complete user protection -...
Post on 17-Jun-2020
4 Views
Preview:
TRANSCRIPT
Complete User Protection
IT Work LoadConsumerization
Copyright 2014 Trend Micro Inc. 2
Then...
Employees
File/Folder &Removable Media
Email &Messaging
WebAccess
Employees
IT Admin
Copyright 2014 Trend Micro Inc. 3
Now!
Email &Messaging
WebAccess
File/Folder &Removable Media
Employees
Device Hopping Cloud Sync& Sharing Collaboration
SocialNetworking
IT Admin
Employees
Copyright 2014 Trend Micro Inc. 4
IT Workload Increasing
Many more environmentsMany more environments
More complex complianceMore complex compliance
IT Admin
Copyright 2014 Trend Micro Inc. 5
Many more environments
A Gradual Transition to the Cloud
“25% of Office customersnow have Office 365.
Microsoft, April 2013
“25% of Office customersnow have Office 365.
Microsoft, April 2013
Copyright 2014 Trend Micro Inc. 6
“25% of Office customersnow have Office 365.
Microsoft, April 2013
Attackers
Attackers
IncreasedOpportunityfor Threatsand DataLoss
IncreasedOpportunityfor Threatsand DataLoss
Evolving Threat LandscapeSo
phist
icat
ion
Copyright 2013 Trend Micro Inc. 10
Time
VulnerabilityExploits
TraditionalMalware
AdvancedMalware
Employee DataLeaks
TargetedAttacks
Soph
istic
atio
n
Customers need a range of capabilities…
Email Security Mobile Security Advanced Threat Protection
Copyright 2014 Trend Micro Inc. 11
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
…but don’t want lots of consoles!
Email Security Mobile Security Advanced Threat Protection!#$%*?!
No interconnectedthreat response
Reduced timeliness
Higher cost
Higher workload
Copyright 2014 Trend Micro Inc. 12
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
IT Admin
Suite vendors help improve this…
Email Security Mobile Security Advanced Threat Protection
Copyright 2014 Trend Micro Inc. 13
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
Trend Micro’sComplete User Protection solution
14Copyright 2014 Trend Micro Inc.
Employees
Email &Messaging
WebAccess
Device HoppingCollaboration
Cloud Sync& Sharing
SocialNetworking
File/Folder &Removable Media
Complete User Protection
Anti-Malware Encryption ApplicationControl
DeviceManagement
Data LossPrevention
ContentFiltering
Employees
IT Admin
Security
Copyright 2014 Trend Micro Inc. 15
Device Control BehaviorMonitoring
VulnerabilityProtection
Sandboxing
FileReputation
WebReputation Web Gateway
Forensics
Network
827M inMarch 2014
827M inMarch 2014 284M in
March 2014284M in
March 2014
Copyright 2014 Trend Micro Inc.
DLP
EncryptionUnpacking
MemoryInspection
Command &Control Blocking
EmailReputation
Email Gatewayor Server
SharePointServer
ApplicationWhitelisting
How does Trend Micro stand out?
Copyright 2014 Trend Micro Inc. 17
SmarterProtection
More FlexibleManagement & Licensing
It’s not about traditional AV anymore
Copyright 2014 Trend Micro Inc. 18
Evolving Threat LandscapeSo
phist
icat
ion
Copyright 2013 Trend Micro Inc. 19
Time
VulnerabilityExploits
TraditionalMalware
AdvancedMalware
Employee DataLeaks
TargetedAttacks
Soph
istic
atio
n
SANDBOXINGSANDBOXING
Trend Delivers BetterProtection
APPLICATION CONTROLAPPLICATION CONTROL
BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCK
SANDBOXINGSANDBOXING
WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION
DEVICE POLICYDEVICE POLICY
New!New!
New!New!
SIG-BASEDSIG-BASED
Copyright 2014 Trend Micro Inc. 20
Employee DataLeaks
Traditionalmalware
Vulnerabilityexploits
AdvancedMalware
TargetedAttacks
APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP
ENCRYPTIONENCRYPTIONNew!New!
Protection On-Premise and in the Cloud
✔ ✔ ✔
Endpoint Protection Messaging Security Secure Web Gateway
Copyright 2014 Trend Micro Inc. 21
✔ ✔ ✔
✔ ✔ ✔New!New!
COLLECTS VIA GLOBAL SENSORNET• Honeypots, customers, threat researchers, community…• Over 300M nodes; 8.6B threat events daily• URLs, vulnerabilities, files, domains, network traffic, threat actors,
mobile apps, IP addresses, exploit kits
BIG DATA ANALYTICS• Identifies using data mining, machine
learning, modeling and correlation• 100 TB data; 500K unique threats
identified daily
Copyright 2013 Trend Micro Inc.
BIG DATA ANALYTICS• Identifies using data mining, machine
learning, modeling and correlation• 100 TB data; 500K unique threats
identified daily
GLOBAL THREAT INTELLIGENCE• 250M threats blocked daily• Email reputation, file reputation, web reputation,
network traffic rules, mobile app reputation, knownvulnerabilities/exploits, threat actor research, C&C…
Copyright 2014 Trend Micro Inc. 23
SmarterProtection
More FlexibleManagement
IT doesn’t want lots of consoles
Email Security Mobile Security Advanced Threat Protection!#$%*?!
Copyright 2014 Trend Micro Inc. 24
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
IT Admin
Simple, Flexible ManagementUser centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise
User centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise
Copyright 2014 Trend Micro Inc. 25
Simple, Flexible LicensingSmart Protection suites
• All cloud and on-premisecapabilities at no extra cost:easy transition
• Subscription license
• Competitively priced
• One-step activation
• 24/7 support included
Smart ProtectionFor Endpoints Complete
Smart Protection suites
• All cloud and on-premisecapabilities at no extra cost:easy transition
• Subscription license
• Competitively priced
• One-step activation
• 24/7 support included
Everything Endpoint
Messaging, Web, Portals
Comprehensive Protection Included
APPLICATION CONTROLAPPLICATION CONTROL
BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCKSANDBOXING INTEGRATIONSANDBOXING INTEGRATION
WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION
DEVICE POLICYDEVICE POLICY
Trend MicroSmart Protection Suites
Copyright 2014 Trend Micro Inc. 27
Employee DataLeaks
Traditionalmalware
Vulnerabilityexploits
AdvancedMalware
TargetedAttacks
APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP
ENCRYPTIONENCRYPTION
Smart Protection for Endpoints Smart Protection Complete
Central Management ✔ ✔
24/7 Support ✔ ✔
On-premise, cloud or hybrid ✔ ✔
Data Loss Prevention ✔ ✔
Anti-malware ✔ ✔
Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔
Copyright 2014 Trend Micro Inc. 28
Endpoint
Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔
Application Control ✔ ✔
Endpoint Encryption ✔ ✔
Mobile Device Mgmt ✔ ✔
Messaging andCollaboration
Messaging Gateway & Mail Server Security ✔
Microsoft Sharepoint and Lync IM Security ✔
Web Secure Web Gateway✔
Part of Your Smart Protection StrategySmart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mix
Copyright 2013 Trend Micro Inc.
Smart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mixSecurity that fits• Better value vs. point solutions• Fits the workload needs for IT security
Thank you!
top related