SlideShare una empresa de Scribd logo
1 de 16
Trend Micro
Securing Your Virtual World

 Mihai Butu, Territory Sales Manager SEEUR
 Ondrej Kovac, Technical Sales Engineer EMEA
                                Copyright 2011 Trend Micro Inc.
Security That Fits
Trend Micro innovation enables benefits of next-generation IT platforms


                                                                                                       Founded in United States in
                                                                                           1st Cloud   1988; Headquarters in
                                                                  1st Integrated           Computing   Tokyo, Japan
                                                                  Virtualization           Security
                                              1st in
                                                                  Security
                                              Netbooks
                                              Security
                                 1st Threat                                                            Employees: 4,846;
                                 Management
                   1st Gateway   Solution
                                 (Network)                                                             Locations: 29 Offices
                   Security
                                                                                                       Worldwide
        1st LAN
        Server
        Security                                                                                       > $1 Billion Annual Revenue
                                                                                                       > $1.7 Billion Total Assets

                                                                                                       #1 in Virtualization &
                                                                                                       Corporate Server Security

                                                                                                       Top 3 in Messaging, Web
                                                                                                       and Endpoint Security


                                                                                                       A Leader in Cloud Security



                                                         Copyright 2011 Trend Micro Inc.
Security That Fits
     Trend Micro’s real-world protection validated by third-party test labs
     The Smart Protection Network infrastructure stops threats
     in the cloud, before they reach you
                                            New unique samples added to AV-Test's malware repository (2000-
                                                               Consumer Consumer  Corporate SMB        Consumer
                                            Corporate
                                            products
                                                     Corporate
                                                     products  products
                                                                        2010)
                                                                        products  products  products   products
                                            Jun 2010*1                 Jun 2010*1          Jul 2010*3              Sep 2010*4             Oct 2010*2             Oct 2010*2            Dec 2010*3
3.5 NEW                20,000,000
Threats Every
   Second                    1
                       18,000,000                                                                                                                                                                                  Dec
                             2
                       16,000,000                                                                                                                                                                                  Nov

Blocking                     3                                                                                                                                                                                     Oct
                       14,000,000
 Blocking
Billions of                                                                                                                                                                                                        Sep
Threats of
Billions                     4
 Threats
                       12,000,000                                                                                                                                                                                  Aug
Daily
                          Ranking




    Daily                    5                                                                                                                                                                                     Jul
                       10,000,000
                             6                                                                                                                                                                                     Jun
#1                      8,000,000
                                                                                                                                                                                                                   May
Real-world                   7
    #1
Online                  6,000,000                                                                                                                                                                                  Apr
Real-world
Testing                      8
  Online                                                                                                                                                                                                           Mar
                        4,000,000
 Testing                                                                                                                                                                                                           Feb
                             9                       4,040,017,176                                    39,408,960                                      5,751,120
                        2,000,000                                                                                                                                                                                  Jan
                            10
                                0
                            11                 2000          2001          2002          2003          2004          2005          2006           2007        2008         2009          2010
                                                                       Trend                    Symantec                McAfee                Kaspersky              ESET
                                                                       Micro                         102,736,240
                                                                        *1:http://www.trendmicro.co.jp/protection
                Note: If multiple products from one vendor were         *2:http://www.nsslabs.com/research/endpoint-security/anti-malware/q3-2009-endpoint-protection-group-test-report-socially-engineered-malware.html
                evaluated, then vendor’s vest performance is listed.    *3:http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf
                                                                                                   4,085,177,256
                                                                        *4:http://www.nsslabs.com/research/endpoint-security/anti-malware/consumer-anti-malware-products:-group-test-report-q3-2010.html




                                                                                                                Copyright 2011 Trend Micro Inc.
Trend Micro – Leader in Datacenter Security




- #1 in server security, #1 in virtualization security

- First and only agentless security suite built for virtualization

- First company to offer security for the cloud

- 2011 VMware Technology Alliance Partner of the Year


                                   Copyright 2011 Trend Micro Inc.
Platform-specific Security Risks

Physical                      Virtual                                      Cloud
Manageability                 Performance & Threats                        Visibility & Threats
• Glut of security products   • Security degrades                          • Less visibility
                                performance
• Less security                                                            • More external risks
                              • New VM-based threats
• Higher TCO




Reduce Complexity             Increase Efficiency                          Deliver Agility

                      Integrated Security
                  Single Management Console
                                         Copyright 2011 Trend Micro Inc.
Security Inhibitors to Virtualization

1      Resource Contention                                             3:00am Scan


2         Instant-on Gaps




                                                                              
                                                                       
3   Inter-VM Attacks / Blind Spots



4     Management Complexity




                                     Copyright 2011 Trend Micro Inc.
Trend Micro Deep Security
A server security platform for:


 Physical                   Virtual                                             Cloud




                                Deep Packet Inspection
            Anti-                                                                  Integrity  Log
                     Firewall                        Web App. Application
           malware                IDS / IPS                                        Monitoring Inspection
                                                     Protection Control




                                              Copyright 2011 Trend Micro Inc.
Deep Security 8
Agentless Security for VMware

                Trend Micro Deep Security
Integrates                                Agentless
with                                                              1
                       IDS / IPS                                         VMsafe
vCenter
                                                                         APIs
                       Web Application Protection

                       Application Control                                               Security
                                                                                         Virtual    v
                       Firewall
                                                                                         Machine    S
                                         Agentless                                                  p
                                                                  2
                             Antivirus
                                                                         vShield                    h
                                                                         Endpoint                   e
                                         Agentless
                                                                  3
                                                                                                    r
                      Integrity Monitoring                               vShield                    e
                                                                         Endpoint

                                     Agent-based
                                                                  4
                         Log Inspection
                                                                     Security agent
                                                                     on individual VMs
                                       Copyright 2011 Trend Micro Inc.
Deep Security 8
Agent-based Anti-malware


                  Deep Packet
                                 Firewall
                   Inspection




                       Anti-malware

WEB REPUTATION
  SERVICES                                                        VDI Local Mode
                                                                                   Hyper-V & Xen-based
                   Integrity       Log                                                Virtual Servers
                  Monitoring    Inspection




• New Agent-based form factor extends protection to physical operating
  systems – Windows and Linux
• Agent-based AV also protects Hyper-V & Xen-based virtual servers, and
  virtual desktops in local mode
• Web reputation services through integration with Smart Protection
  Network protects systems/users from access to malicious websites
                                            Copyright 2011 Trend Micro Inc.
Deep Security Architecture
                                                  Deep Security
                  Single Pane                     Manager
                  Scalable
                  Redundant



           1                                                                                                      Threat
                             Reports                                                                              Intelligence
                                                                                                                  Manager
                                                                                          5


                          Deep Security

  2
                          Agent
                                              3                                                   4       SecureCloud


Deep Security                               Deep Security
Agent                                       Virtual Appliance                                          Cloud
                                                                                                    Integration
Modules:
• DPI & FW                                Modules:
• Anti-malware                            • DPI & FW                                          Modules:
• Integrity Monitoring                    • Anti-malware                                      • Data Protection
• Log Inspection                          • Integrity Monitoring



                                                        Copyright 2011 Trend Micro Inc.
Increasing data security


 Servers authentication
  before being granted access
  to sensitive data
 Data is secured using strong
  encryption
 Protecting data at Rest and in
  Motion
 Combination of host-based
  security, encrypted
  data, and strong server
  authentication

                                   Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
How It Works

      Enterprise Datacenter
        or SaaS Offering                 Cloud Service Provider

                                          VM
                                       Corporate                 VM     VM   VM
                                         App

                                                                Hypervisor

                Trend Micro
       SecureCloud Console



                                                            Shared Storage

          Enterprise Key
                                        My Data




                              Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
How It Works
  Key Management                                                          Encryption Support
 Deployment Options
                                                                          VM VM VM VM    vSphere
      Trend Micro                                                                         Virtual
     SaaS Solution                                                                       Machines



                                                                           VM VM VM VM
                                                                                          Private
                                                                                          Clouds

          Or
                          SecureCloud
       Data Center          Console                                        VM VM VM VM    Public
   Software Application                                                                   Clouds




                                        Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloud
Fitting Into a VMware Ecosystem

 Trend Micro
 SecureCloud                                                        vCloud Director



                                                                    VMware vCloud
                            VMware
                            vSphere

                          Data Center                     Private Cloud        Public Cloud



                     VM VM VM VM                        VM VM VM VM          VM VM VM VM




         Encryption throughout your cloud journey—
         data protection for virtual & cloud environments
                                  Copyright 2011 Trend Micro Inc.
Deep Security 8: Key benefits
 Provides layered defense                                                                 Supports more PCI
  against sophisticated attacks                                                             DSS 2.0, NIST, HIPAA
                                                                                            & other regulations
 Shields against known and
  unknown vulnerabilities Prevents Data                                                         Detailed reports
                            Breaches &                    Enables                                document
 Monitors system and                                     Compliance                             prevented attacks
                            Business
  hypervisor integrity                                                                           & compliance
                            Disruptions
                                                                                                 status
 Web reputation
  prevents malicious
  website access

                                     Supports
    Prioritize secure
                                     Operational
     coding efforts                                                                       Agentless architecture
                                     Cost                                                  accelerates realize
         Manage unscheduled         Reductions                                            virtualization savings
          patching
                                                                                Integration to enterprise platforms &
         Cloud-based event whitelisting &                                       apps lowers costs
          Trusted events simplify FIM mgmt
                                             Copyright 2011 Trend Micro Inc.
Thank you
                              for your attention!
Mihai_butu@trendmicro.com
Ondrej_kovac@trendmicro.com
                               Copyright 2011 Trend Micro Inc.

Más contenido relacionado

La actualidad más candente

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco SoldiSMAU
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 

La actualidad más candente (20)

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 

Destacado

Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztWie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztDigicomp Academy AG
 
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerRahul Neel Mani
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecUNIT4 IT Solutions
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityMark Nunnikhoven
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 

Destacado (13)

Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schütztWie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
Wie Trend Micro virtuelle Umgebungen zukunftsweisend schützt
 
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and SymantecTolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 

Similar a Trend Micro - 13martie2012

IT FUTURE 2011 - Symantec
IT FUTURE 2011 - SymantecIT FUTURE 2011 - Symantec
IT FUTURE 2011 - SymantecFujitsu France
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreAT Kishore
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1CloudExpoEurope
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011EASTWEST Public Relations
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
WP101 Fundamental Principles of Network Security
WP101   Fundamental Principles of Network SecurityWP101   Fundamental Principles of Network Security
WP101 Fundamental Principles of Network SecuritySE_NAM_Training
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp
 
IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelFujitsu France
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Jim Kaskade
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing pointsouthmos
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DXmasaaki murakami
 

Similar a Trend Micro - 13martie2012 (20)

IT FUTURE 2011 - Symantec
IT FUTURE 2011 - SymantecIT FUTURE 2011 - Symantec
IT FUTURE 2011 - Symantec
 
Security model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishoreSecurity model-of-sip-d2-05 at kishore
Security model-of-sip-d2-05 at kishore
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
WP101 Fundamental Principles of Network Security
WP101   Fundamental Principles of Network SecurityWP101   Fundamental Principles of Network Security
WP101 Fundamental Principles of Network Security
 
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
ITCamp 2012 - Tudor Damian - Private Cloud with Hyper-V 3 and SCVMM 2012
 
IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'Intel
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
vFS3 - Detailed Agenda
vFS3 - Detailed AgendavFS3 - Detailed Agenda
vFS3 - Detailed Agenda
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing point
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Security as the foundation of DX
Security as the foundation of DXSecurity as the foundation of DX
Security as the foundation of DX
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Trend Micro - 13martie2012

  • 1. Trend Micro Securing Your Virtual World Mihai Butu, Territory Sales Manager SEEUR Ondrej Kovac, Technical Sales Engineer EMEA Copyright 2011 Trend Micro Inc.
  • 2. Security That Fits Trend Micro innovation enables benefits of next-generation IT platforms Founded in United States in 1st Cloud 1988; Headquarters in 1st Integrated Computing Tokyo, Japan Virtualization Security 1st in Security Netbooks Security 1st Threat Employees: 4,846; Management 1st Gateway Solution (Network) Locations: 29 Offices Security Worldwide 1st LAN Server Security > $1 Billion Annual Revenue > $1.7 Billion Total Assets #1 in Virtualization & Corporate Server Security Top 3 in Messaging, Web and Endpoint Security A Leader in Cloud Security Copyright 2011 Trend Micro Inc.
  • 3. Security That Fits Trend Micro’s real-world protection validated by third-party test labs The Smart Protection Network infrastructure stops threats in the cloud, before they reach you New unique samples added to AV-Test's malware repository (2000- Consumer Consumer Corporate SMB Consumer Corporate products Corporate products products 2010) products products products products Jun 2010*1 Jun 2010*1 Jul 2010*3 Sep 2010*4 Oct 2010*2 Oct 2010*2 Dec 2010*3 3.5 NEW 20,000,000 Threats Every Second 1 18,000,000 Dec 2 16,000,000 Nov Blocking 3 Oct 14,000,000 Blocking Billions of Sep Threats of Billions 4 Threats 12,000,000 Aug Daily Ranking Daily 5 Jul 10,000,000 6 Jun #1 8,000,000 May Real-world 7 #1 Online 6,000,000 Apr Real-world Testing 8 Online Mar 4,000,000 Testing Feb 9 4,040,017,176 39,408,960 5,751,120 2,000,000 Jan 10 0 11 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Trend Symantec McAfee Kaspersky ESET Micro 102,736,240 *1:http://www.trendmicro.co.jp/protection Note: If multiple products from one vendor were *2:http://www.nsslabs.com/research/endpoint-security/anti-malware/q3-2009-endpoint-protection-group-test-report-socially-engineered-malware.html evaluated, then vendor’s vest performance is listed. *3:http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf 4,085,177,256 *4:http://www.nsslabs.com/research/endpoint-security/anti-malware/consumer-anti-malware-products:-group-test-report-q3-2010.html Copyright 2011 Trend Micro Inc.
  • 4. Trend Micro – Leader in Datacenter Security - #1 in server security, #1 in virtualization security - First and only agentless security suite built for virtualization - First company to offer security for the cloud - 2011 VMware Technology Alliance Partner of the Year Copyright 2011 Trend Micro Inc.
  • 5. Platform-specific Security Risks Physical Virtual Cloud Manageability Performance & Threats Visibility & Threats • Glut of security products • Security degrades • Less visibility performance • Less security • More external risks • New VM-based threats • Higher TCO Reduce Complexity Increase Efficiency Deliver Agility Integrated Security Single Management Console Copyright 2011 Trend Micro Inc.
  • 6. Security Inhibitors to Virtualization 1 Resource Contention 3:00am Scan 2 Instant-on Gaps   3 Inter-VM Attacks / Blind Spots 4 Management Complexity Copyright 2011 Trend Micro Inc.
  • 7. Trend Micro Deep Security A server security platform for: Physical Virtual Cloud Deep Packet Inspection Anti- Integrity Log Firewall Web App. Application malware IDS / IPS Monitoring Inspection Protection Control Copyright 2011 Trend Micro Inc.
  • 8. Deep Security 8 Agentless Security for VMware Trend Micro Deep Security Integrates Agentless with 1 IDS / IPS VMsafe vCenter APIs Web Application Protection Application Control Security Virtual v Firewall Machine S Agentless p 2 Antivirus vShield h Endpoint e Agentless 3 r Integrity Monitoring vShield e Endpoint Agent-based 4 Log Inspection Security agent on individual VMs Copyright 2011 Trend Micro Inc.
  • 9. Deep Security 8 Agent-based Anti-malware Deep Packet Firewall Inspection Anti-malware WEB REPUTATION SERVICES VDI Local Mode Hyper-V & Xen-based Integrity Log Virtual Servers Monitoring Inspection • New Agent-based form factor extends protection to physical operating systems – Windows and Linux • Agent-based AV also protects Hyper-V & Xen-based virtual servers, and virtual desktops in local mode • Web reputation services through integration with Smart Protection Network protects systems/users from access to malicious websites Copyright 2011 Trend Micro Inc.
  • 10. Deep Security Architecture Deep Security Single Pane Manager Scalable Redundant 1 Threat Reports Intelligence Manager 5 Deep Security 2 Agent 3 4 SecureCloud Deep Security Deep Security Agent Virtual Appliance Cloud Integration Modules: • DPI & FW Modules: • Anti-malware • DPI & FW Modules: • Integrity Monitoring • Anti-malware • Data Protection • Log Inspection • Integrity Monitoring Copyright 2011 Trend Micro Inc.
  • 11. Increasing data security  Servers authentication before being granted access to sensitive data  Data is secured using strong encryption  Protecting data at Rest and in Motion  Combination of host-based security, encrypted data, and strong server authentication Copyright 2011 Trend Micro Inc.
  • 12. Trend Micro SecureCloud How It Works Enterprise Datacenter or SaaS Offering Cloud Service Provider VM Corporate VM VM VM App Hypervisor Trend Micro SecureCloud Console Shared Storage Enterprise Key My Data Copyright 2011 Trend Micro Inc.
  • 13. Trend Micro SecureCloud How It Works Key Management Encryption Support Deployment Options VM VM VM VM vSphere Trend Micro Virtual SaaS Solution Machines VM VM VM VM Private Clouds Or SecureCloud Data Center Console VM VM VM VM Public Software Application Clouds Copyright 2011 Trend Micro Inc.
  • 14. Trend Micro SecureCloud Fitting Into a VMware Ecosystem Trend Micro SecureCloud vCloud Director VMware vCloud VMware vSphere Data Center Private Cloud Public Cloud VM VM VM VM VM VM VM VM VM VM VM VM Encryption throughout your cloud journey— data protection for virtual & cloud environments Copyright 2011 Trend Micro Inc.
  • 15. Deep Security 8: Key benefits  Provides layered defense  Supports more PCI against sophisticated attacks DSS 2.0, NIST, HIPAA & other regulations  Shields against known and unknown vulnerabilities Prevents Data  Detailed reports Breaches & Enables document  Monitors system and Compliance prevented attacks Business hypervisor integrity & compliance Disruptions status  Web reputation prevents malicious website access Supports  Prioritize secure Operational coding efforts  Agentless architecture Cost accelerates realize  Manage unscheduled Reductions virtualization savings patching  Integration to enterprise platforms &  Cloud-based event whitelisting & apps lowers costs Trusted events simplify FIM mgmt Copyright 2011 Trend Micro Inc.
  • 16. Thank you for your attention! Mihai_butu@trendmicro.com Ondrej_kovac@trendmicro.com Copyright 2011 Trend Micro Inc.

Notas del editor

  1. Today’s threat landscape is about volume and profit with the majority of threats coming from the Web. Cybercriminals are releasing 3 new threats every second in order to avoid detection. This shift is putting pressure on all vendors to improve their ability to source, analyze and provide protection from new threats faster than ever before. Their goal is to steal data and data is now everywhere – which means protection has to secure networks, endpoints, remote devices, data centers and virtualized environments. [Click to advance to Threat Tracker slide] At Trend Micro, we’ve spend the last 6 years developing our Smart Protection Network cloud-client infrastructure and we own all the technology. It sources threats from millions of sensors, honeypots, customers and partners around the world in order to gather the latest threat intelligence. The Smart Protection Network is integrated into all of our solutions and TrendLabs researches analyze terabytes of threat data every day. By correlating this information across multiple threat vectors – email, file and Web, we are able to provide proactive protection faster than anyone else in this industry. It’s blocking billions of threats every dayThe Smart Protection Network provides the latest protection immediately to all of our customers around the globe, no matter where they connect. How well is this working? [Click to bring up Labs results] Trend Micro consistently dominates in real-world tests from multiple labsReal-World tests evaluate a product's ability to detect threats coming from the Internet in real-time, whether they arrive in the form of a URL hosting malicious content, an email with a malicious link, or an infected file. (TrendLabsSM identified 92% of threats come from the Internet). Unlike traditional static detection testing which only detects infected files after they've landed on your computer, Real-World tests provide a more realistic assessment of the efficacy of security solutions today. They introduce the threat in its original form and allow multiple layers of protection to identify and block the attack. Trend Micro products, cloud-powered by the Trend Micro™ Smart Protection Network™, are proven by multiple testing labs to protect better than our competition.