Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi economici
1. Gastone Nencini
Trend Micro Italy Leader and Snr. Technical
Manager Trend Micro Southern Europe
Trend Micro Mobile Solutions
10/1/2013 Confidential | Copyright 2012 Trend Micro Inc.
2. 2.4B
Internet Users1
1 Trillion+
URLs indexed
by Google2
665M
Web Sites3
1B
Facebook Users4
427M
Smart Phones
Sold Last Year5
54%
of Facebook
Access is via
Mobile6
Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012;
4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;
Confidential | Copyright 2013 Trend Micro Inc.
01/10/2013 2
10. IT is exploring solutions
MDM / MAM
Some baseline security controls,
visibility, and settings push, but…
Limited data protection
Containers / App Wrapping
Some separation of work / personal
workspace, but…
Unfamiliar UX,
limited 3rd party apps
Users may work around
Secure Sync & Share
Stays out of employees’ way,
familiar apps
Often a separate silo, IT
controls are weak
11. 01/10/2013 11Confidential | Copyright 2013 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
A range of device types,
company-owned or BYOD
Trend Mobile Solutions
Mobile Security
SafeSync
12. Device Management & Control
10/1/2013 12Confidential | Copyright 2012 Trend Micro Inc.
Employees
Trend Micro Mobile
Security
Email SharePoint Corp Data Web Traffic
• Easy onboarding: email, URL, QR code
• Apple (iOS), Android, Blackberry, Windows
Phone 7 and 8
• Optional Cloud Communication Server
• Device Discovery
• Device Provisioning
• Remote Control
• Reporting
• Inventory Management
Cloud
Comm.
Server
13. Threat Protection
10/1/2013 13Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro Mobile
Security
• Android AV and Website
Reputation
• Leveraging Smart Protection
Network
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
15. Application Control
10/1/2013 15Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro Mobile
Security
• White Lists, Black Lists
• App push
• Mobile app inventory
• Mobile Application Reputation
Service (MARS)
• Categorized app control
16. Mobile App Reputation – How it Works
Trend Micro MARS Generates
reputation
scores and
detailed report
Trend Micro MARS Generates
reputation
scores and
detailed report
Collects Apps and
scans them in the
cloud
Collects Apps and
scans them in the
cloud
Static Analysis:
Dissects app code
and private data
access.
Static Analysis:
Dissects app code
and private data
access.
Correlates web
queries with Smart
Protection Network
Correlates web
queries with Smart
Protection Network
Dynamic Analysis:
Activates app to
analyse actual
behaviour
Dynamic Analysis:
Activates app to
analyse actual
behaviour
1
2
3
4
17. Without IT Solutions, Employees Improvise
Need mobile file access
Will email to self or others…
…or just install Dropbox
…or Google Drive
…or iCloud
…or SugarSync
…or SkyDrive
…or…
18. Secure Sync & Share
10/1/2013 18Confidential | Copyright 2012 Trend Micro Inc.
Employees
Email SharePoint Corp Data Web Traffic
SafeSync
• A corporate alternative to
DropBox
• Data on premise or in Trend
Cloud (future)
• Integrated DLP
• Sync restrictions
• Sharing restrictions
• Persistent File Encryption
Colleagues
19. Data Loss Prevention
10/1/2013 19Confidential | Copyright 2012 Trend Micro Inc.
Employees
SafeSync
Colleagues
Integrated DLP
20. ActiveSync Control (future)
10/1/2013 20Confidential | Copyright 2012 Trend Micro Inc.
Employees
ActiveSync Control
• Add-on to ScanMail for
Exchange
• DLP scans emails
• If violation occurs, attachment
removed when accessed via
mobile device
• Require MFA
• If device is unhealthy,
ActiveSync is restricted
21. The Trend Advantage
• Complete end user protection from a single vendor
• Trend Micro Control Manager provides centralized
management across all Trend Products
– Unified DLP management
– Unified Threat management
– Unified user management
• Mobile security and management that balances
enablement with security.
10/1/2013 21Confidential | Copyright 2012 Trend Micro Inc.
22. Employees
Complete End User Protection
Device
Hopping
Email &
Messaging
Web
Access
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Copyright 2013 Trend Micro Inc.