festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
-
Upload
festival-ict-2014 -
Category
Technology
-
view
379 -
download
1
description
Transcript of festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
Enabling a Smart Protection Strategyin the age of Consumerization, Cloud and new Cyber Threats
Gastone NenciniTrend Micro Italy Leader and Snr. Technical
Manager Trend Micro Southern Europe
Copyright 2013 Trend Micro Inc.
2.4BInternet Users 1
1 Trillion+ URLs indexed
by Google 2
665MWeb Sites 3
1BFacebook
Users 4427M Smart Phones Sold
Last Year 5
54%of Facebook Access is via
Mobile 6
Sources – 1: Internet World Stats, Dec 2012; 2: Goog le, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBak ers, May 2012;
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Source: IBM
2.5 QUINTILLIONBYTES OF DATA/DAY!90%
CREATED IN LAST 2 YEARS
INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
NEW THREAT CREATED EVERY SECOND90% ORGANIZATIONS HAVE
ACTIVE MALWARE55%1 NOT EVEN AWARE OF INTRUSIONS
COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALLEASTERN EUROPEAN CYBERCRIMINALS
AVERAGE COST OF DATA BREACH$3.7M
Copyright 2013 Trend Micro Inc.
Empower the business:Improve business agility by providing quick and intuitive access to the right information, tools and applications
Mitigate risk:Protect sensitive information to maintain brand and comply with regulations, while controlling costs
CIO
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Cyber Threats
Attackers
Employees IT
Copyright 2013 Trend Micro Inc.
Smart protection for information
Simple yet flexible to manage and deploy
Security that fits an evolving ecosystem
Information no longer protected by traditional defenses
Customers Need…
Point solutions; limited visibility, de-centralized administration
Dynamic, complex environment; many new apps and platforms
The New Reality…
Copyright 2013 Trend Micro Inc.
Smart protection for information
� Layered – lines of defense
� Interconnected – intelligent protection
� Real-time – cloud updates
� Transparent – no user impact
Copyright 2013 Trend Micro Inc.
Simple yet flexibleto deploy and manage
� Centralized – visibility and control
� Automated – policy management
� Lightweight – resource efficient
� Flexible – on-premise or as a service
Copyright 2013 Trend Micro Inc.
Security that fits an evolving ecosystem
� Open – broad platform support
� Optimized – designed in partnership
� Focused – 100% dedicated to security
� Innovative – ahead of the latest threats …and more
� Interconnected� Real-time � Transparent
Organizations Need a Smart Protection Strategy
� Layered
Smart protection for information
Simple yet flexible to manage and deploy
� Centralized� Automated� Lightweight� Flexible
Security that fits an evolving ecosystem
� Open� Optimized� Focused� Innovative
…and more
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
SIGNATURE BASED ANTI-MALWARE
1988 - 2007
Smart protection begins with global threat intelligence…
CLOUD BASEDGLOBAL THREAT INTELLIGENCE
2008
BIG DATA ANALYTICS-DRIVEN
GLOBAL THREAT INTELLIGENCE
NOW!
• Email reputation• File reputation• Web reputation
• Whitelisting• Network traffic rules• Mobile app reputation• Vulnerabilities/Exploits• Threat Actor Research• Enhanced File Reputation• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Protects
Identifies
Collects
Copyright 2013 Trend Micro Inc.
GLOBAL SENSORNET
(via honeypots, community, customers,
threat researchers and more)
DAILY STATS:• 1.15B threat events• 6TB threat feeds• 11B threat queries• 7M new files…
Collects
Protects
Identifies
• URLs• Vulnerabilities• Files• Domains• Network Traffic
• Cyber Criminals• Mobile Apps• IP Addresses• Exploit Kits
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
BIGDATA
ANALYTICS(Data Mining,
Machine Learning, Modeling, Correlation)
DAILY STATS:• 7.2 TB data correlated• 1B IP addresses• 90K malicious
threats identified • 100+M good files
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
GLOBALTHREAT
INTELLIGENCE
DAILY STATS:• 200M threats blocked• 50M malicious URL’s• 700K cloud email entries•1.4B whitelist queries• 80M malicious files
• Email Reputation• Web Reputation• File Reputation• Whitelisting
• Vulnerabilities & Exploits• Mobile App Reputation• Network Traffic Rules• Threat Actor Research
Copyright 2013 Trend Micro Inc.
Global CLOSER TO
THE SOURCE OF THREATS
CorrelatedIDENTIFIES ALLCOMPONENTS OF AN ATTACK
ProactiveBLOCKS THREATSAT THEIR SOURCE
Real-timeIDENTIFIES
NEW THREATS FASTER
Copyright 2013 Trend Micro Inc.
Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using the latest endpoint products with the latest pattern at the time of testing
200MB
June 2012Oct 2011
289MB
Competitor A
34MB
Trend MicroJune 2012Oct 2011
33 MB 34 MB
100 --
200 --
300 --
End
poin
t Mal
war
e D
efin
ition
Siz
e (M
B)
Competitor BJune 2012Oct 2011
122MB
156MB
• Lightweight cloud infrastructure• Minimal user and network impact• Real-time protection
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Complete End User Protection
Email &Messaging
Web Access
Device Hopping
CollaborationCloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Anti-Malware EncryptionApplication
ControlDevice
ManagementData LossPrevention
ContentFiltering
Employees
IT Admin
Security
Enabling a Complete Lifecycle
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wideDetection
AdvancedThreat Analysis
Threat Toolsand Services
AutomatedSecurity Updates
ThreatIntelligence
CustomSandboxes
Detect malware, communications and behavior invisible to standard defenses
Analyze the risk and characteristics of the attack and attacker
Adapt security automatically (IP black lists, custom signatures…)
Respond using the insight needed to respond to your specific attackers
Network Admin
Security
Smart Protection
Copyright 2013 Trend Micro Inc.
� Interconnected� Real-time � Transparent
Trend Micro Enables a Smart Protection Strategy
� Layered
Smart protection for information
Simple yet flexible to manage and deploy
� Centralized� Automated� Lightweight� Flexible
Security that fits an evolving ecosystem
� Open� Optimized� Focused� Innovative
…and more
Thank You!