SlideShare uma empresa Scribd logo
1 de 67
Baixar para ler offline
Trend Micro
Corporate Overview
March, 2020
© 2020 Trend Micro Inc.3
DIGITAL
TRANSFORMATION
McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019
MANUFACTURING: Automation, robotics & AI
improve efficiencies & operations in unsafe working
environments: can reduce planned outages by 50%!
HEALTHCARE: Digitally-enabled tools for
diagnosis, treatment & management:
prevents up to 95% of adverse drug events!
FINANCIAL SERVICES: Mobile, blockchain & big data
AI drive customer engagement at a lower cost:
mobile payments will break $1T in 2019!
RETAIL: Omni-channel, IoT, augmented reality &
hyper-personalization drive customer experience
& revenue: in 5 years, 25% of malls will be gone!
© 2020 Trend Micro Inc.4
DIGITAL
TRANSFORMATION
Cloud,
Big data, AI, IoT,
Automation…
© 2020 Trend Micro Inc.5
Top 2 risk issues are organizational
misalignment and overall complexity
Lack of visibility and connectivity across
environments introduces significant risk
73% of organizations had at least one
data breach in 2019, 21% had 7 or more
DIGITAL
TRANSFORMATION
Cyber Risk Index
© 2020 Trend Micro Inc.6
Eva Chen, CEO & Co-founder
Trend Micro
• Cybersecurity focused for 30+ years
• Profitable since going public in 1998,
with over $1.5B in sales (FY2019)
• 500,000+ commercial customers
• 6700+ people passionate about
security across 65+ countries
A world safe for exchanging digital information
© 2020 Trend Micro Inc.7
Trend Micro instantly stops and gives us visibility on zero-
day attacks without us having to intervene, enabling our
small team to deal with protecting a complex environment
while delivering the right information for board-level
reporting and education.Pete Statia, InfoSec
“
“
© 2020 Trend Micro Inc.8
Extended network
and operational
technologies
Services moving to
the cloud, users
more mobile
Branch Office
Multi-cloud migration and
new cloud-native applications
© 2020 Trend Micro Inc.9
Data Center
Workloads
Cloud migration1
Workloads Workloads
Hybrid & multi-cloud
Evolving security processes
Windows relevance
Performance
Central visibility
IT & CLOUD OPS TEAMS
By 2021, over 75% of midsize & large organizations
will have adopted multi-cloud or hybrid IT strategy.
Gartner ; “5 Approaches to Cloud Applications Integration” | Smarter with Gartner | 14 May 2019
© 2020 Trend Micro Inc.10
Data Center
Workloads
Cloud migration1
Workloads Workloads
Ransomware
On-premises security controls, like IPS and
anti-malware, are often not optimized for
the scale and automation requirements of
the cloud, leaving security gaps
Unpatched OS
Unpatched OS
C&C communications
© 2020 Trend Micro Inc.11
Developers
Commit
Code
Repository
Push
Build
Automation
Build
Container Registry
Data Center
Workloads WorkloadsWorkloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Security causing delays
Automation in CI/CD pipeline
Too many tools
Heavy use of Linux
DEVOPS TEAMS
By 2022, 90% of software development
projects will claim to be following DevOps
practices, up from 40% in 2019.
Gartner; “Integrating Security Into the DevSecOps Toolchain” | 15 November 2019 |
G00377293 | Mark Horvath, Neil MacDonald
Cloud-native applications2
© 2020 Trend Micro Inc.12
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud-native applications2
Customer
Open to
malicious file
upload
Container image
vulnerabilities
Code
vulnerabilities
SQL injection3rd party app
vulnerability
Code re-use, DevOps and new
compute models like containers
and serverless expand your
attack surface
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.13
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Rapid growth in new cloud services
Learning curve for configuration
Many teams using cloud services
Lack of visibility
Proving compliance
CLOUD CENTERS OF EXCELLENCE
Through 2023, at least 99% of cloud
security failures will be the customer’s fault.
Gartner; ”Innovation Insight for Cloud Security Posture Management” | 25 January 2019 |
G00377795 | Neil MacDonald
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.14
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Cross-account
access to repository
Open to
Internet
Keys not rotated
frequently enough
Misconfigured cloud
formation templates
Explosion of new cloud services
creates a steep learning curve
resulting in misconfiguration
and vulnerabilities
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.15
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Container
security
File storage
security
Network
securityConformity
Workload
security
Application
security
Need optimized security
across the environment
to mitigate risk
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.17
• Flexible to secure your entire hybrid,
multi-cloud environment
• Automated so you can deliver
scalable security-as-code
• All-in-one solution minimizes
complexity with the right security
tools for all your cloud use cases
© 2020 Trend Micro Inc.18
Trend Micro has been named a
leader with highest score in
current offering and strategy
categories in The Forrester
Wave™: Cloud Workload
Security, Q4 2019
Source: The Forrester Wave™: Cloud Workload Security, Q4 2019
by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on
a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is
based on best available resources. Opinions reflect judgment at the time and are subject to change.
© 2020 Trend Micro Inc.19
8 of 8
Core Controls*
2019 Market Guide for
Cloud Workload Protection Platforms
Trend Micro’s assessment shows
that we deliver the most cloud
security controls and criteria. *
21 of 25
Additional Criteria*
*Based on Trend Micro’s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms;
8 April 2019 | G00356240 | Neil MacDonald.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its
research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartner’s research organization and shouldnot be
construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
© 2020 Trend Micro Inc.20
Source: IDC, Worldwide Software Defined Compute Workload
Security Market Shares, 2018 (DOC #US45638919, November 2019)
#1 market share
for Hybrid Cloud Workload
Security with 35.5%
© 2020 Trend Micro Inc.21
Mario Mendoza
Security Architecture
With Trend Micro’s SaaS-based cloud solution, PCI
compliance has moved from hours of work to a click of a
button. We not only get complete protection, but also time
savings for our team.
“ “
© 2020 Trend Micro Inc.22
Branch Office
© 2020 Trend Micro Inc.23
Wants fast detection & response on
endpoints
Visibility beyond the endpoint
(cross-layer)
SOC/IR TEAMS
Wants effective ransomware
protection
Less time re-imaging
IT OPS TEAMS (Endpoint & Email)
By 2025, cloud-delivered EPP solutions
will grow from 20% of new deals to 95%.
Gartner; “Magic Quadrant for Endpoint Protection Platforms” |
20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al.
By 2021, Gartner expects 70% of public & private
companies to be using cloud email services.
Gartner; “Market Guide for Email Security” | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
© 2020 Trend Micro Inc.24
S
Vulnerable
operating systems
Non-malware fraud (e.g. business email compromise,
credential compromise) focuses here, and 94% of
malware attacks arrive via email*.
*Verizon Data Breach Investigation Report, May 2019
Today’s attacks are stealthy
and often file-less, evading
outdated defenses.
It’s challenging to patch all
endpoints in a timely
fashion. New OS exploits
can spread quickly.
Attack starts with
spear-phishing
Employee tricked into
revealing credentials /
install malware
Lateral movement via
unpatched
vulnerabilities
Users vulnerable to
social engineering
Outdated
defenses
© 2020 Trend Micro Inc.25
Detection of malware,
phishing & fraud
(Office 365 / G Suite)
Modern Endpoint Protection
(advanced detection
techniques + built-in EDR)
Email security must not only
detect malware, but also the
latest social engineering attacks
with advanced features like
writing style analysis
Virtual patching blocks exploits
of unpatched operating system
vulnerabilities, buying time
ahead of patches
Modern endpoint security requires
pre-execution and runtime detection,
with ability to catch file-less threats
e.g. malicious PowerShell
© 2020 Trend Micro Inc.27
• Prevent the broadest range of
threats with the right technique, at
the right time
• Detect more, faster with integrated
detection and response across
endpoints and email
• Complete visibility for holistic
investigation and response
© 2020 Trend Micro Inc.28
Gartner Magic Quadrant for
Endpoint Protection Platforms
August 2019
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from http://www.gartner.com/reprints/trend-micro---
canada?id=1-1OEJAQ6E&ct=190819&st=sb
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner's research organization and should not be construed as statements of
fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
© 2020 Trend Micro Inc.29
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
THE FORRESTER WAVETM
Endpoint Security Suites
Q3 2019
www.trendmicro.com/en_ca/business/products/user
-protection.html?modal=rb-forrester-wave-endpoint-
see-how-07a253
© 2020 Trend Micro Inc.30
https://resources.trendmicro.com/Forrester-Wave-Email.html
THE FORRESTER WAVETM
Enterprise Email Security
Q2 2019
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
© 2020 Trend Micro Inc.31
Leon Backbier
ICT Manager
Trend Micro gives us an easy-to-deploy solution
for security and GDPR compliance, including
integrated management, visibility, and security that
has no performance impact on the endpoint.
“ “
© 2020 Trend Micro Inc.32
Branch Office
© 2020 Trend Micro Inc.33
Branch Office
Wants visibility and security
for the converging OT
environment, & expanding
cloud deployments.
NETWORK SECURITY TEAMS
Wants visibility to
network activity to
help detection &
response
SOC/IR TEAMS
By 2023, 30% of industrial enterprises will have
full, on-premises deployments of IIoT platforms,
up from 15% in 2019
Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019.
By 2021, 50% of all workloads will be run outside
the enterprise data center, either in cloud & data
center infrastructures or at the network edge.
Uptime Institute Annual Data Center Survey, 2019.
© 2020 Trend Micro Inc.34
Branch Office
Cloud deployments aren’t
protected by existing
network security
Unpatched OS & app
vulnerabilities in cloud
deployments
OT environments have wide variety
of device types and patching levels.
IT network security doesn’t fit OT.
Endpoint security & EDR
can’t see unprotected
endpoints / IT devices Unprotected contractor
endpoints
Vulnerable IT
and OT Devices
OS vulnerability
exploit
Compromised hosts
communicating with C&C
Outbound
C&C Traffic
OT exploit from
infected workloads
Contractor laptop as
initial attack vector
© 2020 Trend Micro Inc.35
Branch Office
Cloud IPS
IDS/IPS
Network Analytics
Specialized IDS/IPS
for OTVirtually patching against
exploits protects
unpatched endpoints
The network is the first
line of defense against
threats, and the only
defense for many devices
© 2020 Trend Micro Inc.37
• Wire-speed, network-layer protection
against against the broadest range of
threats
• Flexible network security that
seamlessly extends to the cloud and
OT environments
• Insightful to detect previously
unknown threats in your environment
and share that threat intelligence
with other security layers
© 2020 Trend Micro Inc.38
“Recommended”
Breach Detection System 5
5 Years in a Row and 98.7%
Detection Rate
“Recommended”
Data Center
Intrusion Prevention System
NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report
RECOMMENDED RECOMMENDED
© 2020 Trend Micro Inc.39
Claudia Anania
CIO
With visibility and protection across multiple
environments, we’ve been able to increase our speed
for incident response by 90%, while reducing our
effort for compliance reporting by 90%.
“ “
© 2020 Trend Micro Inc.40
Branch Office
© 2020 Trend Micro Inc.41
Branch Office
User behavior
Endpoint
Vulnerabilities
Social engineering
risk
Code from 3rd party
repositories
Network
vulnerabilities
Application
Vulnerabilities
Old operating
systems
Vulnerable OT
devices
MisconfigurationsRisks & vulnerabilities
across multiple
environments
© 2020 Trend Micro Inc.42
Branch Office
Wants fast detection &
response across
entire environment
SOC/IR TEAMS
88% of organizations will increase spending on
detection and response in the next 18 months to
address cross-layer visibility gaps.
ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
© 2020 Trend Micro Inc.43
Branch Office
Today, the SOC gets
siloed insight into
endpoints (EDR)…
…and limited visibility to
threats affecting cloud
workloads
…a separate siloed
view into network
events…
SOC / IR
Analyst
© 2020 Trend Micro Inc.44
SOC / IR
Analyst
Branch Office
Generating incomplete,
noisy SIEM alerts without
any context
© 2020 Trend Micro Inc.45
Spread to cloud
via compromised
credentials
Branch Office
SOC / IR
Analyst
Threat arrived via
email to another
endpoint
Additional apps
impacted
Spread from cloud to
OT infrastructure
There was more to the
story! It’s important to
see the whole picture.
© 2020 Trend Micro Inc.46
Branch Office
SOC / IR
Analyst
XDR breaks down the
silos and tells a story
instead of noise
XDR
© 2020 Trend Micro Inc.48
Branch Office
VISIBILITY, DETECTION
& RESPONSE (XDR)
© 2020 Trend Micro Inc.49
THE FORRESTER WAVETM
Enterprise Detection
and Response (EDR)
Q1 2020
https://resources.trendmicro.com/Forrester-Wave-EDR.html
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and
Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a
graphical representation of Forrester's call on a market and is plotted using a
detailed spreadsheet with exposed scores, weightings, and comments. Forrester
does not endorse any vendor, product, or service depicted in the Forrester Wave.
Information is based on best available resources. Opinions reflect judgment at the
time and are subject to change.
© 2020 Trend Micro Inc.50 Quotes need to be finalized
Trend Micro enabled me to reduce my breach risk across
ClubCorp AND save almost 30% off my cyber insurance
premiums based on the protection & visibility I now have.
Ed Martinez, CISO
“ “
© 2020 Trend Micro Inc.51
Why Trend Micro?
People, Research, Technology
© 2020 Trend Micro Inc.52
Every Trender is passionate about
making the world a safer and a
better place for everyone.
Donated $4.5M+ to those in
need, and built homes for
1800+ families
Educated 20,000+ small businesses,
1000+ university students, and
2.5M+ kids and families
Trained 300+ new cybersecurity
experts, and enhanced a culture of
diversity and inclusion
500,000+ commercial customers
and millions of consumers
protected
© 2020 Trend Micro Inc.53
Threats Vulnerabilities
& Exploits
Cybercriminal
Undergrounds
IoT OT / IIoTAI & ML Future Threat
Landscape
Targeted
Attacks
Trend Micro Core
Technology & Products
Responsible disclosure to
software/hardware vendors
Public/private partnerships
(e.g. law enforcement)
Threat intelligence and research for
consumers, businesses & governments
© 2020 Trend Micro Inc.54
Zero Day Initiative
• 3500+ independent
vulnerability researchers
• Discovered over half the
vulnerabilities in 2018
Source: IHS Markit, 2018 Public Vulnerability Market
Market Leader in Vulnerability Disclosure
52.3%
13.5%
12.4%
7.2%
5.3%
4.4%
1.8% 1.3%
0.8%
0.7%
0.4%
0.1%
Trend Micro
Cisco
Google
Check Point
Palo Alto
Secunia
Fortinet
iDefense
McAfee
Kaspersky Lab
CERT/CC
SecureAuth
© 2020 Trend Micro Inc.55
The Trusted Source For Law Enforcement
© 2020 Trend Micro Inc.56
VISIBILITY, DETECTION
& RESPONSE (XDR)
Technology Advantage:
Singular focus, years of expertise,
but we always anticipate and adapt
© 2020 Trend Micro Inc.57
Investigation & Response (XDR)
Custom Sandbox Analysis
Intrusion Prevention (IPS) & Firewall
Early Zero-Day Protection
Exploit Prevention & File/Web Reputation
Variant Protection
Application Control
Integrity Monitoring
Pre-execution Machine Learning
Behavioral Analysis
Runtime Machine Learning
Network Content Correlation
SMART
XGen
TM
Security Strategy Maximizes Protection
LEGEND
Known
Good Data
Known
Bad Data
Unknown
Data
Noise
Cancellation
Malicious files &
actions blocked
Safe files &
actions allowed
© 2020 Trend Micro Inc.58
OPTIMIZED
Minimizes IT impact
and operational
challenges
VISIBILITY, DETECTION
& RESPONSE (XDR)
© 2020 Trend Micro Inc.59
VISIBILITY, DETECTION
& RESPONSE (XDR)
CONNECTED
Speeds time to protect,
detect and respond
© 2020 Trend Micro Inc.60
Enable rapid response
through shared threat
intelligence and delivery of
real-time security updates
Detect advanced malware,
suspicious behavior and
communications invisible to
standard defenses
Assess potential
vulnerabilities and
proactively protect
endpoints, servers and
applications
PROTECT
DETECT
RESPOND
Gain holistic visibility, and
rapidly investigate and
respond to threats across
the environment
VISIBILITY, DETECTION
& RESPONSE (XDR)
Enabling Resilience with a Connected Threat Defense
© 2020 Trend Micro Inc.61
• Enable automated threat correlation and alerting on
high priority issues by processing massive amounts of
data in the cloud
• Continuous development and delivery of new
capabilities to solve your needs faster
• Simplify the purchase process with innovative, flexible
pricing aligned to the cloud
• Deliver security via SaaS, lowering operational impacts
and enabling you to focus on business-critical projects
Our Strategy: Cloud Excellence
© 2020 Trend Micro Inc.62
Trend Micro’s connected solutions enabled us to go from four
consoles to one with complete visibility, reducing our
operational workload while protecting us with ZERO breaches
since we deployed.Adrian Foo, IT Manager
“ “
© 2020 Trend Micro Inc.63
In this era of digital
transformation, we enable
organizations to be RESILIENT,
freeing them to go further
and do more.
Trend Micro deployment shifts over time—from
on-premises to SaaS-based solutions. Created
with real data by artist Stefanie Posavec.
© 2020 Trend Micro Inc.65
Extras
© 2020 Trend Micro Inc.66
9 of Top 10 Telecom
8 of Top 10 Petroleum
8 of Top 10 Healthcare
8 of Top 10 Automotive
7 of Top 10 Banking
© 2020 Trend Micro Inc.67
• 250M+ sensors globally
& threat telemetry from
500,000 commercial
customers
• Hundreds of researchers
across 15 global threat
centers
Global Threat Research
© 2020 Trend Micro Inc.68
Working with Industry Partners
© 2020 Trend Micro Inc.69
1990 2000 2010 2012 2014 2016 2018 2019
Gateway
scanning of
SMTP, HTTP, FTP
LAN security
for Microsoft
& Novell
Specialized
security
datacenter
servers
Optimized
security for
VMware
Optimized security
for Microsoft Azure
workloads
IoT Reputation
Service
Cloud workload
protection platform
with integrated
container security
XDR with endpoint,
email, servers, &
network combinedAI-based writing-style DNA
analysis for email fraud
Broadest cloud
security platform
as a serviceOptimized
security for
AWS workloads
2020
Specialized
IPS for OT
Continuous Industry Firsts
© 2020 Trend Micro Inc.70
FREE! Phishing Awareness Service
Send users a realistic
phishing campaign
Raise user awareness
with training
Analyze the results
https://phishinsight.trendmicro.com
© 2020 Trend Micro Inc.71
FREE Cyber Risk Awareness Tool
http://www.trendmicro.com/cyberrisk
Assess your organization’s cyber preparedness,
experience, and future outlook
© 2020 Trend Micro Inc.72
Free security assessment service that scans
O365 inboxes and endpoints to gauge the
overall security posture
A simple way for a security professional to:
• Check their O365 inboxes for undiscovered
email threats
• Check key endpoints for undiscovered
threats
• Review a final report in PDF form to share
with stakeholders outlining any threats
existing in their environments
Cybersecurity Assessment Service
https://assessment.xdr.trendmicro.com

Mais conteúdo relacionado

Mais procurados

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developersMITRE ATT&CK
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...MITRE ATT&CK
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack FundamentalsCenk Ersoy
 
Elastic Observability keynote
Elastic Observability keynoteElastic Observability keynote
Elastic Observability keynoteElasticsearch
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANRobb Boyd
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxAmrMousa51
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookMITRE ATT&CK
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 

Mais procurados (20)

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
Tanium Overview
Tanium OverviewTanium Overview
Tanium Overview
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro... Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack Fundamentals
 
Elastic Observability keynote
Elastic Observability keynoteElastic Observability keynote
Elastic Observability keynote
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 

Semelhante a Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013IMC Institute
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
2019 Enterprise IT Predictions
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT PredictionsMike Pastore
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAMWSO2
 

Semelhante a Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro (20)

Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
2019 Enterprise IT Predictions
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT Predictions
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 

Mais de Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contractingPrime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marPrime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsPrime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - NetmagicPrime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft TeamsPrime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a TargetPrime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentationPrime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 

Mais de Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Último

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

  • 2. © 2020 Trend Micro Inc.3 DIGITAL TRANSFORMATION McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019 MANUFACTURING: Automation, robotics & AI improve efficiencies & operations in unsafe working environments: can reduce planned outages by 50%! HEALTHCARE: Digitally-enabled tools for diagnosis, treatment & management: prevents up to 95% of adverse drug events! FINANCIAL SERVICES: Mobile, blockchain & big data AI drive customer engagement at a lower cost: mobile payments will break $1T in 2019! RETAIL: Omni-channel, IoT, augmented reality & hyper-personalization drive customer experience & revenue: in 5 years, 25% of malls will be gone!
  • 3. © 2020 Trend Micro Inc.4 DIGITAL TRANSFORMATION Cloud, Big data, AI, IoT, Automation…
  • 4. © 2020 Trend Micro Inc.5 Top 2 risk issues are organizational misalignment and overall complexity Lack of visibility and connectivity across environments introduces significant risk 73% of organizations had at least one data breach in 2019, 21% had 7 or more DIGITAL TRANSFORMATION Cyber Risk Index
  • 5. © 2020 Trend Micro Inc.6 Eva Chen, CEO & Co-founder Trend Micro • Cybersecurity focused for 30+ years • Profitable since going public in 1998, with over $1.5B in sales (FY2019) • 500,000+ commercial customers • 6700+ people passionate about security across 65+ countries A world safe for exchanging digital information
  • 6. © 2020 Trend Micro Inc.7 Trend Micro instantly stops and gives us visibility on zero- day attacks without us having to intervene, enabling our small team to deal with protecting a complex environment while delivering the right information for board-level reporting and education.Pete Statia, InfoSec “ “
  • 7. © 2020 Trend Micro Inc.8 Extended network and operational technologies Services moving to the cloud, users more mobile Branch Office Multi-cloud migration and new cloud-native applications
  • 8. © 2020 Trend Micro Inc.9 Data Center Workloads Cloud migration1 Workloads Workloads Hybrid & multi-cloud Evolving security processes Windows relevance Performance Central visibility IT & CLOUD OPS TEAMS By 2021, over 75% of midsize & large organizations will have adopted multi-cloud or hybrid IT strategy. Gartner ; “5 Approaches to Cloud Applications Integration” | Smarter with Gartner | 14 May 2019
  • 9. © 2020 Trend Micro Inc.10 Data Center Workloads Cloud migration1 Workloads Workloads Ransomware On-premises security controls, like IPS and anti-malware, are often not optimized for the scale and automation requirements of the cloud, leaving security gaps Unpatched OS Unpatched OS C&C communications
  • 10. © 2020 Trend Micro Inc.11 Developers Commit Code Repository Push Build Automation Build Container Registry Data Center Workloads WorkloadsWorkloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Security causing delays Automation in CI/CD pipeline Too many tools Heavy use of Linux DEVOPS TEAMS By 2022, 90% of software development projects will claim to be following DevOps practices, up from 40% in 2019. Gartner; “Integrating Security Into the DevSecOps Toolchain” | 15 November 2019 | G00377293 | Mark Horvath, Neil MacDonald Cloud-native applications2
  • 11. © 2020 Trend Micro Inc.12 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud-native applications2 Customer Open to malicious file upload Container image vulnerabilities Code vulnerabilities SQL injection3rd party app vulnerability Code re-use, DevOps and new compute models like containers and serverless expand your attack surface Developers Code Repository Build Automation
  • 12. © 2020 Trend Micro Inc.13 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Rapid growth in new cloud services Learning curve for configuration Many teams using cloud services Lack of visibility Proving compliance CLOUD CENTERS OF EXCELLENCE Through 2023, at least 99% of cloud security failures will be the customer’s fault. Gartner; ”Innovation Insight for Cloud Security Posture Management” | 25 January 2019 | G00377795 | Neil MacDonald Developers Code Repository Build Automation
  • 13. © 2020 Trend Micro Inc.14 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Cross-account access to repository Open to Internet Keys not rotated frequently enough Misconfigured cloud formation templates Explosion of new cloud services creates a steep learning curve resulting in misconfiguration and vulnerabilities Developers Code Repository Build Automation
  • 14. © 2020 Trend Micro Inc.15 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Container security File storage security Network securityConformity Workload security Application security Need optimized security across the environment to mitigate risk Developers Code Repository Build Automation
  • 15. © 2020 Trend Micro Inc.17 • Flexible to secure your entire hybrid, multi-cloud environment • Automated so you can deliver scalable security-as-code • All-in-one solution minimizes complexity with the right security tools for all your cloud use cases
  • 16. © 2020 Trend Micro Inc.18 Trend Micro has been named a leader with highest score in current offering and strategy categories in The Forrester Wave™: Cloud Workload Security, Q4 2019 Source: The Forrester Wave™: Cloud Workload Security, Q4 2019 by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 17. © 2020 Trend Micro Inc.19 8 of 8 Core Controls* 2019 Market Guide for Cloud Workload Protection Platforms Trend Micro’s assessment shows that we deliver the most cloud security controls and criteria. * 21 of 25 Additional Criteria* *Based on Trend Micro’s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms; 8 April 2019 | G00356240 | Neil MacDonald. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartner’s research organization and shouldnot be construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
  • 18. © 2020 Trend Micro Inc.20 Source: IDC, Worldwide Software Defined Compute Workload Security Market Shares, 2018 (DOC #US45638919, November 2019) #1 market share for Hybrid Cloud Workload Security with 35.5%
  • 19. © 2020 Trend Micro Inc.21 Mario Mendoza Security Architecture With Trend Micro’s SaaS-based cloud solution, PCI compliance has moved from hours of work to a click of a button. We not only get complete protection, but also time savings for our team. “ “
  • 20. © 2020 Trend Micro Inc.22 Branch Office
  • 21. © 2020 Trend Micro Inc.23 Wants fast detection & response on endpoints Visibility beyond the endpoint (cross-layer) SOC/IR TEAMS Wants effective ransomware protection Less time re-imaging IT OPS TEAMS (Endpoint & Email) By 2025, cloud-delivered EPP solutions will grow from 20% of new deals to 95%. Gartner; “Magic Quadrant for Endpoint Protection Platforms” | 20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al. By 2021, Gartner expects 70% of public & private companies to be using cloud email services. Gartner; “Market Guide for Email Security” | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
  • 22. © 2020 Trend Micro Inc.24 S Vulnerable operating systems Non-malware fraud (e.g. business email compromise, credential compromise) focuses here, and 94% of malware attacks arrive via email*. *Verizon Data Breach Investigation Report, May 2019 Today’s attacks are stealthy and often file-less, evading outdated defenses. It’s challenging to patch all endpoints in a timely fashion. New OS exploits can spread quickly. Attack starts with spear-phishing Employee tricked into revealing credentials / install malware Lateral movement via unpatched vulnerabilities Users vulnerable to social engineering Outdated defenses
  • 23. © 2020 Trend Micro Inc.25 Detection of malware, phishing & fraud (Office 365 / G Suite) Modern Endpoint Protection (advanced detection techniques + built-in EDR) Email security must not only detect malware, but also the latest social engineering attacks with advanced features like writing style analysis Virtual patching blocks exploits of unpatched operating system vulnerabilities, buying time ahead of patches Modern endpoint security requires pre-execution and runtime detection, with ability to catch file-less threats e.g. malicious PowerShell
  • 24. © 2020 Trend Micro Inc.27 • Prevent the broadest range of threats with the right technique, at the right time • Detect more, faster with integrated detection and response across endpoints and email • Complete visibility for holistic investigation and response
  • 25. © 2020 Trend Micro Inc.28 Gartner Magic Quadrant for Endpoint Protection Platforms August 2019 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/reprints/trend-micro--- canada?id=1-1OEJAQ6E&ct=190819&st=sb Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 26. © 2020 Trend Micro Inc.29 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. THE FORRESTER WAVETM Endpoint Security Suites Q3 2019 www.trendmicro.com/en_ca/business/products/user -protection.html?modal=rb-forrester-wave-endpoint- see-how-07a253
  • 27. © 2020 Trend Micro Inc.30 https://resources.trendmicro.com/Forrester-Wave-Email.html THE FORRESTER WAVETM Enterprise Email Security Q2 2019 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 28. © 2020 Trend Micro Inc.31 Leon Backbier ICT Manager Trend Micro gives us an easy-to-deploy solution for security and GDPR compliance, including integrated management, visibility, and security that has no performance impact on the endpoint. “ “
  • 29. © 2020 Trend Micro Inc.32 Branch Office
  • 30. © 2020 Trend Micro Inc.33 Branch Office Wants visibility and security for the converging OT environment, & expanding cloud deployments. NETWORK SECURITY TEAMS Wants visibility to network activity to help detection & response SOC/IR TEAMS By 2023, 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms, up from 15% in 2019 Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019. By 2021, 50% of all workloads will be run outside the enterprise data center, either in cloud & data center infrastructures or at the network edge. Uptime Institute Annual Data Center Survey, 2019.
  • 31. © 2020 Trend Micro Inc.34 Branch Office Cloud deployments aren’t protected by existing network security Unpatched OS & app vulnerabilities in cloud deployments OT environments have wide variety of device types and patching levels. IT network security doesn’t fit OT. Endpoint security & EDR can’t see unprotected endpoints / IT devices Unprotected contractor endpoints Vulnerable IT and OT Devices OS vulnerability exploit Compromised hosts communicating with C&C Outbound C&C Traffic OT exploit from infected workloads Contractor laptop as initial attack vector
  • 32. © 2020 Trend Micro Inc.35 Branch Office Cloud IPS IDS/IPS Network Analytics Specialized IDS/IPS for OTVirtually patching against exploits protects unpatched endpoints The network is the first line of defense against threats, and the only defense for many devices
  • 33. © 2020 Trend Micro Inc.37 • Wire-speed, network-layer protection against against the broadest range of threats • Flexible network security that seamlessly extends to the cloud and OT environments • Insightful to detect previously unknown threats in your environment and share that threat intelligence with other security layers
  • 34. © 2020 Trend Micro Inc.38 “Recommended” Breach Detection System 5 5 Years in a Row and 98.7% Detection Rate “Recommended” Data Center Intrusion Prevention System NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report RECOMMENDED RECOMMENDED
  • 35. © 2020 Trend Micro Inc.39 Claudia Anania CIO With visibility and protection across multiple environments, we’ve been able to increase our speed for incident response by 90%, while reducing our effort for compliance reporting by 90%. “ “
  • 36. © 2020 Trend Micro Inc.40 Branch Office
  • 37. © 2020 Trend Micro Inc.41 Branch Office User behavior Endpoint Vulnerabilities Social engineering risk Code from 3rd party repositories Network vulnerabilities Application Vulnerabilities Old operating systems Vulnerable OT devices MisconfigurationsRisks & vulnerabilities across multiple environments
  • 38. © 2020 Trend Micro Inc.42 Branch Office Wants fast detection & response across entire environment SOC/IR TEAMS 88% of organizations will increase spending on detection and response in the next 18 months to address cross-layer visibility gaps. ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
  • 39. © 2020 Trend Micro Inc.43 Branch Office Today, the SOC gets siloed insight into endpoints (EDR)… …and limited visibility to threats affecting cloud workloads …a separate siloed view into network events… SOC / IR Analyst
  • 40. © 2020 Trend Micro Inc.44 SOC / IR Analyst Branch Office Generating incomplete, noisy SIEM alerts without any context
  • 41. © 2020 Trend Micro Inc.45 Spread to cloud via compromised credentials Branch Office SOC / IR Analyst Threat arrived via email to another endpoint Additional apps impacted Spread from cloud to OT infrastructure There was more to the story! It’s important to see the whole picture.
  • 42. © 2020 Trend Micro Inc.46 Branch Office SOC / IR Analyst XDR breaks down the silos and tells a story instead of noise XDR
  • 43. © 2020 Trend Micro Inc.48 Branch Office VISIBILITY, DETECTION & RESPONSE (XDR)
  • 44. © 2020 Trend Micro Inc.49 THE FORRESTER WAVETM Enterprise Detection and Response (EDR) Q1 2020 https://resources.trendmicro.com/Forrester-Wave-EDR.html The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 45. © 2020 Trend Micro Inc.50 Quotes need to be finalized Trend Micro enabled me to reduce my breach risk across ClubCorp AND save almost 30% off my cyber insurance premiums based on the protection & visibility I now have. Ed Martinez, CISO “ “
  • 46. © 2020 Trend Micro Inc.51 Why Trend Micro? People, Research, Technology
  • 47. © 2020 Trend Micro Inc.52 Every Trender is passionate about making the world a safer and a better place for everyone. Donated $4.5M+ to those in need, and built homes for 1800+ families Educated 20,000+ small businesses, 1000+ university students, and 2.5M+ kids and families Trained 300+ new cybersecurity experts, and enhanced a culture of diversity and inclusion 500,000+ commercial customers and millions of consumers protected
  • 48. © 2020 Trend Micro Inc.53 Threats Vulnerabilities & Exploits Cybercriminal Undergrounds IoT OT / IIoTAI & ML Future Threat Landscape Targeted Attacks Trend Micro Core Technology & Products Responsible disclosure to software/hardware vendors Public/private partnerships (e.g. law enforcement) Threat intelligence and research for consumers, businesses & governments
  • 49. © 2020 Trend Micro Inc.54 Zero Day Initiative • 3500+ independent vulnerability researchers • Discovered over half the vulnerabilities in 2018 Source: IHS Markit, 2018 Public Vulnerability Market Market Leader in Vulnerability Disclosure 52.3% 13.5% 12.4% 7.2% 5.3% 4.4% 1.8% 1.3% 0.8% 0.7% 0.4% 0.1% Trend Micro Cisco Google Check Point Palo Alto Secunia Fortinet iDefense McAfee Kaspersky Lab CERT/CC SecureAuth
  • 50. © 2020 Trend Micro Inc.55 The Trusted Source For Law Enforcement
  • 51. © 2020 Trend Micro Inc.56 VISIBILITY, DETECTION & RESPONSE (XDR) Technology Advantage: Singular focus, years of expertise, but we always anticipate and adapt
  • 52. © 2020 Trend Micro Inc.57 Investigation & Response (XDR) Custom Sandbox Analysis Intrusion Prevention (IPS) & Firewall Early Zero-Day Protection Exploit Prevention & File/Web Reputation Variant Protection Application Control Integrity Monitoring Pre-execution Machine Learning Behavioral Analysis Runtime Machine Learning Network Content Correlation SMART XGen TM Security Strategy Maximizes Protection LEGEND Known Good Data Known Bad Data Unknown Data Noise Cancellation Malicious files & actions blocked Safe files & actions allowed
  • 53. © 2020 Trend Micro Inc.58 OPTIMIZED Minimizes IT impact and operational challenges VISIBILITY, DETECTION & RESPONSE (XDR)
  • 54. © 2020 Trend Micro Inc.59 VISIBILITY, DETECTION & RESPONSE (XDR) CONNECTED Speeds time to protect, detect and respond
  • 55. © 2020 Trend Micro Inc.60 Enable rapid response through shared threat intelligence and delivery of real-time security updates Detect advanced malware, suspicious behavior and communications invisible to standard defenses Assess potential vulnerabilities and proactively protect endpoints, servers and applications PROTECT DETECT RESPOND Gain holistic visibility, and rapidly investigate and respond to threats across the environment VISIBILITY, DETECTION & RESPONSE (XDR) Enabling Resilience with a Connected Threat Defense
  • 56. © 2020 Trend Micro Inc.61 • Enable automated threat correlation and alerting on high priority issues by processing massive amounts of data in the cloud • Continuous development and delivery of new capabilities to solve your needs faster • Simplify the purchase process with innovative, flexible pricing aligned to the cloud • Deliver security via SaaS, lowering operational impacts and enabling you to focus on business-critical projects Our Strategy: Cloud Excellence
  • 57. © 2020 Trend Micro Inc.62 Trend Micro’s connected solutions enabled us to go from four consoles to one with complete visibility, reducing our operational workload while protecting us with ZERO breaches since we deployed.Adrian Foo, IT Manager “ “
  • 58. © 2020 Trend Micro Inc.63 In this era of digital transformation, we enable organizations to be RESILIENT, freeing them to go further and do more.
  • 59. Trend Micro deployment shifts over time—from on-premises to SaaS-based solutions. Created with real data by artist Stefanie Posavec.
  • 60. © 2020 Trend Micro Inc.65 Extras
  • 61. © 2020 Trend Micro Inc.66 9 of Top 10 Telecom 8 of Top 10 Petroleum 8 of Top 10 Healthcare 8 of Top 10 Automotive 7 of Top 10 Banking
  • 62. © 2020 Trend Micro Inc.67 • 250M+ sensors globally & threat telemetry from 500,000 commercial customers • Hundreds of researchers across 15 global threat centers Global Threat Research
  • 63. © 2020 Trend Micro Inc.68 Working with Industry Partners
  • 64. © 2020 Trend Micro Inc.69 1990 2000 2010 2012 2014 2016 2018 2019 Gateway scanning of SMTP, HTTP, FTP LAN security for Microsoft & Novell Specialized security datacenter servers Optimized security for VMware Optimized security for Microsoft Azure workloads IoT Reputation Service Cloud workload protection platform with integrated container security XDR with endpoint, email, servers, & network combinedAI-based writing-style DNA analysis for email fraud Broadest cloud security platform as a serviceOptimized security for AWS workloads 2020 Specialized IPS for OT Continuous Industry Firsts
  • 65. © 2020 Trend Micro Inc.70 FREE! Phishing Awareness Service Send users a realistic phishing campaign Raise user awareness with training Analyze the results https://phishinsight.trendmicro.com
  • 66. © 2020 Trend Micro Inc.71 FREE Cyber Risk Awareness Tool http://www.trendmicro.com/cyberrisk Assess your organization’s cyber preparedness, experience, and future outlook
  • 67. © 2020 Trend Micro Inc.72 Free security assessment service that scans O365 inboxes and endpoints to gauge the overall security posture A simple way for a security professional to: • Check their O365 inboxes for undiscovered email threats • Check key endpoints for undiscovered threats • Review a final report in PDF form to share with stakeholders outlining any threats existing in their environments Cybersecurity Assessment Service https://assessment.xdr.trendmicro.com