Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

44
Eva Chen CEO and Co-Founder Empowering the Business while Efficiently Mitigating Risks 7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.

description

This is the presentation of Eva Chen - CEO and Co-founder of Trend Micro at Direction Executive Summit 2013 which hold at Seoul, Korea - May 2013.

Transcript of Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Page 1: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Eva Chen

CEO and Co-Founder

Empowering the Business while Efficiently Mitigating Risks

7/2/2013 Confidential | Copyright 2012 Trend Micro Inc.

Page 2: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

2.4B Internet Users1

1 Trillion+ URLs indexed

by Google2

665M Web Sites3

1B Facebook Users4

427M Smart Phones

Sold Last Year5

54%

of Facebook

Access is via

Mobile6

Sources – 1: Internet World Stats, Dec 2012;

2: Google, 2008;

3: NetCraft Site Data, July 2012;

4: Facebook, Oct 2012; 5: Gartner 2012;

6: SocialBakers, May 2012

Copyright 2013 Trend Micro Inc.

Page 3: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Source:

Asymco.com, June 2012

Copyright 2013 Trend Micro Inc. Copyright 2013 Trend Micro Inc.

Page 4: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

2.5 QUINTILLION BYTES OF DATA/DAY! 90%

CREATED IN THE

LAST 2 YEARS

Source: IBM

INFORMATION HAS BECOME

YOUR MOST STRATEGIC ASSET

Copyright 2013 Trend Micro Inc.

Page 5: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

INFORMATION HAS BECOME

YOUR MOST STRATEGIC ASSET

Identify trends

Understand customer behavior

Analyze opportunities

Discover efficiencies

Copyright 2013 Trend Micro Inc.

Page 6: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Payment Card Industry (PCI)

Protected Health Information (PHI)

Personally Identifiable Information (PII)

Intellectual Property (IP)

INFORMATION HAS BECOME

YOUR MOST STRATEGIC ASSET

Copyright 2013 Trend Micro Inc.

Page 7: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

1 NEW THREAT CREATED

EVERY SECOND 90% ORGANIZATIONS HAVE

ACTIVE MALWARE 55% NOT EVEN AWARE OF

INTRUSIONS

COMMERCIAL EXPLOIT KITS

USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS

Protected Health Information (PHI)

Intellectual Property (IP)

Payment Card Industry (PCI)

Personally Identifiable Information (PII)

AVERAGE COST

OF DATA BREACH $3.7M

Copyright 2013 Trend Micro Inc.

Page 8: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Empower the Business…

Copyright 2013 Trend Micro Inc.

Page 9: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

…while Protecting Information from Theft and Loss

Copyright 2013 Trend Micro Inc.

Page 10: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Consumerization

IT Employees

Cyber Threats

Attackers

Cloud &

Virtualization

Copyright 2013 Trend Micro Inc.

Page 11: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Smart protection

for information

Simple yet flexible

to manage and deploy

Security that fits an evolving ecosystem

Information no longer protected

by traditional defenses

Customers Need…

Point solutions; limited visibility,

de-centralized administration

Dynamic, complex environment;

many new apps and platforms

The New Reality…

Copyright 2013 Trend Micro Inc.

Page 12: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Smart protection against theft and loss

Layered – lines of defense

Interconnected – intelligent protection

Real-time – cloud updates

Transparent – no user impact

Copyright 2013 Trend Micro Inc.

Page 13: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Simple yet flexible to deploy and manage

Centralized – visibility and control

Automated – policy management

Lightweight – resource efficient

Flexible – on-premise or on-demand

Copyright 2013 Trend Micro Inc.

Page 14: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Security that fits an evolving ecosystem

Open – broad platform support

Optimized – designed in partnership

Focused – 100% dedicated to security

Innovative – ahead of the latest threats …and more

Copyright 2013 Trend Micro Inc.

Page 15: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Interconnected

Real-time

Transparent

Organizations Need a Smart Protection Strategy

Layered

Smart protection for information

Simple yet flexible to manage and deploy

Centralized

Automated

Lightweight

Flexible

Security that fits an evolving ecosystem

Open

Optimized

Focused

Innovative

…and more

Copyright 2013 Trend Micro Inc.

Page 16: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Big Data Analytics-driven

Global Threat Intelligence

Added protection:

• Whitelisting

• Network traffic rules

• Mobile app reputation

• Vulnerability shielding

SIGNATURE BASED

ANTI-MALWARE

1988 - 2007

Smart Protection begins with global threat intelligence…

CLOUD BASED GLOBAL THREAT

INTELLIGENCE

2008

BIG DATA

ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE

NOW! • Email reputation

• File reputation

• Web reputation

• Whitelisting

• Network traffic rules

• Mobile app reputation

• Vulnerabilities/Exploits

• Threat Actor Research

• Enhanced File Reputation

• Enhanced Web Reputation

Copyright 2013 Trend Micro Inc.

Page 17: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Consumerization

Cloud &

Virtualization

Employees IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 18: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Email &

Messaging

Web

Access

File/Folder &

Removable Media

IT Admin

Then…

Copyright 2013 Trend Micro Inc.

Employees

Page 19: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Device Hopping

Email &

Messaging

Web

Access

Collaboration

Cloud Sync

& Sharing

Social

Networking File/Folder &

Removable Media

Now!

IT Admin

Copyright 2013 Trend Micro Inc.

Employees

Page 20: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Email &

Messaging

Web

Access

Collaboration

Cloud Sync

& Sharing

Social

Networking File/Folder &

Removable Media

91% targeted attacks begin with spear-phishing1

1 million malicious Android apps by end of 20132

1 in 5 use Dropbox at work, typically against rules3

1. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012

2. Trend Micro Threat Predictions for 2013

3. Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni,

Sept 2012

Device Hopping

Employees

IT Admin

Security

Copyright 2013 Trend Micro Inc.

Page 21: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Employees

Complete End User Protection

Device Hopping

Email &

Messaging

Web

Access

Collaboration

Cloud Sync

& Sharing

Social

Networking File/Folder &

Removable Media

Anti-Malware Encryption Application

Control

Device

Management Data Loss

Prevention

Content

Filtering

Copyright 2013 Trend Micro Inc.

IT Admin

Security

Copyright 2013 Trend Micro Inc.

Page 22: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

New in 2013: Enhanced Secure Cloud Sync & Share

Unique blend:

• Sync & Share

• DLP

• Sharing

• Protection

• Device Health

• App Mgmt

Copyright 2013 Trend Micro Inc.

Page 23: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Part of Your Smart Protection Strategy

Smart • Layered security from mobile to gateways

• Superior architecture; detects real-world threats faster

• Unique phishing protection with sandbox analysis

Simple • Modular, lightweight and efficient

• Unified dashboard with centralized policy control

• Integrated DLP for easiest configuration

• Flexible deployment: on-premise or as a service

Security that fits • Specialized plug-ins for Exchange, Domino, SharePoint

• Open: Win, Mac, iOS, Android, Blackberry…

Copyright 2013 Trend Micro Inc.

Page 24: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Consumerization

Cloud &

Virtualization

Employees IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 25: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Cloud &

Virtualization

IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 26: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Productivity

HR

CRM

Customer

Support

Finance

Supply Chain

Commerce

Employees

Partners

Customers

Business App Owners

Data Center Ops

Copyright 2013 Trend Micro Inc.

Page 27: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Productivity

HR

CRM

Customer

Support

Finance

Supply Chain

Commerce

Data Center Ops

Data Center

Copyright 2013 Trend Micro Inc.

Page 28: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

By 2016, 71% of server workloads will be virtualized1;

Organizations can cut costs by 74% by storing data in the cloud2

Data Center Ops

Data Center

Physical Virtual Private Cloud

• Server and VM integrity

• Appropriate policy enforcement

• Data protection, especially in the cloud

• Performance and manageability Security

1. Source: Gartner, Forecast Analysis: Data Center, May 2012

2. Source: Forrester study

Public Cloud

Copyright 2013 Trend Micro Inc.

Page 29: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Data Center

Physical Virtual Public Cloud Private Cloud

Cloud and Data Center Security

Anti-Malware Firewall Encryption Integrity

Monitoring Intrusion

Prevention

Log

Inspection

Data Center Ops

Security

Copyright 2013 Trend Micro Inc.

Page 30: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

• Single platform and administration

across physical, virtual and cloud

New: • Further differentiating VMware

optimization

o Improved performance (caching, de-

duping)

oStronger protection (automated virtual

patching, Hypervisor integrity

monitoring)

• Hybrid cloud management for

Amazon Web Services and

VMware vCloud

Deep Security: Optimized for Virtualization and Cloud

Copyright 2013 Trend Micro Inc.

Page 31: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Part of Your Smart Protection Strategy

Smart • Comprehensive protection across physical, virtual, cloud

• Automated protection, including virtual patching

Simple • Single platform and administration; modular deployment

• Market-leading, truly agentless for VMware; enables

maximum density, consolidation, and performance

• Cloud-friendly: multi-tenancy, usage-based billing…

Security that fits • Optimized, automated security for VMware and AWS

• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…

Copyright 2013 Trend Micro Inc.

Page 32: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Cloud &

Virtualization

Employees IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 33: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Employees IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 34: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Attacker

Gathers intelligence

about organization and

individuals

Employees

Targets individuals

using social engineering

Establishes

Command &

Control server

Moves laterally across

network seeking data of

interest

Extracts data

of interest – can go

undetected for months!

$$$$

Today’s Attacks: Social, Sophisticated, Stealthy!

Copyright 2013 Trend Micro Inc.

Attacker

Gathers intelligence

about organization and

individuals

Employees

Targets individuals

using social engineering

Establishes

Command &

Control server

Moves laterally across

network seeking data of

interest

Extracts data

of interest – can go

undetected for months!

$$$$

Page 35: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Network Admin

Security

1.8 successful attacks per week / per large organization1

21.6% organizations experienced APT attacks2

Malware engineered and tested to evade your standard

gateway/endpoint defenses

A custom attack needs a custom defense!

1: Source: 2012 Ponemon Study on costs of Cybercrime

2: Source: ISACA APT Awareness Study, 2013

Copyright 2013 Trend Micro Inc.

Page 36: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Custom Defense

Network Admin

Security

Network-wide

Detection

Threat

Intelligence

Threat Tools

and Services Custom

Sandboxes

Advanced

Threat Analysis

Automated

Security Updates

Copyright 2013 Trend Micro Inc.

Page 37: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Custom Defense

Network-wide

Detection

Threat

Intelligence

Threat Tools

and Services Custom

Sandboxes

Detect malware,

communications and

behavior invisible to

standard defenses

Analyze the risk

and characteristics

of the attack and

attacker

Adapt security

automatically (IP

black lists, custom

signatures…)

Respond using

the insight needed

to respond to your

specific attackers

Enabling a Complete Lifecycle

Advanced

Threat Analysis

Automated

Security Updates

Copyright 2013 Trend Micro Inc.

Network Admin

Security

Page 38: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Deep Discovery: at the Heart of the Custom Defense

• Advanced threat

detection (even non-

Windows malware)

• Multiple customer-

defined sandboxes

• Local and global

threat intelligence

• Single appliance

across multiple ports

and protocols

• Custom security

updates to endpoints

and gateways

Copyright 2013 Trend Micro Inc.

Page 39: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Part of Your Smart Protection Strategy

Smart • Advanced, targeted threat detection, including

detection of non-Windows malware (i.e. mobile)

• Only solution with multiple customer-defined

sandboxes for more accurate analysis

• Actionable insight from global threat intelligence

Simple • Lowest TCO: Single appliance monitors across

multiple ports and 80+ protocols

• Only solution that enables the full lifecycle: detect,

analyze, adapt, respond

Security that fits • Sandbox analysis and custom signatures available

to other security products

Copyright 2013 Trend Micro Inc.

Page 40: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Employees IT

Cyber Threats

Attacker

Copyright 2013 Trend Micro Inc.

Page 41: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Smart Protection

Copyright 2013 Trend Micro Inc.

Page 42: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Market Leadership

Trend Micro has 27% global share, almost twice the market share of the next two vendors - IDC 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011

“Trend Micro is able to dominate the market because of its diversified geographic reach, established customer base, and brand reputation.” Technavio 2011, Global Virtualization Security Management Solutions

Trend Micro extends its market share lead over closest competitor Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013

Copyright 2013 Trend Micro Inc.

Page 43: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Organizations Need a Smart Protection Strategy

Smart protection for information

Simple yet flexible to manage and deploy

Centralized

Automated

Lightweight

Flexible

Security that fits an evolving ecosystem

Open

Optimized

Focused

Innovative

…and more

Interconnected

Real-time

Transparent

Layered

Copyright 2013 Trend Micro Inc.

Page 44: Empowering the business while efficiently mitigating risks - Eva Chen (Trend Micro CEO)

Thank You!