SlideShare uma empresa Scribd logo
1 de 26
Welcome to: The Smart Protection Network
Agenda



1             2              3                4

Trend Micro       Changing         Smart
                  Malware        Protection       Wrap-Up
 Overview
                   Market         Network
Trend Micro Overview
Vision and Mission

   Our Vision
            A world where it is absolutely safe
            to exchange digital information

                              t ec tion
   Our Mission
                      Pro
                   rtdeliver, andnched
             ma
           S most flexible au customizable
           Develop,               support
           the         k L and h
                wor solutions to
          N  et
           Internet security 18t
           address the ne
                   Ju ever-changing
           threats on the Web
Trend Micro’s Global Availability




                     Headquartered:
                      Tokyo, Japan    Founded:
                                       LA 1988
                      Research &
                     Development




                                             4,000
                                           Employees



              Slide #5
Trend Micro Vital Stats



Sales: Channel/Partner
Consultancy: Channel/Partner
Support: Channel/Partner

                                     2007
                                 Revenue:
                               $848 Million
Segments

                           Enterprise
                            Security




    Smart Protection Network
Changing Malware Market
Crimeware
                                                       is
                                                    Driving
                                                    Malware




04/27/08   5
           9   Copyright 2008 - Trend Micro Inc.
Increasing Threat



                                    {
                                        Malware Samples
                                    • 1988: 1,738

         Malware is Multiplying     • 1998: 177,615
                                    • 2008: 1,100,000+
                                    • Pattern Files Can’t Keep Up




     Malware is becoming
   increasingly dangerous
        Malware is Sophisticated

     and harder to detect.
                                    {   Malware Variants
                                    • Multi-Vector
                                    • Polymorphic
                                    • Rapid Variants




                                    {
                                        Malware Actions
                                    • Stealthy

         Malware is Profit-Driven   • Targeted
                                    • Crime & Espionage
                                    • Increased Liability Costs
Underground Economy

                                  Asset                                                  Going-rate

 Pay-out for each unique adware installation                           $0.02-0.30

 Malware package, basic version                                        $1,000 – $2,000

 Malware package with add-on services                                  Starting at $20

 Exploit kit rental (1 hour)                                           $0.99 to $1

 Exploit kit rental (2.5 hours)                                        $1.60 to $2

 Exploit kit rental (5 hours)                                          $4, may vary

 Undetected copy of info-sealing Trojan                                $80, may vary

 Distributed Denial of Service attack                                  $100 per day

 10,000 compromised PCs                                                $1,000

 Stolen bank account credentials                                       Starting at $50

 1 million freshly-harvested emails (unver)                            $8 and up


Sample data from research on the underground digital economy in 2007
Projected Threats
30,000.00


                                              me
25,000.00                         at of Volu           PER HO
                                                             UR
                              Thre       hreat Sa
                                                 mples
                                     ue T
                                      Uniq
                     d Inc rease in
20,000.00   Projectetive Projections)                                By
            (Conser
                   a
                   v                                              233 2015
                                                                     ,000
                                                                   Per    ,000
15,000.00                                                              Y ea
                                                                           r

10,000.00



 5,000.00



    0.00
             2006      2007     2008         2009   2010   2011    2012   2013   2014   2015
Smart Protection Network
Next generation architecture


 Threat Protection
    Databases
                     Slowly Updating Patterns
                           < 50 Per Day         Small Pattern DB




                             Patterns


                                                     Past
PAST
Trend Micro Smart Protection Network
 Security Made Smarter                                                                       • 3.5 billion URL requests per day
                                                             Web                               20 million+ install base
                                                           Reputation                          99.9999%+ uptime
Threats
                                                                                             • 5 data center (US, EMEA, APAC)
                                                                                               1000 production servers
                      Threat Collection      Email                                 File
                                           Reputation        URL                Reputation
                 • Customers
                 • Partners
                 • TrendLabs Research,                  Threat Analysis
                   Service & Support                      TrendLabs &                          Management
                 • Samples                    IP        Malware Database            Files
                 • Submissions
                 • Honeypots
                 • Web Crawling
                 • Feedback Loops
                 • Behavioral Analysis




                                                        Multi-Threat
                                                                                                          SaaS/Managed
          Partners                                      Correlation
          • ISPs                                                                                              Cloud
          • Routers
          • Etc.

                                             Endpoint
                             Off Network                                                      Gateway


                                                                        Messaging
In-the-Cloud File Reputation



          Product                  In-the-Cloud                   Part of Smart
        Launch in 1H                Thin-Client                    Protection
           2009                    File Scanning                    Network




   Rapid             Extends
Protection         Existing File        White/                              Strengthens
                                                     Virtualization
 from File          Scanning         Black Listing                          Data-Centre
                                                        Support
Modifying           Features         Functionality                          Correlation
 Malware
Already Live
Smart Protection Network:
Products
Smart Protection Network
Product Support

•   Web Reputation
     –   TIS & TIS Pro 2008, 2009 (Consumer)
     –   WFBS Standard & Advanced (Small Business)
     –   OfficeScan 8.x (Medium & Enterprise)
     –   IWSS/IWSVA 3.x (Medium & Enterprise)
     –   Communication &Collaboration Solution (Medium & Enterprise)
•   Email Reputation
     – WFBS Advanced (Small Business)
     – IMSS/IMSVA Advanced (Medium & Enterprise)
     – Spam Prevention Solution (Medium & Enterprise)
     – IMHS Standard & Advanced (includes web reputation for embedded links
       within email) (Small, Medium & Enterprise)
     – Communication &Collaboration Solution (Medium & Enterprise)
•   File Reputation (Whitelisting)
     – TIS & TIS Pro 2008, 2009 (Consumer)
     – WFBS Standard & Advanced v5.1 (Small Business)
     – OfficeScan 10 Hybrid Client
Small Business
                                 Services


Incoming Threats
                             E              W                                                 Worry-Free™ Remote Manager
                              InterScan™
                               Messaging
                             Hosted Security




                              Worry-Free™                                              Small Business
                                                                      Gateway         Server/Exchange                Desktop & Server
                               SecureSite


                                                                  E             W                                      Worry-Free
                                                                                                                        Standard
                                                                  Gateway Security                               W                  F
                                                                  Partner Solutions
                                                                       Linksys
Outgoing Threats          Internet
                                                                                        E      W        Worry Free
                                                                                                        Advanced                    F



                       Web Reputation           File Reputation
Email Reputation

IP                 E
                       URL            W         Files
                                                            F

                                                    Future
Smart Protection Network
Medium Business
                                 Services
Incoming Threats


                          E    InterScan™   W                          Gateway                     Mail Server               Desktop & Server
                                Messaging
                              Hosted Security
                                                                  W
                                                                                                                                        W F
                                                                      InterScan™
                                                                      Web Security
                                                                                               E                 W
                                                                  E                  W              ScanMail™
                                                                                                                                OfficeScan™


                         Internet
                                                                      InterScan™
Outgoing Threats                                                       Messaging
                                                                        Security

                                                                                              E W       Client Server Messaging Suite         F
                                                                  E       W                        NeatSuite™
                                                                                                                                              F

   Email Reputation    Web Reputation           File Reputation

   IP
                   E   URL           W          Files
                                                            F                              Trend Micro LeakProof ™

                                                                                         Trend Micro Message Archiver
                                                    Future
     Smart Protection Network                                                                   24 x 7 Support
Enterprise Business
                                                                                                           Management


                                                                                                                    Security Management
Incoming Threats
                         Software as a Services                                                           File
                                                                                                        Caching                                        F
                                                                                                         Server
                         E                 W
                              InterScan™
                               Messaging
                             Hosted Security                                                    Collaboration/Storage
                                                                         Gateway
                                                                                                                                     Desktop & Server
                                                                                                  E                       W
                                                                   E                  W                                          F                   W
                                                                                                         ScanMail™

                         Internet                                      InterScan™
                                                                        Messaging                                                      OfficeScan™

Outgoing Threats
                                                                         Security              W
                                                                                      W                                          F                     W
                                                                                                       IM Security for
                                                                                                        OCS Solution                  ServerProtect™
                                                                       InterScan™
                                                                       Web Security

                                                                                               W
                                                                                                      SharePoint Portal

                                               File Reputation
   Email Reputation    Web Reputation
                                                                                 Threat Management (Network)                      Remote/Off Network
   IP
                   E   URL          W
                                               Files
                                                              F               Firewall/UTM             W
                                                                                  IPS/IDS
                                                                                              E                                   F                    W
                                                                                   Threat
                                                   Future                     Management

     Smart Protection Network
                                                       Slide #25
Wrap-Up
Smart Protection Network
Unique Benefits




    Less Network Traffic         Removes Pattern Monitoring/
                                       Management
                             Smart
                           Protection
                            Network
                             (USP)

  Lightweight Clients, Less       Protects Customers in
          Memory                        Near Real Time
Smart Protection Network
Unique Benefits

        Less Staff Time

        Reduced Costs

        Improved Productivity

        Lowered Data Theft

        Enhanced Legal Compliance
The End

Mais conteúdo relacionado

Mais procurados

Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceUlf Mattsson
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introductionyonifine
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 

Mais procurados (20)

Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introduction
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 

Semelhante a Introduction - The Smart Protection Network

Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011Agora Group
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper Networks
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Tripwire
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Jim Kaskade
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Mark Evertz
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Towards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsTowards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsVenkat Venkatraman
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 

Semelhante a Introduction - The Smart Protection Network (20)

Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press Conference
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Towards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected WebsTowards Network Society: Five Interconnected Webs
Towards Network Society: Five Interconnected Webs
 
Venkatraman five webs
Venkatraman five websVenkatraman five webs
Venkatraman five webs
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 

Mais de Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Andrew Wong
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTAndrew Wong
 

Mais de Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
 

Último

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Introduction - The Smart Protection Network

  • 1. Welcome to: The Smart Protection Network
  • 2. Agenda 1 2 3 4 Trend Micro Changing Smart Malware Protection Wrap-Up Overview Market Network
  • 4. Vision and Mission Our Vision A world where it is absolutely safe to exchange digital information t ec tion Our Mission Pro rtdeliver, andnched ma S most flexible au customizable Develop, support the k L and h wor solutions to N et Internet security 18t address the ne Ju ever-changing threats on the Web
  • 5. Trend Micro’s Global Availability Headquartered: Tokyo, Japan Founded: LA 1988 Research & Development 4,000 Employees Slide #5
  • 6. Trend Micro Vital Stats Sales: Channel/Partner Consultancy: Channel/Partner Support: Channel/Partner 2007 Revenue: $848 Million
  • 7. Segments Enterprise Security Smart Protection Network
  • 9. Crimeware is Driving Malware 04/27/08 5 9 Copyright 2008 - Trend Micro Inc.
  • 10. Increasing Threat { Malware Samples • 1988: 1,738 Malware is Multiplying • 1998: 177,615 • 2008: 1,100,000+ • Pattern Files Can’t Keep Up Malware is becoming increasingly dangerous Malware is Sophisticated and harder to detect. { Malware Variants • Multi-Vector • Polymorphic • Rapid Variants { Malware Actions • Stealthy Malware is Profit-Driven • Targeted • Crime & Espionage • Increased Liability Costs
  • 11. Underground Economy Asset Going-rate Pay-out for each unique adware installation $0.02-0.30 Malware package, basic version $1,000 – $2,000 Malware package with add-on services Starting at $20 Exploit kit rental (1 hour) $0.99 to $1 Exploit kit rental (2.5 hours) $1.60 to $2 Exploit kit rental (5 hours) $4, may vary Undetected copy of info-sealing Trojan $80, may vary Distributed Denial of Service attack $100 per day 10,000 compromised PCs $1,000 Stolen bank account credentials Starting at $50 1 million freshly-harvested emails (unver) $8 and up Sample data from research on the underground digital economy in 2007
  • 12. Projected Threats 30,000.00 me 25,000.00 at of Volu PER HO UR Thre hreat Sa mples ue T Uniq d Inc rease in 20,000.00 Projectetive Projections) By (Conser a v 233 2015 ,000 Per ,000 15,000.00 Y ea r 10,000.00 5,000.00 0.00 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
  • 14. Next generation architecture Threat Protection Databases Slowly Updating Patterns < 50 Per Day Small Pattern DB Patterns Past PAST
  • 15. Trend Micro Smart Protection Network Security Made Smarter • 3.5 billion URL requests per day Web 20 million+ install base Reputation 99.9999%+ uptime Threats • 5 data center (US, EMEA, APAC) 1000 production servers Threat Collection Email File Reputation URL Reputation • Customers • Partners • TrendLabs Research, Threat Analysis Service & Support TrendLabs & Management • Samples IP Malware Database Files • Submissions • Honeypots • Web Crawling • Feedback Loops • Behavioral Analysis Multi-Threat SaaS/Managed Partners Correlation • ISPs Cloud • Routers • Etc. Endpoint Off Network Gateway Messaging
  • 16. In-the-Cloud File Reputation Product In-the-Cloud Part of Smart Launch in 1H Thin-Client Protection 2009 File Scanning Network Rapid Extends Protection Existing File White/ Strengthens Virtualization from File Scanning Black Listing Data-Centre Support Modifying Features Functionality Correlation Malware
  • 19. Smart Protection Network Product Support • Web Reputation – TIS & TIS Pro 2008, 2009 (Consumer) – WFBS Standard & Advanced (Small Business) – OfficeScan 8.x (Medium & Enterprise) – IWSS/IWSVA 3.x (Medium & Enterprise) – Communication &Collaboration Solution (Medium & Enterprise) • Email Reputation – WFBS Advanced (Small Business) – IMSS/IMSVA Advanced (Medium & Enterprise) – Spam Prevention Solution (Medium & Enterprise) – IMHS Standard & Advanced (includes web reputation for embedded links within email) (Small, Medium & Enterprise) – Communication &Collaboration Solution (Medium & Enterprise) • File Reputation (Whitelisting) – TIS & TIS Pro 2008, 2009 (Consumer) – WFBS Standard & Advanced v5.1 (Small Business) – OfficeScan 10 Hybrid Client
  • 20. Small Business Services Incoming Threats E W Worry-Free™ Remote Manager InterScan™ Messaging Hosted Security Worry-Free™ Small Business Gateway Server/Exchange Desktop & Server SecureSite E W Worry-Free Standard Gateway Security W F Partner Solutions Linksys Outgoing Threats Internet E W Worry Free Advanced F Web Reputation File Reputation Email Reputation IP E URL W Files F Future Smart Protection Network
  • 21. Medium Business Services Incoming Threats E InterScan™ W Gateway Mail Server Desktop & Server Messaging Hosted Security W W F InterScan™ Web Security E W E W ScanMail™ OfficeScan™ Internet InterScan™ Outgoing Threats Messaging Security E W Client Server Messaging Suite F E W NeatSuite™ F Email Reputation Web Reputation File Reputation IP E URL W Files F Trend Micro LeakProof ™ Trend Micro Message Archiver Future Smart Protection Network 24 x 7 Support
  • 22. Enterprise Business Management Security Management Incoming Threats Software as a Services File Caching F Server E W InterScan™ Messaging Hosted Security Collaboration/Storage Gateway Desktop & Server E W E W F W ScanMail™ Internet InterScan™ Messaging OfficeScan™ Outgoing Threats Security W W F W IM Security for OCS Solution ServerProtect™ InterScan™ Web Security W SharePoint Portal File Reputation Email Reputation Web Reputation Threat Management (Network) Remote/Off Network IP E URL W Files F Firewall/UTM W IPS/IDS E F W Threat Future Management Smart Protection Network Slide #25
  • 24. Smart Protection Network Unique Benefits Less Network Traffic Removes Pattern Monitoring/ Management Smart Protection Network (USP) Lightweight Clients, Less Protects Customers in Memory Near Real Time
  • 25. Smart Protection Network Unique Benefits Less Staff Time Reduced Costs Improved Productivity Lowered Data Theft Enhanced Legal Compliance