O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Carregando em…3
×

Confira estes a seguir

1 de 44 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (20)

Semelhante a Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO) (20)

Anúncio

Mais recentes (20)

Anúncio

Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

  1. 1. Eva Chen CEO and Co-Founder Empowering the Business while Efficiently Mitigating Risks 7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.
  2. 2. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012 Copyright 2013 Trend Micro Inc.
  3. 3. Source: Asymco.com, June 2012 Copyright 2013 Trend Micro Inc. Copyright 2013 Trend Micro Inc.
  4. 4. 2.5 QUINTILLION BYTES OF DATA/DAY!90% CREATED IN THE LAST 2 YEARS Source: IBM INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Copyright 2013 Trend Micro Inc.
  5. 5. INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies Copyright 2013 Trend Micro Inc.
  6. 6. Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP) INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Copyright 2013 Trend Micro Inc.
  7. 7. 1NEW THREAT CREATED EVERY SECOND 90% ORGANIZATIONS HAVE ACTIVE MALWARE 55% NOT EVEN AWARE OF INTRUSIONS COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS Protected Health Information (PHI) Intellectual Property (IP) Payment Card Industry (PCI) Personally Identifiable Information (PII) AVERAGE COST OF DATA BREACH$3.7M Copyright 2013 Trend Micro Inc.
  8. 8. Empower the Business… Copyright 2013 Trend Micro Inc.
  9. 9. …while Protecting Information from Theft and Loss Copyright 2013 Trend Micro Inc.
  10. 10. Consumerization ITEmployees Cyber Threats Attackers Cloud & Virtualization Copyright 2013 Trend Micro Inc.
  11. 11. Smart protection for information Simple yet flexible to manage and deploy Security that fits an evolving ecosystem Information no longer protected by traditional defenses Customers Need… Point solutions; limited visibility, de-centralized administration Dynamic, complex environment; many new apps and platforms The New Reality… Copyright 2013 Trend Micro Inc.
  12. 12. Smart protection against theft and loss  Layered – lines of defense  Interconnected – intelligent protection  Real-time – cloud updates  Transparent – no user impact Copyright 2013 Trend Micro Inc.
  13. 13. Simple yet flexible to deploy and manage  Centralized – visibility and control  Automated – policy management  Lightweight – resource efficient  Flexible – on-premise or on-demand Copyright 2013 Trend Micro Inc.
  14. 14. Security that fits an evolving ecosystem  Open – broad platform support  Optimized – designed in partnership  Focused – 100% dedicated to security  Innovative – ahead of the latest threats …and more Copyright 2013 Trend Micro Inc.
  15. 15.  Interconnected  Real-time  Transparent Organizations Need a Smart Protection Strategy  Layered Smart protection for information Simple yet flexible to manage and deploy  Centralized  Automated  Lightweight  Flexible Security that fits an evolving ecosystem  Open  Optimized  Focused  Innovative …and more Copyright 2013 Trend Micro Inc.
  16. 16. SIGNATURE BASED ANTI-MALWARE 1988 - 2007 Smart Protection begins with global threat intelligence… CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE NOW! • Email reputation • File reputation • Web reputation • Whitelisting • Network traffic rules • Mobile app reputation • Vulnerabilities/Exploits • Threat Actor Research • Enhanced File Reputation • Enhanced Web Reputation Copyright 2013 Trend Micro Inc.
  17. 17. Consumerization Cloud & Virtualization Employees IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  18. 18. Email & Messaging Web Access File/Folder & Removable Media IT Admin Then… Copyright 2013 Trend Micro Inc. Employees
  19. 19. Device Hopping Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Now! IT Admin Copyright 2013 Trend Micro Inc. Employees
  20. 20. Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media 91% targeted attacks begin with spear-phishing1 1 million malicious Android apps by end of 20132 1 in 5 use Dropbox at work, typically against rules3 1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012 2. Trend Micro Threat Predictions for 2013 3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni, Sept 2012 Device Hopping Employees IT Admin Security Copyright 2013 Trend Micro Inc.
  21. 21. Employees Complete End User Protection Device Hopping Email & Messaging Web Access Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Copyright 2013 Trend Micro Inc. IT Admin Security Copyright 2013 Trend Micro Inc.
  22. 22. New in 2013: Enhanced Secure Cloud Sync & Share Unique blend: • Sync & Share • DLP • Sharing • Protection • Device Health • App Mgmt Copyright 2013 Trend Micro Inc.
  23. 23. Part of Your Smart Protection Strategy Smart • Layered security from mobile to gateways • Superior architecture; detects real-world threats faster • Unique phishing protection with sandbox analysis Simple • Modular, lightweight and efficient • Unified dashboard with centralized policy control • Integrated DLP for easiest configuration • Flexible deployment: on-premise or as a service Security that fits • Specialized plug-ins for Exchange, Domino, SharePoint • Open: Win, Mac, iOS, Android, Blackberry… Copyright 2013 Trend Micro Inc.
  24. 24. Consumerization Cloud & Virtualization Employees IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  25. 25. Cloud & Virtualization IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  26. 26. Productivity HR CRM Customer Support Finance Supply Chain Commerce Employees Partners Customers Business App Owners Data Center Ops Copyright 2013 Trend Micro Inc.
  27. 27. Productivity HR CRM Customer Support Finance Supply Chain Commerce Data Center Ops Data Center Copyright 2013 Trend Micro Inc.
  28. 28. By 2016, 71% of server workloads will be virtualized1; Organizations can cut costs by 74% by storing data in the cloud2 Data Center Ops Data Center Physical Virtual Private Cloud • Server and VM integrity • Appropriate policy enforcement • Data protection, especially in the cloud • Performance and manageability Security 1. Source: Gartner, Forecast Analysis: Data Center, May 2012 2. Source: Forrester study Public Cloud Copyright 2013 Trend Micro Inc.
  29. 29. Data Center Physical Virtual Public CloudPrivate Cloud Cloud and Data Center Security Anti-Malware Firewall Encryption Integrity Monitoring Intrusion Prevention Log Inspection Data Center Ops Security Copyright 2013 Trend Micro Inc.
  30. 30. • Single platform and administration across physical, virtual and cloud New: • Further differentiating VMware optimization o Improved performance (caching, de- duping) o Stronger protection (automated virtual patching, Hypervisor integrity monitoring) • Hybrid cloud management for Amazon Web Services and VMware vCloud Deep Security: Optimized for Virtualization and Cloud Copyright 2013 Trend Micro Inc.
  31. 31. Part of Your Smart Protection Strategy Smart • Comprehensive protection across physical, virtual, cloud • Automated protection, including virtual patching Simple • Single platform and administration; modular deployment • Market-leading, truly agentless for VMware; enables maximum density, consolidation, and performance • Cloud-friendly: multi-tenancy, usage-based billing… Security that fits • Optimized, automated security for VMware and AWS • Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix… Copyright 2013 Trend Micro Inc.
  32. 32. Cloud & Virtualization Employees IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  33. 33. Employees IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  34. 34. Attacker Gathers intelligence about organization and individuals Employees Targets individuals using social engineering Establishes Command & Control server Moves laterally across network seeking data of interest Extracts data of interest – can go undetected for months! $$$$ Today’s Attacks: Social, Sophisticated, Stealthy! Copyright 2013 Trend Micro Inc. Attacker Gathers intelligence about organization and individuals Employees Targets individuals using social engineering Establishes Command & Control server Moves laterally across network seeking data of interest Extracts data of interest – can go undetected for months! $$$$
  35. 35. Network Admin Security 1.8 successful attacks per week / per large organization1 21.6% organizations experienced APT attacks2 Malware engineered and tested to evade your standard gateway/endpoint defenses  A custom attack needs a custom defense! 1: Source: 2012 Ponemon Study on costs of Cybercrime 2: Source: ISACA APT Awareness Study, 2013 Copyright 2013 Trend Micro Inc.
  36. 36. Custom Defense Network Admin Security Network-wide Detection Threat Intelligence Threat Tools and Services Custom Sandboxes Advanced Threat Analysis Automated Security Updates Copyright 2013 Trend Micro Inc.
  37. 37. Custom Defense Network-wide Detection Threat Intelligence Threat Tools and Services Custom Sandboxes Detect malware, communications and behavior invisible to standard defenses Analyze the risk and characteristics of the attack and attacker Adapt security automatically (IP black lists, custom signatures…) Respond using the insight needed to respond to your specific attackers Enabling a Complete Lifecycle Advanced Threat Analysis Automated Security Updates Copyright 2013 Trend Micro Inc. Network Admin Security
  38. 38. Deep Discovery: at the Heart of the Custom Defense • Advanced threat detection (even non- Windows malware) • Multiple customer- defined sandboxes • Local and global threat intelligence • Single appliance across multiple ports and protocols • Custom security updates to endpoints and gateways Copyright 2013 Trend Micro Inc.
  39. 39. Part of Your Smart Protection Strategy Smart • Advanced, targeted threat detection, including detection of non-Windows malware (i.e. mobile) • Only solution with multiple customer-defined sandboxes for more accurate analysis • Actionable insight from global threat intelligence Simple • Lowest TCO: Single appliance monitors across multiple ports and 80+ protocols • Only solution that enables the full lifecycle: detect, analyze, adapt, respond Security that fits • Sandbox analysis and custom signatures available to other security products Copyright 2013 Trend Micro Inc.
  40. 40. Employees IT Cyber Threats Attacker Copyright 2013 Trend Micro Inc.
  41. 41. Smart Protection Copyright 2013 Trend Micro Inc.
  42. 42. Market Leadership Trend Micro has 27% global share, almost twice the market share of the next two vendors - IDC 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011 “Trend Micro is able to dominate the market because of its diversified geographic reach, established customer base, and brand reputation.” Technavio 2011, Global Virtualization Security Management Solutions Trend Micro extends its market share lead over closest competitor Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 Copyright 2013 Trend Micro Inc.
  43. 43. Organizations Need a Smart Protection Strategy Smart protection for information Simple yet flexible to manage and deploy  Centralized  Automated  Lightweight  Flexible Security that fits an evolving ecosystem  Open  Optimized  Focused  Innovative …and more  Interconnected  Real-time  Transparent  Layered Copyright 2013 Trend Micro Inc.
  44. 44. Thank You!

×