Complete User Protection -...

30
Complete User Protection

Transcript of Complete User Protection -...

Page 1: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Complete User Protection

Page 2: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

IT Work LoadConsumerization

Copyright 2014 Trend Micro Inc. 2

Page 3: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Then...

Employees

File/Folder &Removable Media

Email &Messaging

WebAccess

Employees

IT Admin

Copyright 2014 Trend Micro Inc. 3

Page 4: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Now!

Email &Messaging

WebAccess

File/Folder &Removable Media

Employees

Device Hopping Cloud Sync& Sharing Collaboration

SocialNetworking

IT Admin

Employees

Copyright 2014 Trend Micro Inc. 4

Page 5: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

IT Workload Increasing

Many more environmentsMany more environments

More complex complianceMore complex compliance

IT Admin

Copyright 2014 Trend Micro Inc. 5

Many more environments

Page 6: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

A Gradual Transition to the Cloud

“25% of Office customersnow have Office 365.

Microsoft, April 2013

“25% of Office customersnow have Office 365.

Microsoft, April 2013

Copyright 2014 Trend Micro Inc. 6

“25% of Office customersnow have Office 365.

Microsoft, April 2013

Page 7: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Attackers

Page 8: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Attackers

Page 9: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

IncreasedOpportunityfor Threatsand DataLoss

IncreasedOpportunityfor Threatsand DataLoss

Page 10: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Evolving Threat LandscapeSo

phist

icat

ion

Copyright 2013 Trend Micro Inc. 10

Time

VulnerabilityExploits

TraditionalMalware

AdvancedMalware

Employee DataLeaks

TargetedAttacks

Soph

istic

atio

n

Page 11: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Customers need a range of capabilities…

Email Security Mobile Security Advanced Threat Protection

Copyright 2014 Trend Micro Inc. 11

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

Page 12: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

…but don’t want lots of consoles!

Email Security Mobile Security Advanced Threat Protection!#$%*?!

No interconnectedthreat response

Reduced timeliness

Higher cost

Higher workload

Copyright 2014 Trend Micro Inc. 12

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

IT Admin

Page 13: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Suite vendors help improve this…

Email Security Mobile Security Advanced Threat Protection

Copyright 2014 Trend Micro Inc. 13

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

Page 14: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Trend Micro’sComplete User Protection solution

14Copyright 2014 Trend Micro Inc.

Page 15: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Employees

Email &Messaging

WebAccess

Device HoppingCollaboration

Cloud Sync& Sharing

SocialNetworking

File/Folder &Removable Media

Complete User Protection

Anti-Malware Encryption ApplicationControl

DeviceManagement

Data LossPrevention

ContentFiltering

Employees

IT Admin

Security

Copyright 2014 Trend Micro Inc. 15

Page 16: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Device Control BehaviorMonitoring

VulnerabilityProtection

Sandboxing

FileReputation

WebReputation Web Gateway

Forensics

Network

827M inMarch 2014

827M inMarch 2014 284M in

March 2014284M in

March 2014

Copyright 2014 Trend Micro Inc.

DLP

EncryptionUnpacking

MemoryInspection

Command &Control Blocking

EmailReputation

Email Gatewayor Server

SharePointServer

ApplicationWhitelisting

Page 17: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

How does Trend Micro stand out?

Copyright 2014 Trend Micro Inc. 17

SmarterProtection

More FlexibleManagement & Licensing

Page 18: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

It’s not about traditional AV anymore

Copyright 2014 Trend Micro Inc. 18

Page 19: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Evolving Threat LandscapeSo

phist

icat

ion

Copyright 2013 Trend Micro Inc. 19

Time

VulnerabilityExploits

TraditionalMalware

AdvancedMalware

Employee DataLeaks

TargetedAttacks

Soph

istic

atio

n

Page 20: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

SANDBOXINGSANDBOXING

Trend Delivers BetterProtection

APPLICATION CONTROLAPPLICATION CONTROL

BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCK

SANDBOXINGSANDBOXING

WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION

BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION

DEVICE POLICYDEVICE POLICY

New!New!

New!New!

SIG-BASEDSIG-BASED

Copyright 2014 Trend Micro Inc. 20

Employee DataLeaks

Traditionalmalware

Vulnerabilityexploits

AdvancedMalware

TargetedAttacks

APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP

ENCRYPTIONENCRYPTIONNew!New!

Page 21: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Protection On-Premise and in the Cloud

✔ ✔ ✔

Endpoint Protection Messaging Security Secure Web Gateway

Copyright 2014 Trend Micro Inc. 21

✔ ✔ ✔

✔ ✔ ✔New!New!

Page 22: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

COLLECTS VIA GLOBAL SENSORNET• Honeypots, customers, threat researchers, community…• Over 300M nodes; 8.6B threat events daily• URLs, vulnerabilities, files, domains, network traffic, threat actors,

mobile apps, IP addresses, exploit kits

BIG DATA ANALYTICS• Identifies using data mining, machine

learning, modeling and correlation• 100 TB data; 500K unique threats

identified daily

Copyright 2013 Trend Micro Inc.

BIG DATA ANALYTICS• Identifies using data mining, machine

learning, modeling and correlation• 100 TB data; 500K unique threats

identified daily

GLOBAL THREAT INTELLIGENCE• 250M threats blocked daily• Email reputation, file reputation, web reputation,

network traffic rules, mobile app reputation, knownvulnerabilities/exploits, threat actor research, C&C…

Page 23: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Copyright 2014 Trend Micro Inc. 23

SmarterProtection

More FlexibleManagement

Page 24: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

IT doesn’t want lots of consoles

Email Security Mobile Security Advanced Threat Protection!#$%*?!

Copyright 2014 Trend Micro Inc. 24

Secure Web Gateway

SharePoint Security

Endpoint Protection

Encryption

Application Control

DLP

IT Admin

Page 25: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Simple, Flexible ManagementUser centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise

User centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise

Copyright 2014 Trend Micro Inc. 25

Page 26: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Simple, Flexible LicensingSmart Protection suites

• All cloud and on-premisecapabilities at no extra cost:easy transition

• Subscription license

• Competitively priced

• One-step activation

• 24/7 support included

Smart ProtectionFor Endpoints Complete

Smart Protection suites

• All cloud and on-premisecapabilities at no extra cost:easy transition

• Subscription license

• Competitively priced

• One-step activation

• 24/7 support included

Everything Endpoint

Messaging, Web, Portals

Page 27: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Comprehensive Protection Included

APPLICATION CONTROLAPPLICATION CONTROL

BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCKSANDBOXING INTEGRATIONSANDBOXING INTEGRATION

WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION

BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION

DEVICE POLICYDEVICE POLICY

Trend MicroSmart Protection Suites

Copyright 2014 Trend Micro Inc. 27

Employee DataLeaks

Traditionalmalware

Vulnerabilityexploits

AdvancedMalware

TargetedAttacks

APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP

ENCRYPTIONENCRYPTION

Page 28: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Smart Protection for Endpoints Smart Protection Complete

Central Management ✔ ✔

24/7 Support ✔ ✔

On-premise, cloud or hybrid ✔ ✔

Data Loss Prevention ✔ ✔

Anti-malware ✔ ✔

Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔

Copyright 2014 Trend Micro Inc. 28

Endpoint

Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔

Application Control ✔ ✔

Endpoint Encryption ✔ ✔

Mobile Device Mgmt ✔ ✔

Messaging andCollaboration

Messaging Gateway & Mail Server Security ✔

Microsoft Sharepoint and Lync IM Security ✔

Web Secure Web Gateway✔

Page 29: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Part of Your Smart Protection StrategySmart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mix

Copyright 2013 Trend Micro Inc.

Smart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mixSecurity that fits• Better value vs. point solutions• Fits the workload needs for IT security

Page 30: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product

Thank you!