complete user protection -...

Post on 17-Jun-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Complete User Protection

IT Work LoadConsumerization

Copyright 2014 Trend Micro Inc. 2

Then...

Employees

File/Folder &Removable Media

Email &Messaging

WebAccess

Employees

IT Admin

Copyright 2014 Trend Micro Inc. 3

Now!

Email &Messaging

WebAccess

File/Folder &Removable Media

Employees

Device Hopping Cloud Sync& Sharing Collaboration

SocialNetworking

IT Admin

Employees

Copyright 2014 Trend Micro Inc. 4

IT Workload Increasing

Many more environmentsMany more environments

More complex complianceMore complex compliance

IT Admin

Copyright 2014 Trend Micro Inc. 5

Many more environments

A Gradual Transition to the Cloud

“25% of Office customersnow have Office 365.

Microsoft, April 2013

“25% of Office customersnow have Office 365.

Microsoft, April 2013

Copyright 2014 Trend Micro Inc. 6

“25% of Office customersnow have Office 365.

Microsoft, April 2013

Attackers

Attackers

IncreasedOpportunityfor Threatsand DataLoss

IncreasedOpportunityfor Threatsand DataLoss

Evolving Threat LandscapeSo

phist

icat

ion

Copyright 2013 Trend Micro Inc. 10

Time

VulnerabilityExploits

TraditionalMalware

AdvancedMalware

Employee DataLeaks

TargetedAttacks

Soph

istic

atio

n

Customers need a range of capabilities…

Email Security Mobile Security Advanced Threat Protection

Copyright 2014 Trend Micro Inc. 11

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

…but don’t want lots of consoles!

Email Security Mobile Security Advanced Threat Protection!#$%*?!

No interconnectedthreat response

Reduced timeliness

Higher cost

Higher workload

Copyright 2014 Trend Micro Inc. 12

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

IT Admin

Suite vendors help improve this…

Email Security Mobile Security Advanced Threat Protection

Copyright 2014 Trend Micro Inc. 13

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

Trend Micro’sComplete User Protection solution

14Copyright 2014 Trend Micro Inc.

Employees

Email &Messaging

WebAccess

Device HoppingCollaboration

Cloud Sync& Sharing

SocialNetworking

File/Folder &Removable Media

Complete User Protection

Anti-Malware Encryption ApplicationControl

DeviceManagement

Data LossPrevention

ContentFiltering

Employees

IT Admin

Security

Copyright 2014 Trend Micro Inc. 15

Device Control BehaviorMonitoring

VulnerabilityProtection

Sandboxing

FileReputation

WebReputation Web Gateway

Forensics

Network

827M inMarch 2014

827M inMarch 2014 284M in

March 2014284M in

March 2014

Copyright 2014 Trend Micro Inc.

DLP

EncryptionUnpacking

MemoryInspection

Command &Control Blocking

EmailReputation

Email Gatewayor Server

SharePointServer

ApplicationWhitelisting

How does Trend Micro stand out?

Copyright 2014 Trend Micro Inc. 17

SmarterProtection

More FlexibleManagement & Licensing

It’s not about traditional AV anymore

Copyright 2014 Trend Micro Inc. 18

Evolving Threat LandscapeSo

phist

icat

ion

Copyright 2013 Trend Micro Inc. 19

Time

VulnerabilityExploits

TraditionalMalware

AdvancedMalware

Employee DataLeaks

TargetedAttacks

Soph

istic

atio

n

SANDBOXINGSANDBOXING

Trend Delivers BetterProtection

APPLICATION CONTROLAPPLICATION CONTROL

BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCK

SANDBOXINGSANDBOXING

WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION

BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION

DEVICE POLICYDEVICE POLICY

New!New!

New!New!

SIG-BASEDSIG-BASED

Copyright 2014 Trend Micro Inc. 20

Employee DataLeaks

Traditionalmalware

Vulnerabilityexploits

AdvancedMalware

TargetedAttacks

APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP

ENCRYPTIONENCRYPTIONNew!New!

Protection On-Premise and in the Cloud

✔ ✔ ✔

Endpoint Protection Messaging Security Secure Web Gateway

Copyright 2014 Trend Micro Inc. 21

✔ ✔ ✔

✔ ✔ ✔New!New!

COLLECTS VIA GLOBAL SENSORNET• Honeypots, customers, threat researchers, community…• Over 300M nodes; 8.6B threat events daily• URLs, vulnerabilities, files, domains, network traffic, threat actors,

mobile apps, IP addresses, exploit kits

BIG DATA ANALYTICS• Identifies using data mining, machine

learning, modeling and correlation• 100 TB data; 500K unique threats

identified daily

Copyright 2013 Trend Micro Inc.

BIG DATA ANALYTICS• Identifies using data mining, machine

learning, modeling and correlation• 100 TB data; 500K unique threats

identified daily

GLOBAL THREAT INTELLIGENCE• 250M threats blocked daily• Email reputation, file reputation, web reputation,

network traffic rules, mobile app reputation, knownvulnerabilities/exploits, threat actor research, C&C…

Copyright 2014 Trend Micro Inc. 23

SmarterProtection

More FlexibleManagement

IT doesn’t want lots of consoles

Email Security Mobile Security Advanced Threat Protection!#$%*?!

Copyright 2014 Trend Micro Inc. 24

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

IT Admin

Simple, Flexible ManagementUser centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise

User centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise

Copyright 2014 Trend Micro Inc. 25

Simple, Flexible LicensingSmart Protection suites

• All cloud and on-premisecapabilities at no extra cost:easy transition

• Subscription license

• Competitively priced

• One-step activation

• 24/7 support included

Smart ProtectionFor Endpoints Complete

Smart Protection suites

• All cloud and on-premisecapabilities at no extra cost:easy transition

• Subscription license

• Competitively priced

• One-step activation

• 24/7 support included

Everything Endpoint

Messaging, Web, Portals

Comprehensive Protection Included

APPLICATION CONTROLAPPLICATION CONTROL

BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCKSANDBOXING INTEGRATIONSANDBOXING INTEGRATION

WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION

BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION

DEVICE POLICYDEVICE POLICY

Trend MicroSmart Protection Suites

Copyright 2014 Trend Micro Inc. 27

Employee DataLeaks

Traditionalmalware

Vulnerabilityexploits

AdvancedMalware

TargetedAttacks

APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP

ENCRYPTIONENCRYPTION

Smart Protection for Endpoints Smart Protection Complete

Central Management ✔ ✔

24/7 Support ✔ ✔

On-premise, cloud or hybrid ✔ ✔

Data Loss Prevention ✔ ✔

Anti-malware ✔ ✔

Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔

Copyright 2014 Trend Micro Inc. 28

Endpoint

Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔

Application Control ✔ ✔

Endpoint Encryption ✔ ✔

Mobile Device Mgmt ✔ ✔

Messaging andCollaboration

Messaging Gateway & Mail Server Security ✔

Microsoft Sharepoint and Lync IM Security ✔

Web Secure Web Gateway✔

Part of Your Smart Protection StrategySmart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mix

Copyright 2013 Trend Micro Inc.

Smart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mixSecurity that fits• Better value vs. point solutions• Fits the workload needs for IT security

Thank you!

top related