Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud Storage
-
Upload
ingram-micro-cloud -
Category
Technology
-
view
314 -
download
4
Transcript of Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud Storage
Security Challenges and Solutions for the Cloud (SaaS) & Cloud Storage
Copyright 2014 Trend Micro Inc.
Richard Ku
SVP, Enterprise and SMB Product and Services
Copyright 2014 Trend Micro Inc. 2
Security Challenges & Solutions when moving to Cloud.
Ingram Cloud Market Integration with Trend Micro + Partners
Q & A.
WHO is Trend Micro?
Fact about Trend Micro
Founded in 1988, $1.2B Revenue (2012)
Headquarter in Japan, Tokyo Exchange Nikkei Index,
Symbol 4704
Largest Security focused company world wide
Over 5200 Employees, 38 Business Units
37%Consumer12%Small Business
13%Midsize Business
38%Enterprise & VLE
500k commercial customers; 9% of them in APAC.
Largest Security companyoutside U.S.
Copyright 2014 Trend Micro Inc. 3
1st
LAN Server Security
1st
Gateway/Mail Security
1st
Threat Management
Solution
1st
In Netbook Security
1st
Integrated Virtualization
Security
1st
Cloud Computing
Security
1st
ComprehensiveMobile App Reputation Technology
Innovation leadership
1995 2013
Copyright 2014 Trend Micro Inc.
Copyright 2014 Trend Micro Inc.
CENTRALIZED VISIBILITY & CONTROL
More then just an antivirus company
Device Control
DLPEncryption
Behavior Monitoring
Vulnerability Shielding
Social EngineeringAttack Protection
Memory Inspection
Command & Control Blocking
FileReputation
WebReputation
Email Reputation
Web Gateway
Email Gateway or Server
1.4B in Sept 2014
MalwareSandbox
ApplicationWhitelisting
Office 365
SharePoint Server
Investigation
Network Inspection
300M in Sept 2014
Intrusion Prevention
Log Inspection
Application Scanning
Market Leadership Position
Copyright 2014 Trend Micro Inc. 7
• Magic Quadrant for Endpoint Protection Platforms, Gartner, January 2014
• http://www.av-test.org (Sept 2013 – Feb 2014 test results, Corporate Solutions on Win XP,7 , 8 Systems)
#1 in protection and performance
A “Leader” in the MQ for Endpoint Protection
12 consecutive years
• IDC, Worldwide Endpoint Security 2014-1018 Forecast and 2013 Vendor Shares, August 2014
• expertON Group, Cloud Vendor Benchmark, June 2014
• 2014 NSS Labs Breach Detection Tests
#1 in protection and performance
• Canalyst Research
Global market leader in SMB Content Security 3 years running
- 2011, 2012, 2013
• http://www.av-test.org (Sept 2013 – Feb 2014 test results, Corporate Solutions on Win XP,7 , 8 Systems)
100% of the top 10 automotive
companies.
96% of the top 50 global
corporations.
100% of the top 10 telecom
companies.
80% of the top10 banks.
90% of the top10 oil companies.
Customers
8Copyright 2014 Trend Micro Inc.
9
A world safefor exchanging digital information
Copyright 2014 Trend Micro Inc.
Our Mission: Defending Against Threats
Copyright 2014 Trend Micro Inc. 10
By protecting users against:• Loss of productivity• Loss of information• Loss of identity
ITEmployees
By reducing risk to infrastructure:• System integrity and availability• Intellectual property protection• Network protection
Attackers
Our Strategy
Copyright 2014 Trend Micro Inc. 11
Be the Threat Defense Expert that adapts quickly to evolving:• user behavior• technology and infrastructure• threat vectors
By leveraging our strengths:• core competence is anti-threat• view defense as a strategy• laser-focused so can best adapt
Copyright 2014 Trend Micro Inc. 12
Security Challenges & Solutions when moving to Cloud?
Ingram Cloud Market Integrationwith Trend Micro + Partners
Q & A
WHO is Trend Micro?
Security and Privacy Concerns
Copyright 2014 Trend Micro Inc. 13
#1 - Consumerization
14Copyright 2014 Trend Micro Inc.
iOS &
Android
PC
A category that did not exist a few years ago
15
#2 - Cloud Applications, SaaS, Storage and File Services Growth
<10% Cloud Services Providers Offer Enterprise Grade Security Capabilities and Store Data with-in Jurisdictional Boundaries
#3 - Data No Longer Stored within Organization
Where is your data?
Who has access to it?
Do you know when it’s accessed?
Copyright 2014 Trend Micro Inc. 16
Data: Every 60 seconds, 1.8 petabytes of data is created…
Copyright 2014 Trend Micro Inc. 17
1. IBM
2. www.DropBox.com
700,000 files2
278,000 tweets1
204M emails1
CRIMEWARE
Dam
age
cau
sed
by
Cyb
erc
rim
e
#4 - Threats
2001 2003 2004 2005 2007 2010
Vulnerab i l i t iesW orm
Outbreaks
Spam
Mass Mailers
Spyware
Intel l igent
Botnets
Web
Threats
2011+
TargetedAt tacks
Mobi leAt tacks
Confidential | Copyright 2014 Trend Micro Inc.
Copyright 2014 Trend Micro Inc. 19
Security Challenges & Solutions when moving to Cloud?
Ingram Cloud Market Integration with Trend Micro + Partners
Q & A
WHO is Trend Micro?
Dyn
am
ic
Infra
stru
ctu
re Dyn
am
ic
Infr
as
tru
ctu
re
Web Mail SharePoint Sync Endpoint
Public Cloud Infrastructure – IaaS, PaaS Public Cloud - SaaS
Private Cloud - Virtualization
Dyn
am
ic U
se
r
Dyn
am
ic U
se
r
Customer Hybrid-Cloud Environment
Dynamic
Infrastructure
Dynamic User
Social Network
Web Mail SharePoint Sync
On Premises + Mobile
Endpoint/Mobile
Customer approach to cloud
Public Cloud EnvironmentPhysical Environment
Virtual Environment
Private Cloud
IaaS/PaaSSaaS
LAN
Security is a share responsibility when moving to the cloud
• Facilities
• Physical security
• Network infrastructure
• Virtualization layer
Confidential © 2014 Trend Micro Inc. 22
• Operating system
• Applications
• Data
* Especially on IaaS &
SaaS
Cloud Provider Enterprise Customer
Security Solution in the new Hybrid-cloud environment
Copyright 2014 Trend Micro Inc. 23
Management
Cloud Security Broker
Cloud Service Provider
Endpoint
OfficeScan/Worry-Free
Cloud App Security & Encryption
What should a Cloud (SaaS) Security Solution has?
Copyright 2014 Trend Micro Inc. 24
Visibility ControlSecurity, Data Protection & Intelligence
End to End
Approaches to Cloud Adoption
Before Office 365, Google Drive, BOX..…
Copyright 2014 Trend Micro Inc. 26
Exchange
Gateway
APT Protection
Compliance
Inbound email inspected for zero-day malware
Outbound email scanned for compliance
Multiple security layers
Email data controlled by organization
Network boundary
OWA
MAPI
EAS
SMTP
APT Protection
Now with Office 365, Google Drive, Box ……
Copyright 2015 Trend Micro Inc. 27
Included baseline security lacks controls to find hidden malware and zero day threats
Network boundary
OWA
Outlook
No opportunity to inspect
External Collaboration + Consumerization Risk
Copyright 2015 Trend Micro Inc. 28
Partners, Customers
Contractors, Consultants
Remote workers
Employees
Two Brand New Services
Copyright 2015 Trend Micro Inc. 29
Trend Micro Cloud App Encryption Trend Micro
Cloud App Security
Trend Micro Cloud App EncryptionMaintain Data Ownership with Encryption
Copyright 2015 Trend Micro Inc. 30
Trend Micro Cloud App Encryption
Direct API integration (no SMTP routing) maintains Office 365 user, admin, security functionality
Keys managed on-premise by customer or hosted by Trend Micro
OWA
MAPI
EAS
zvFWyYA8VxNhemFydoghxozgRtKHbzMSoqII5rnqB9YUARXdPjn8pw4rUvfi3kRbpTdAaCVd
Zach, I’d to meet with you to discuss the merger plan. Will you be ready to meet on…
Dec
ryp
tio
n P
roxy
Trend Micro Cloud App SecurityAdvanced Threat Detection, Data Leakage Protection & Visibility
Copyright 2015 Trend Micro Inc. 31
Advanced Threat Detection• Finds zero-day malware
and hidden threats• Sandbox malware
analysis in the cloud
DLP• 200+ customizable
templates
Trend Micro Cloud App Security
• Direct API integration• No email re-routing, client
changes, or web proxy
Why Trend Micro for Office 365 Security?
Copyright 2015 Trend Micro Inc. 32
Cloud Scale
• 10 years offering cloud services
•Direct cloud-to-cloud integration offers high performance and usability
Control & Protection
•Advanced protection for Office 365 email, SharePoint, OneDrive
• Ranked #1 by NSS Labs against zero-days and other targeted attacks
Trusted Security Vendor
• 26 years focused on security, now largest pure-play
• Trusted by 48 of top 50 global corporations
•Microsoft Gold Partner
Copyright 2014 Trend Micro Inc. 33
Security Challenges & Solutions when moving to Cloud?
Ingram Cloud Market Integrationwith Trend Micro + Partners
Q & A
WHO is Trend Micro?
Ingram Cloud Marketplace Integration Architecturewith Parallels APS 2.0 and Trend Cloud Service Interfaces
Copyright 2014 Trend Micro Inc. 34
Monthly Auto-Renewal
Pre-Paid Subscription
Auto Provisioning
Service Bundling
Service Functions
Licensing
Service Provisioning
Service Functions
Interfaces
APS 2.0
Cloud ServicesCloud Marketplace
Worry-Free TM Business Security Services
Hosted Email Security
Trend Micro Cloud Apps Security…
Customer
Reseller
Ingram Cloud Marketplace Integration Architecturewith Parallels APS 2.0 and Trend Cloud Service Interfaces
Copyright 2014 Trend Micro Inc. 35
Monthly Auto-Renewal
Service Bundling
Cloud Marketplace
Auto Provisioning
Service Functions
Master PO with Detailed Transaction Report
Account & service auto provisioning in seconds
Trend Micro Services
Zero-touched auto-renewal
Available for 3rd party service bundling
Agent download link on control panel
Parallels APS 2.0 Integration
Worry-Free TM
Business Security Service
Trend APS 2.0 package
Aggregated PO/Invoice for billing
Completed by Dec 2014
Ingram Micro “Web-layer” and initial Trend Micro Worry-Free Services purchase reseller flow in IM CMP
What does this mean to the partners?
• Stream line the business process
• More solutions for you to sell and grow your business
• Work with Industry leading Cloud Security Provider Trend Micro
• It’s Easy and Simple – all you have to do is sign-up to become a Cloud Reseller at the Ingram Cloud Market Place
Copyright 2014 Trend Micro Inc. 37
Thank you!