improve business agility by providing
quick and intuitive access to the right
information, tools and applications
Mitigate risk:
Protect sensitive information to maintain
brand and comply with regulations,
while controlling costs
CIO
9. Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Cyber Threats
Attackers
Employees IT
10. Copyright 2013 Trend Micro Inc.
Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fits
an evolving ecosystem
Information no longer protected
by traditional defenses
Customers Need…
Point solutions; limited visibility,
de-centralized administration
Dynamic, complex environment;
many new apps and platforms
The New Reality…
11. Copyright 2013 Trend Micro Inc.
Smart protection
for information
Layered – lines of defense
Interconnected – intelligent protection
Real-time – cloud updates
Transparent – no user impact
12. Copyright 2013 Trend Micro Inc.
Simple yet flexible
to deploy and manage
Centralized – visibility and control
Automated – policy management
Lightweight – resource efficient
Flexible – on-premise or as a service
13. Copyright 2013 Trend Micro Inc.
Security that fits
an evolving ecosystem
Open – broad platform support
Optimized – designed in partnership
Focused – 100% dedicated to security
Innovative – ahead of the latest threats …and more
14. Interconnected
Real-time
Transparent
Organizations Need a Smart Protection Strategy
Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Copyright 2013 Trend Micro Inc.
15. Copyright 2013 Trend Micro Inc.
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart protection
begins with global
threat intelligence…
CLOUD BASED
GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN
GLOBAL THREAT
INTELLIGENCE
NOW!
• Email reputation
• File reputation
• Web reputation
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerabilities/Exploits
• Threat Actor Research
• Enhanced File Reputation
• Enhanced Web Reputation
21. Copyright 2013 Trend Micro Inc.
Global
CLOSER TO
THE SOURCE OF
THREATS
Correlated
IDENTIFIES ALL
COMPONENTS
OF AN ATTACK
Proactive
BLOCKS THREATS
AT THEIR SOURCE
Real-time
IDENTIFIES
NEW THREATS
FASTER
22. Copyright 2013 Trend Micro Inc.
Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using
the latest endpoint products with the latest pattern at the time of testing
200
MB
June 2012Oct 2011
289
MB
Competitor A
34MB
Trend Micro
June 2012Oct 2011
33 MB 34 MB
100 --
200 --
300 --
EndpointMalwareDefinitionSize(MB)
Competitor B
June 2012Oct 2011
122
MB
156
MB
• Lightweight cloud infrastructure
• Minimal user and network impact
• Real-time protection
IT Admin
Security
23. Copyright 2013 Trend Micro Inc.
Complete End User Protection
Email &
Messaging
Web
Access
Device Hopping
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Employees
IT Admin
Security
24. Enabling a Complete Lifecycle
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Advanced
Threat Analysis
Threat Tools
and Services
Automated
Security Updates
Threat
Intelligence
Custom
Sandboxes
Detect malware,
communications and
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
Network Admin
Security
26. Interconnected
Real-time
Transparent
Trend Micro Enables a Smart Protection Strategy
Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more