SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
Enabling a Smart Protection Strategy
in the age of Consumerization, Cloud and new Cyber Threats
Gastone Nencini
Trend Micro Italy Leader and Snr. Technical
Manager Trend Micro Southern Europe
Copyright 2013 Trend Micro Inc.
2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook
Users4
427M
Smart Phones Sold
Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Source: IBM
2.5 QUINTILLION
BYTES OF DATA/DAY!90% CREATED IN
LAST 2 YEARS
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
Payment Card Industry (PCI)
Protected Health Information (PHI)
Personally Identifiable Information (PII)
Intellectual Property (IP)
NEW THREAT CREATED
EVERY SECOND
90% ORGANIZATIONS HAVE
ACTIVE MALWARE
55%1 NOT EVEN AWARE OF
INTRUSIONS
COMMERCIAL EXPLOIT KITS
USED BY VIRTUALLY ALL
EASTERN EUROPEAN CYBERCRIMINALS
AVERAGE COST
OF DATA BREACH$3.7M
Copyright 2013 Trend Micro Inc.
Empower the business:
Improve business agility by providing
quick and intuitive access to the right
information, tools and applications
Mitigate risk:
Protect sensitive information to maintain
brand and comply with regulations,
while controlling costs
CIO
Copyright 2013 Trend Micro Inc.
Consumerization
Cloud &
Virtualization
Cyber Threats
Attackers
Employees IT
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Simple yet flexible
to manage and deploy
Security that fits
an evolving ecosystem
Information no longer protected
by traditional defenses
Customers Need…
Point solutions; limited visibility,
de-centralized administration
Dynamic, complex environment;
many new apps and platforms
The New Reality…
Copyright 2013 Trend Micro Inc.
Smart protection
for information
Layered – lines of defense
Interconnected – intelligent protection
Real-time – cloud updates
Transparent – no user impact
Copyright 2013 Trend Micro Inc.
Simple yet flexible
to deploy and manage
Centralized – visibility and control
Automated – policy management
Lightweight – resource efficient
Flexible – on-premise or as a service
Copyright 2013 Trend Micro Inc.
Security that fits
an evolving ecosystem
Open – broad platform support
Optimized – designed in partnership
Focused – 100% dedicated to security
Innovative – ahead of the latest threats …and more
Interconnected
Real-time
Transparent
Organizations Need a Smart Protection Strategy
Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
SIGNATURE BASED
ANTI-MALWARE
1988 - 2007
Smart protection
begins with global
threat intelligence…
CLOUD BASED
GLOBAL THREAT
INTELLIGENCE
2008
BIG DATA
ANALYTICS-DRIVEN
GLOBAL THREAT
INTELLIGENCE
NOW!
• Email reputation
• File reputation
• Web reputation
• Whitelisting
• Network traffic rules
• Mobile app reputation
• Vulnerabilities/Exploits
• Threat Actor Research
• Enhanced File Reputation
• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Protects
Identifies
Collects
Copyright 2013 Trend Micro Inc.
GLOBAL
SENSORNET
(via honeypots,
community, customers,
threat researchers
and more)
DAILY STATS:
• 1.15B threat events
• 6TB threat feeds
• 11B threat queries
• 7M new files…
Collects
Protects
Identifies
• URLs
• Vulnerabilities
• Files
• Domains
• Network Traffic
• Cyber Criminals
• Mobile Apps
• IP Addresses
• Exploit Kits
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
BIG
DATA
ANALYTICS
(Data Mining,
Machine Learning,
Modeling, Correlation)
DAILY STATS:
• 7.2 TB data correlated
• 1B IP addresses
• 90K malicious
threats identified
• 100+M good files
Copyright 2013 Trend Micro Inc.
Collects
Protects
Identifies
GLOBAL
THREAT
INTELLIGENCE
DAILY STATS:
• 200M threats blocked
• 50M malicious URL’s
• 700K cloud email entries
•1.4B whitelist queries
• 80M malicious files
• Email Reputation
• Web Reputation
• File Reputation
• Whitelisting
• Vulnerabilities & Exploits
• Mobile App Reputation
• Network Traffic Rules
• Threat Actor Research
Copyright 2013 Trend Micro Inc.
Global
CLOSER TO
THE SOURCE OF
THREATS
Correlated
IDENTIFIES ALL
COMPONENTS
OF AN ATTACK
Proactive
BLOCKS THREATS
AT THEIR SOURCE
Real-time
IDENTIFIES
NEW THREATS
FASTER
Copyright 2013 Trend Micro Inc.
Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using
the latest endpoint products with the latest pattern at the time of testing
200
MB
June 2012Oct 2011
289
MB
Competitor A
34MB
Trend Micro
June 2012Oct 2011
33 MB 34 MB
100 --
200 --
300 --
EndpointMalwareDefinitionSize(MB)
Competitor B
June 2012Oct 2011
122
MB
156
MB
• Lightweight cloud infrastructure
• Minimal user and network impact
• Real-time protection
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Complete End User Protection
Email &
Messaging
Web
Access
Device Hopping
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Employees
IT Admin
Security
Enabling a Complete Lifecycle
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Advanced
Threat Analysis
Threat Tools
and Services
Automated
Security Updates
Threat
Intelligence
Custom
Sandboxes
Detect malware,
communications and
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
Network Admin
Security
Smart Protection
Copyright 2013 Trend Micro Inc.
Interconnected
Real-time
Transparent
Trend Micro Enables a Smart Protection Strategy
Layered
Smart protection for
information
Simple yet flexible to
manage and deploy
Centralized
Automated
Lightweight
Flexible
Security that fits
an evolving ecosystem
Open
Optimized
Focused
Innovative
…and more
Thank You!

Más contenido relacionado

La actualidad más candente

Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
David Rubal, CISSP
 
2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report
Matthew Rosenquist
 

La actualidad más candente (20)

(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Preventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero TrustPreventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero Trust
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
2016 Network Security Outlook
2016 Network Security Outlook2016 Network Security Outlook
2016 Network Security Outlook
 
(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017
 
What is still missed for security real life facts
What is still missed for security  real life factsWhat is still missed for security  real life facts
What is still missed for security real life facts
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 
2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report
 

Similar a festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2016
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 

Similar a festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy (20)

Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 

Más de festival ICT 2016

Más de festival ICT 2016 (20)

Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
 
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
 
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
 
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
 
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
 
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
 
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
 
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
 
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
 
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
 
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
 
Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015
 
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
 
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution... Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
 

Último

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

  • 1.
  • 2. Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Gastone Nencini Trend Micro Italy Leader and Snr. Technical Manager Trend Micro Southern Europe
  • 3. Copyright 2013 Trend Micro Inc. 2.4B Internet Users1 1 Trillion+ URLs indexed by Google2 665M Web Sites3 1B Facebook Users4 427M Smart Phones Sold Last Year5 54% of Facebook Access is via Mobile6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
  • 4. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Source: IBM 2.5 QUINTILLION BYTES OF DATA/DAY!90% CREATED IN LAST 2 YEARS INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET
  • 5. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Identify trends Understand customer behavior Analyze opportunities Discover efficiencies
  • 6. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP)
  • 7. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013 Payment Card Industry (PCI) Protected Health Information (PHI) Personally Identifiable Information (PII) Intellectual Property (IP) NEW THREAT CREATED EVERY SECOND 90% ORGANIZATIONS HAVE ACTIVE MALWARE 55%1 NOT EVEN AWARE OF INTRUSIONS COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS AVERAGE COST OF DATA BREACH$3.7M
  • 8. Copyright 2013 Trend Micro Inc. Empower the business: Improve business agility by providing quick and intuitive access to the right information, tools and applications Mitigate risk: Protect sensitive information to maintain brand and comply with regulations, while controlling costs CIO
  • 9. Copyright 2013 Trend Micro Inc. Consumerization Cloud & Virtualization Cyber Threats Attackers Employees IT
  • 10. Copyright 2013 Trend Micro Inc. Smart protection for information Simple yet flexible to manage and deploy Security that fits an evolving ecosystem Information no longer protected by traditional defenses Customers Need… Point solutions; limited visibility, de-centralized administration Dynamic, complex environment; many new apps and platforms The New Reality…
  • 11. Copyright 2013 Trend Micro Inc. Smart protection for information Layered – lines of defense Interconnected – intelligent protection Real-time – cloud updates Transparent – no user impact
  • 12. Copyright 2013 Trend Micro Inc. Simple yet flexible to deploy and manage Centralized – visibility and control Automated – policy management Lightweight – resource efficient Flexible – on-premise or as a service
  • 13. Copyright 2013 Trend Micro Inc. Security that fits an evolving ecosystem Open – broad platform support Optimized – designed in partnership Focused – 100% dedicated to security Innovative – ahead of the latest threats …and more
  • 14. Interconnected Real-time Transparent Organizations Need a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more Copyright 2013 Trend Micro Inc.
  • 15. Copyright 2013 Trend Micro Inc. SIGNATURE BASED ANTI-MALWARE 1988 - 2007 Smart protection begins with global threat intelligence… CLOUD BASED GLOBAL THREAT INTELLIGENCE 2008 BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIGENCE NOW! • Email reputation • File reputation • Web reputation • Whitelisting • Network traffic rules • Mobile app reputation • Vulnerabilities/Exploits • Threat Actor Research • Enhanced File Reputation • Enhanced Web Reputation
  • 16. Copyright 2013 Trend Micro Inc.
  • 17. Copyright 2013 Trend Micro Inc. Protects Identifies Collects
  • 18. Copyright 2013 Trend Micro Inc. GLOBAL SENSORNET (via honeypots, community, customers, threat researchers and more) DAILY STATS: • 1.15B threat events • 6TB threat feeds • 11B threat queries • 7M new files… Collects Protects Identifies • URLs • Vulnerabilities • Files • Domains • Network Traffic • Cyber Criminals • Mobile Apps • IP Addresses • Exploit Kits
  • 19. Copyright 2013 Trend Micro Inc. Collects Protects Identifies BIG DATA ANALYTICS (Data Mining, Machine Learning, Modeling, Correlation) DAILY STATS: • 7.2 TB data correlated • 1B IP addresses • 90K malicious threats identified • 100+M good files
  • 20. Copyright 2013 Trend Micro Inc. Collects Protects Identifies GLOBAL THREAT INTELLIGENCE DAILY STATS: • 200M threats blocked • 50M malicious URL’s • 700K cloud email entries •1.4B whitelist queries • 80M malicious files • Email Reputation • Web Reputation • File Reputation • Whitelisting • Vulnerabilities & Exploits • Mobile App Reputation • Network Traffic Rules • Threat Actor Research
  • 21. Copyright 2013 Trend Micro Inc. Global CLOSER TO THE SOURCE OF THREATS Correlated IDENTIFIES ALL COMPONENTS OF AN ATTACK Proactive BLOCKS THREATS AT THEIR SOURCE Real-time IDENTIFIES NEW THREATS FASTER
  • 22. Copyright 2013 Trend Micro Inc. Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using the latest endpoint products with the latest pattern at the time of testing 200 MB June 2012Oct 2011 289 MB Competitor A 34MB Trend Micro June 2012Oct 2011 33 MB 34 MB 100 -- 200 -- 300 -- EndpointMalwareDefinitionSize(MB) Competitor B June 2012Oct 2011 122 MB 156 MB • Lightweight cloud infrastructure • Minimal user and network impact • Real-time protection IT Admin Security
  • 23. Copyright 2013 Trend Micro Inc. Complete End User Protection Email & Messaging Web Access Device Hopping Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Employees IT Admin Security
  • 24. Enabling a Complete Lifecycle Copyright 2013 Trend Micro Inc. Custom Defense Network-wide Detection Advanced Threat Analysis Threat Tools and Services Automated Security Updates Threat Intelligence Custom Sandboxes Detect malware, communications and behavior invisible to standard defenses Analyze the risk and characteristics of the attack and attacker Adapt security automatically (IP black lists, custom signatures…) Respond using the insight needed to respond to your specific attackers Network Admin Security
  • 26. Interconnected Real-time Transparent Trend Micro Enables a Smart Protection Strategy Layered Smart protection for information Simple yet flexible to manage and deploy Centralized Automated Lightweight Flexible Security that fits an evolving ecosystem Open Optimized Focused Innovative …and more