SlideShare a Scribd company logo
1 of 30
Trend Micro Real-Time
Threat Management
June 13, 2011—launch date; Press Presentation
Dan Glessner, Vice-President, Enterprise Marketing
Kevin Faulkner, Director, Product Marketing
                                                     Copyright 2011 Trend Micro Inc.
Today, Traditional Security is Insufficient




Empowered
Employees
 & Wikileaks      Advanced
               Targeted Threats           De-Perimeterization
               i.e., Stuxnet, Epsilon,     Virtualization, Cloud,
               Aurora, Mariposa, Zeus,   Consumerization & Mobility
               Sony PlayStation, etc.

      Trend Micro evaluations find over 90% of enterprise
          networks contain active malicious malware!
                                                                      Source: Forrester
The Need for Real-time Risk Management
Source: Verizon 2011 Data Breach Report




   1/3 of infections result in compromise within minutes, but
   most are not discovered or contained for weeks or months!
                                              3   Copyright 2011 Trend Micro Inc.
Analysts and Influencers Urge Action

             “Zero-Trust” security model
             Use of Network Analysis and Visibility Tools


             “Lean Forward” proactive security strategy
             Use of Network Threat Monitoring Tools


             “Real-Time Risk Management”
             Use of Threat Monitoring Intelligence


             US Federal Risk Management Framework
             Calls for “Continuous Monitoring”




                                            4   Copyright 2011 Trend Micro Inc.
Increased IT Security Priority:
Vulnerability and Threat Management
           “Which of the following initiatives are likely to be your firm’s
               top IT security priorities over the next 12 months?”


                                            Since 2008, “Managing
                                        vulnerabilities and threats” has
                                           moved from     #5 to #2




       Source: Forrsights Security Survey, Q3 2010
                                                                    5   Copyright 2011 Trend Micro Inc.
Announcing: Trend Micro Real-Time
   Threat Management Solutions

     Network-Wide                   Actionable             Timely Vulnerability
 Visibility and Control          Threat Intelligence           Protection

  Threat Management System        Threat Intelligence    Vulnerability Mgmt. Services
Dynamic Threat Analysis System        Manager           Deep Security Virtual Patching

                        Smart Protection Network Intelligence
                            Risk Management Services


         •   Detect, analyze and remediate advanced threats
         •   Investigate incident events and contain their impact
         •   Monitor and optimize security posture
         •   Manage vulnerabilities & proactive virtual patching
         •   Augment security staff & expertise

                                                            6   Copyright 2011 Trend Micro Inc.
Trend Micro Threat Management System
  TMS is a Network Analysis and Visibility solution that
  provides the real-time visibility, insight, and control to
  protect your company from advanced persistent attacks


Network Threat
Detection & Deterrence
Automated Remediation
Malware Forensic
Analysis Platform
Multi-Level Reporting
Risk Management
Services Offering




Over 300 Enterprise & Government Customers WW 7   Copyright 2011 Trend Micro Inc.
TMS: Visibility – Insight – Control

                                                                          Detailed Reports:
                                                                          • Incident Analysis
                                                                          • Executive Summary
                                                                          • Root-cause Analysis


 Command &
 Control Server                                     Additional Analysis




                                                 Threat Confirmed
                                                               Threat Mitigator
                                                                                                         • Signature-free clean up
                                                                                                         • Root-cause analysis


                  APT Communication Detected




                              Threat Discovery
                                 Appliance
                                                                                    DataCenter
                                                                    APT Implanted
                                                                    Via Web, Email, USB…

                                                                                    8   Copyright 2011 Trend Micro Inc.
Detection Capabilities
                                      • Multiple unique threat engines
                                      • 24 hour event correlation
                                      • Continually updated threat
                                        relevance rules
                                      • Data loss detection
                                      • Tracks unauthorized app usage
New – DTAS Sandbox Detection Engine
New – DTAS Sandbox Detection Engine
                                        and malicious destinations
New – Document Exploit Engine
New – Document Exploit Engine         • Powered by Smart Protection
                                        Network and dedicated Trend
                                        researchers

                                           Best Detection Rates
                                           Lowest False Positives
                                           Real-Time Impact
                                                   9   Copyright 2011 Trend Micro Inc.
TMS + Dynamic Threat Analysis System
           Integrated malware execution and forensic analysis

                                                       • Sandbox execution
                                                       • Malware actions &
                                                         events
                                                       • Malicious destinations
                                                       • C&C Servers
                                                         contacted
                                                       • Exportable reports &
                                                         PCAP files
                                                       • Backend integration
                                                         into TMS reporting &
                                                         Mitigator
Threat Discovery       Direct File       Other Trend
   Appliance          Submission          Products      10   Copyright 2011 Trend Micro Inc.
Event Management Customer Pain Points


      Wide gap between those who
      know they have a problem, and
      those who have a solution




                                                                        *SAN Survey Data 2010




                          Trend Micro Confidential 03/28/13   11
                                                                   11   Copyright 2011 Trend Micro Inc.
Trend Micro Threat Intelligence Manager
Delivers threat intelligence and impact analysis needed
to identify and reduce exposure to advanced threats.
Incident Analysis and
Security Posture
Monitoring
Real-Time Threat Analysis
and Visualization
                                                      Office Scan
                                                      Incident Discovery
Provide Actionable
Intelligence for active
threats                                            Threat Discovery Appliance
                             Threat Intelligence   Suspicious Network Behavior
Visualize event              Manager
relationships in an attack   Threat Analysis and
                             Response


                                                      Deep Security
                                                      System Integrity

    Consolidates threat events and uses advanced visualization
          and intelligence to uncover the hidden threats!
                                                            12   Copyright 2011 Trend Micro Inc.
What Threat Intelligence Manager Enables
 Customers can:
 • Identify the hidden or advanced threats
 • Visualize the lifecycle of an attack
 • Establish custom alerts for tracking future events
 • Customized reporting and executive reporting
 • Scorecards for monitoring security posture
 • Answer key questions:
    – Are there suspicious events that I am missing from my logs?
    – Are there outbound active connections from compromised systems?
    – Are there additional endpoints with similar behaviors as the
      compromised system?
    – What systems are involved in the attack, and what steps can I take to
      defend?

                                                         13   Copyright 2011 Trend Micro Inc.
Customizable Dashboard




  Access and visualization by role and responsibility
                                        14   Copyright 2011 Trend Micro Inc.
Real-Time Threat Management
 In Action
                                         Network

• Multi-point detection
• Validation
• Threat Analysis                       Threat Intelligence Manager
                                        Threat Management System
                                      Dynamic Threat Analysis System

• Impact Assessment
• Automated Remediation
• Pro-active Protection

                          Endpoints                                             Servers

                                         15   Copyright 2011 Trend Micro Inc.
Benefits of Trend Micro Real-Time Threat
Management Solutions
                                                 Trend expedites containment – helping identify,
                                                 remediate and protect infiltrated and susceptible systems
                                                   • Intelligent threat and log analysis
                                                   • Automated remediation
                                                   • Virtual patching
                                                                                                             Containment
Level of
Damage
from APT                                                                    Discovery

                If entry successful, Trend shortens the time to discovery –
                minimizing the risk and damages of actual compromise
                   • Network-level analysis & visibility
                   • Intelligent threat and log analysis
                   • HIPS, virtual patching, Integrity Monitoring




       Trend minimizes the likelihood of APT intrusion -
       blocking threat exposure, vulnerability and communication
         • Smart Protection Network reputation intelligence
         • Network-level analysis & visibility
         • Vulnerability scanning & virtual patching


                               Compromise
             Entry


           Hours     Days / Weeks                    Weeks / Months                           Weeks / Months
New Risk Management Services

Augment stretched IT security staff
Increase IT security responsiveness
and expertise
Put Trend Micro Threat Researchers
and Service Specialists on your team


                                       • Proactive monitoring and alerting
   A complete portfolio                • Threat analysis and advisory
   designed to further reduce
                                       • Threat remediation assistance
   risk exposure and security
   management costs                    • Risk posture review and analysis
                                       • Strategic security planning


                                                    17   Copyright 2011 Trend Micro Inc.
Why Trend Micro?
   Trend Micro is the only vendor providing integrated
   real-time protection and risk management against
   advanced targeted threats.

     Network-Wide                   Actionable             Timely Vulnerability
 Visibility and Control          Threat Intelligence           Protection

  Threat Management System        Threat Intelligence    Vulnerability Mgmt. Services
Dynamic Threat Analysis System        Manager           Deep Security Virtual Patching

                       Smart Protection Network Intelligence
                           Risk Management Services



“Trend Micro has always impressed me with its understanding of
what its customers are going through and this reiterates it again.”
                                                    Richard Stiennon, IT-Harvest
                                                            18   Copyright 2011 Trend Micro Inc.
Appendix




           19   Copyright 2011 Trend Micro Inc.
The Virtual Patching Solution
 Trend Micro Security Center
 provides Virtual Patches within
                                                 Risk Mgt & Compliance
 hours of vulnerability disclosure               • Close window of vulnerability for
                                                   critical systems and applications
 •Automated centralized distribution
 •Protection available:                          • Protect “unpatchable” systems

   • Deep Security product module                • Meet 30-day PCI patch requirement

   • With OfficeScan IDF plugin                  Operational Impact
                                                 • Reduce patch cycle frequency
Automated
Monitoring
                                                 • Avoid ad-hoc patching
              Application
               Analysis                          • Minimize system downtime
                       Filter “Patch”
                       Development
                                    Protection
 Trend Micro                         Delivery
                                                     Physical / Virtual / Cloud                     Endpoints
 Security Center
                                                             Servers                                 & Devices


                                                                  20   Copyright 2011 Trend Micro Inc.
Vulnerability Management System
• Vulnerability scanning
   – Vulnerability scanning of internal and
     external devices
   – Patch and configuration recommendations

• Web application scanning
   – Web site crawler to detect application
     design vulnerabilities like SQL injection
     and cross-site scripting etc.
• PCI compliant scanning
   – Vulnerability scanning with reports for PCI
   – Trend is an Approved Scanning Vendor

• Policy compliance
   – Define and track compliance with device
     security policies
• SaaS based management portal
   – Hosted scans of external devices
   – On-premise appliance for scanning
     internal devices managed from SaaS
     portal
   – On-demand scan
                                                   21
                                                        21   Copyright 2011 Trend Micro Inc.
Flavors of “Intelligence”

   Security Information & Event Management (SIEM):
   •The collection and advanced analysis of logs/events across all security
   disciplines into a central platform, for high-level status and event review.

   Threat Intelligence is:
   •Threat Intelligence is a complementary technology to SIEM, with greater focus
   on the “threat space” of security




                                                              22   Copyright 2011 Trend Micro Inc.
Advanced Visualization & Impact Analysis




  Visualize the relationship between cause and effect of each
  threat event, and fully understand the impact 23   Copyright 2011 Trend Micro Inc.
Trend Micro Smart Protection Network




               Jan 2011 results of testing conducted by AV-Test.org (qualified for internal use)
               Results from T+60 test


                                                                                 24   Copyright 2011 Trend Micro Inc.
Trend Micro Smart Protection Network




     http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/nss-labs/index.html?cm_re=HP:Sub:1-_-CORP-_-
     NSSlabs02
                                                                                            25   Copyright 2011 Trend Micro Inc.
Trend Micro Smart Protection Network
                      Industry-proven real-world protection




 *1 : http://www.nsslabs.com/research/endpoint-security/anti-malware/
 *2 : http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html   Note: If multiple products from one vendor were
 *3 : http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf                 evaluated, then vendor’s best performance is listed.
 (Dec. Test performed for Computer Shopper UK)
 *4 : http://www.av-comparatives.org/images/stories/test/dyn/stats/index.html
                                                                                                            26   Copyright 2011 Trend Micro Inc.
Threat Management Portal
Interactive drill-down dashboards
• Navigate across corporate groups
• Pin-point infected sources
• Perform root-cause analysis
• Track suspicious user behavior and
  application usage
• Detect leakage of regulated data
• Customizable event alarms
• Multi-level reporting for managers
  and executives
• Available on-premise or hosted


Coming 2H 2011
• Improved drill down capability
• Sandbox analysis workbench

                                       27   Copyright 2011 Trend Micro Inc.
Threat Mitigator Technology:
Root-cause and signature-free cleanup
     Cleanup request
      received
     Check forensic logs
     Locate which process
      performed malicious activity
     Remove malware
      process, file and registry
      entries

     Locate and remove
      parent malware

     Locate and remove child
      malware
     In case of failure, a
      custom cleanup kit is
      automatically generated
      by Trend
                                     28   Copyright 2011 Trend Micro Inc.
Risk Management Services
    A component of Trend Micro Technical Account Management Services



       Bronze                      Silver                    Gold                                  Diamond
      Services                    Services                  Services                               Services
• On-demand advisory        • Bronze package          • Silver package plus…          • Gold package plus…
  services                    plus…
                                                      • Daily report reviews &        • Daily monitoring &
• On-demand                 • Weekly report reviews     advisory                        communication
  remediation services        & advisory
                                                      • Customized security           • Complete tailored
• Priority event alerting   • Monthly status;           planning                        services delivery
                              Quarterly reviews
• 8X5 access                                          • Annual assessment             • Dedicated Technical
                            • 24X7 access for           and training                    Account Manager
• Product installation        urgent issues
  and configuration




                                                                           29   Copyright 2011 Trend Micro Inc.
Global Security
                                         & Logistics Co.




Over 300 Enterprise and Government Customers WW

More Related Content

What's hot

Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 

What's hot (20)

Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 

Similar to Trend Micro Real-Time Threat Solutions Launch

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringQ1 Labs
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake finalMinh Le
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRaffael Marty
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESMPinewood
 
QRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxQRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxDmitry718707
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 

Similar to Trend Micro Real-Time Threat Solutions Launch (20)

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk Scoring
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
QRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxQRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptx
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

More from Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization surveyAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Andrew Wong
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTAndrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
 

Recently uploaded

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Recently uploaded (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Trend Micro Real-Time Threat Solutions Launch

  • 1. Trend Micro Real-Time Threat Management June 13, 2011—launch date; Press Presentation Dan Glessner, Vice-President, Enterprise Marketing Kevin Faulkner, Director, Product Marketing Copyright 2011 Trend Micro Inc.
  • 2. Today, Traditional Security is Insufficient Empowered Employees & Wikileaks Advanced Targeted Threats De-Perimeterization i.e., Stuxnet, Epsilon, Virtualization, Cloud, Aurora, Mariposa, Zeus, Consumerization & Mobility Sony PlayStation, etc. Trend Micro evaluations find over 90% of enterprise networks contain active malicious malware! Source: Forrester
  • 3. The Need for Real-time Risk Management Source: Verizon 2011 Data Breach Report 1/3 of infections result in compromise within minutes, but most are not discovered or contained for weeks or months! 3 Copyright 2011 Trend Micro Inc.
  • 4. Analysts and Influencers Urge Action  “Zero-Trust” security model  Use of Network Analysis and Visibility Tools  “Lean Forward” proactive security strategy  Use of Network Threat Monitoring Tools  “Real-Time Risk Management”  Use of Threat Monitoring Intelligence  US Federal Risk Management Framework  Calls for “Continuous Monitoring” 4 Copyright 2011 Trend Micro Inc.
  • 5. Increased IT Security Priority: Vulnerability and Threat Management “Which of the following initiatives are likely to be your firm’s top IT security priorities over the next 12 months?” Since 2008, “Managing vulnerabilities and threats” has moved from #5 to #2 Source: Forrsights Security Survey, Q3 2010 5 Copyright 2011 Trend Micro Inc.
  • 6. Announcing: Trend Micro Real-Time Threat Management Solutions Network-Wide Actionable Timely Vulnerability Visibility and Control Threat Intelligence Protection Threat Management System Threat Intelligence Vulnerability Mgmt. Services Dynamic Threat Analysis System Manager Deep Security Virtual Patching Smart Protection Network Intelligence Risk Management Services • Detect, analyze and remediate advanced threats • Investigate incident events and contain their impact • Monitor and optimize security posture • Manage vulnerabilities & proactive virtual patching • Augment security staff & expertise 6 Copyright 2011 Trend Micro Inc.
  • 7. Trend Micro Threat Management System TMS is a Network Analysis and Visibility solution that provides the real-time visibility, insight, and control to protect your company from advanced persistent attacks Network Threat Detection & Deterrence Automated Remediation Malware Forensic Analysis Platform Multi-Level Reporting Risk Management Services Offering Over 300 Enterprise & Government Customers WW 7 Copyright 2011 Trend Micro Inc.
  • 8. TMS: Visibility – Insight – Control Detailed Reports: • Incident Analysis • Executive Summary • Root-cause Analysis Command & Control Server Additional Analysis Threat Confirmed Threat Mitigator • Signature-free clean up • Root-cause analysis APT Communication Detected Threat Discovery Appliance DataCenter APT Implanted Via Web, Email, USB… 8 Copyright 2011 Trend Micro Inc.
  • 9. Detection Capabilities • Multiple unique threat engines • 24 hour event correlation • Continually updated threat relevance rules • Data loss detection • Tracks unauthorized app usage New – DTAS Sandbox Detection Engine New – DTAS Sandbox Detection Engine and malicious destinations New – Document Exploit Engine New – Document Exploit Engine • Powered by Smart Protection Network and dedicated Trend researchers Best Detection Rates Lowest False Positives Real-Time Impact 9 Copyright 2011 Trend Micro Inc.
  • 10. TMS + Dynamic Threat Analysis System Integrated malware execution and forensic analysis • Sandbox execution • Malware actions & events • Malicious destinations • C&C Servers contacted • Exportable reports & PCAP files • Backend integration into TMS reporting & Mitigator Threat Discovery Direct File Other Trend Appliance Submission Products 10 Copyright 2011 Trend Micro Inc.
  • 11. Event Management Customer Pain Points Wide gap between those who know they have a problem, and those who have a solution *SAN Survey Data 2010 Trend Micro Confidential 03/28/13 11 11 Copyright 2011 Trend Micro Inc.
  • 12. Trend Micro Threat Intelligence Manager Delivers threat intelligence and impact analysis needed to identify and reduce exposure to advanced threats. Incident Analysis and Security Posture Monitoring Real-Time Threat Analysis and Visualization Office Scan Incident Discovery Provide Actionable Intelligence for active threats Threat Discovery Appliance Threat Intelligence Suspicious Network Behavior Visualize event Manager relationships in an attack Threat Analysis and Response Deep Security System Integrity Consolidates threat events and uses advanced visualization and intelligence to uncover the hidden threats! 12 Copyright 2011 Trend Micro Inc.
  • 13. What Threat Intelligence Manager Enables Customers can: • Identify the hidden or advanced threats • Visualize the lifecycle of an attack • Establish custom alerts for tracking future events • Customized reporting and executive reporting • Scorecards for monitoring security posture • Answer key questions: – Are there suspicious events that I am missing from my logs? – Are there outbound active connections from compromised systems? – Are there additional endpoints with similar behaviors as the compromised system? – What systems are involved in the attack, and what steps can I take to defend? 13 Copyright 2011 Trend Micro Inc.
  • 14. Customizable Dashboard Access and visualization by role and responsibility 14 Copyright 2011 Trend Micro Inc.
  • 15. Real-Time Threat Management In Action Network • Multi-point detection • Validation • Threat Analysis Threat Intelligence Manager Threat Management System Dynamic Threat Analysis System • Impact Assessment • Automated Remediation • Pro-active Protection Endpoints Servers 15 Copyright 2011 Trend Micro Inc.
  • 16. Benefits of Trend Micro Real-Time Threat Management Solutions Trend expedites containment – helping identify, remediate and protect infiltrated and susceptible systems • Intelligent threat and log analysis • Automated remediation • Virtual patching Containment Level of Damage from APT Discovery If entry successful, Trend shortens the time to discovery – minimizing the risk and damages of actual compromise • Network-level analysis & visibility • Intelligent threat and log analysis • HIPS, virtual patching, Integrity Monitoring Trend minimizes the likelihood of APT intrusion - blocking threat exposure, vulnerability and communication • Smart Protection Network reputation intelligence • Network-level analysis & visibility • Vulnerability scanning & virtual patching Compromise Entry Hours Days / Weeks Weeks / Months Weeks / Months
  • 17. New Risk Management Services Augment stretched IT security staff Increase IT security responsiveness and expertise Put Trend Micro Threat Researchers and Service Specialists on your team • Proactive monitoring and alerting A complete portfolio • Threat analysis and advisory designed to further reduce • Threat remediation assistance risk exposure and security management costs • Risk posture review and analysis • Strategic security planning 17 Copyright 2011 Trend Micro Inc.
  • 18. Why Trend Micro? Trend Micro is the only vendor providing integrated real-time protection and risk management against advanced targeted threats. Network-Wide Actionable Timely Vulnerability Visibility and Control Threat Intelligence Protection Threat Management System Threat Intelligence Vulnerability Mgmt. Services Dynamic Threat Analysis System Manager Deep Security Virtual Patching Smart Protection Network Intelligence Risk Management Services “Trend Micro has always impressed me with its understanding of what its customers are going through and this reiterates it again.” Richard Stiennon, IT-Harvest 18 Copyright 2011 Trend Micro Inc.
  • 19. Appendix 19 Copyright 2011 Trend Micro Inc.
  • 20. The Virtual Patching Solution Trend Micro Security Center provides Virtual Patches within Risk Mgt & Compliance hours of vulnerability disclosure • Close window of vulnerability for critical systems and applications •Automated centralized distribution •Protection available: • Protect “unpatchable” systems • Deep Security product module • Meet 30-day PCI patch requirement • With OfficeScan IDF plugin Operational Impact • Reduce patch cycle frequency Automated Monitoring • Avoid ad-hoc patching Application Analysis • Minimize system downtime Filter “Patch” Development Protection Trend Micro Delivery Physical / Virtual / Cloud Endpoints Security Center Servers & Devices 20 Copyright 2011 Trend Micro Inc.
  • 21. Vulnerability Management System • Vulnerability scanning – Vulnerability scanning of internal and external devices – Patch and configuration recommendations • Web application scanning – Web site crawler to detect application design vulnerabilities like SQL injection and cross-site scripting etc. • PCI compliant scanning – Vulnerability scanning with reports for PCI – Trend is an Approved Scanning Vendor • Policy compliance – Define and track compliance with device security policies • SaaS based management portal – Hosted scans of external devices – On-premise appliance for scanning internal devices managed from SaaS portal – On-demand scan 21 21 Copyright 2011 Trend Micro Inc.
  • 22. Flavors of “Intelligence” Security Information & Event Management (SIEM): •The collection and advanced analysis of logs/events across all security disciplines into a central platform, for high-level status and event review. Threat Intelligence is: •Threat Intelligence is a complementary technology to SIEM, with greater focus on the “threat space” of security 22 Copyright 2011 Trend Micro Inc.
  • 23. Advanced Visualization & Impact Analysis Visualize the relationship between cause and effect of each threat event, and fully understand the impact 23 Copyright 2011 Trend Micro Inc.
  • 24. Trend Micro Smart Protection Network Jan 2011 results of testing conducted by AV-Test.org (qualified for internal use) Results from T+60 test 24 Copyright 2011 Trend Micro Inc.
  • 25. Trend Micro Smart Protection Network http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/nss-labs/index.html?cm_re=HP:Sub:1-_-CORP-_- NSSlabs02 25 Copyright 2011 Trend Micro Inc.
  • 26. Trend Micro Smart Protection Network Industry-proven real-world protection *1 : http://www.nsslabs.com/research/endpoint-security/anti-malware/ *2 : http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html Note: If multiple products from one vendor were *3 : http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf evaluated, then vendor’s best performance is listed. (Dec. Test performed for Computer Shopper UK) *4 : http://www.av-comparatives.org/images/stories/test/dyn/stats/index.html 26 Copyright 2011 Trend Micro Inc.
  • 27. Threat Management Portal Interactive drill-down dashboards • Navigate across corporate groups • Pin-point infected sources • Perform root-cause analysis • Track suspicious user behavior and application usage • Detect leakage of regulated data • Customizable event alarms • Multi-level reporting for managers and executives • Available on-premise or hosted Coming 2H 2011 • Improved drill down capability • Sandbox analysis workbench 27 Copyright 2011 Trend Micro Inc.
  • 28. Threat Mitigator Technology: Root-cause and signature-free cleanup  Cleanup request received  Check forensic logs  Locate which process performed malicious activity  Remove malware process, file and registry entries  Locate and remove parent malware  Locate and remove child malware  In case of failure, a custom cleanup kit is automatically generated by Trend 28 Copyright 2011 Trend Micro Inc.
  • 29. Risk Management Services A component of Trend Micro Technical Account Management Services Bronze Silver Gold Diamond Services Services Services Services • On-demand advisory • Bronze package • Silver package plus… • Gold package plus… services plus… • Daily report reviews & • Daily monitoring & • On-demand • Weekly report reviews advisory communication remediation services & advisory • Customized security • Complete tailored • Priority event alerting • Monthly status; planning services delivery Quarterly reviews • 8X5 access • Annual assessment • Dedicated Technical • 24X7 access for and training Account Manager • Product installation urgent issues and configuration 29 Copyright 2011 Trend Micro Inc.
  • 30. Global Security & Logistics Co. Over 300 Enterprise and Government Customers WW

Editor's Notes

  1. Advanced targeted threats can easily evade conventional perimeter and content security, software vulnerabilities are rampant, insider threats are a constant, and consumerization and mobility open the network even further to exploitation. Stuxnet, Wikileaks, RSA, Epsilon breaches are the latest demonstration of the advanced exploits and damages facing the modern enterprise
  2. To combat these threats Forrester calls for “Zero Trust” security using Network Analysis & Visibility tools; Gartner encourages enterprises to “lean forward” with Network Threat Monitoring, and the US NIST (National Institute of Standards and Technology) specifies “continuous monitoring”. All share the goal of going beyond the due diligence of traditional security management to embrace a proactive process of real-time threat and vulnerability management, that relies heavily on Network monitoring to detect, analyze and remediate advanced targeted threats
  3. Trend Micro Threat Management System (TMS) is a network analysis and visibility solution that uniquely detects evasive intrusions, automates remediation, and provides the real-time visibility, insight, and control to protect a company from advanced targeted attacks. Powered by Trend Micro Smart Protection Network, an array of threat detection and analysis engines, and the latest intelligence of Trend Micro Threat Researchers, TMS provides the best and most up-to-date threat deterrence capability. TMS Components TMS protects: core datacenter resources from external infiltration, corporate endpoint and post-pc mobile devices, legacy and specialized systems and devices Trend Micro Risk Management Services put Trend Threat Researchers and Service Specialists on your team to augment your security responsiveness and expertise At your request, we can deliver a complete portfolio of proactive monitoring, remediation and strategic consulting services designed to further reduce your risk exposure and security management costs .  Delete all
  4. In a recent SANS 2010 Survey, IT Managers cited that 3 of the top 5 issues they deal with are: -Time spent or inability to search log data -Creating relevant reports of each event/attack -Using log data to make informed decisions to secure (Actionable Intelligence) The key here is that the Blue bars indicate “opportunity/Demand”, and the Red bars indicate “Currently satisfied”. This delta is illustrating our potential customer base for TIM, in that there are a large number of customers who are needing a solution, and have yet to find or implement one that fulfills their needs. Event Management challenges: Targeted Advanced Persistent Threats are on the rise Single most under-utilized source of information are EVENT LOGS All devices, servers/endpoints, applications and network devices create logs and event data Customers are affected by spending too MUCH time, or too LITTLE time, on event analysis According to 2010 CSO Magazine Survey, 70% of all security incidents are never reported. Log/Event analysis is one of the most costly and time consuming efforts a Security Team may undertake
  5. The TIM console is a web-based console that is highly configurable, uses Role-Based administration, so each user has their own customized views of JUST the information and data they need to perform their role. Customizable by widget, by geography, by time, by administrator Administration by vertical or horizontal
  6. Trend researchers monitor an array of sources to track vulnerabilities. They then analyze the applications to develop and test a non-intrusive patch (IDS filter, or rule). The patch is then made available to customers, who can choose to deploy it automatically via the Deep Security Control Center or OfficeScan Manager. The window of vulnerability for normal patching can be quite lengthy: Time for public disclosure (weeks to months after first explotation) + Time to patch availability (weeks or months) + Time to deploy (up to customer testing and policy, but typically another month or more)
  7. WFBS-services 3.0 may have a tons of features. For example, it provide server management functions, such as Anti-malware Anti-spyware, Web Reputation, File Reputation, Behavior Monitoring and License Management. Talking to the client features, it has, Anti-malware, Anti-spyware, Web Reputation, File Reputation, Firewall , POP3 Mail Scan/ Anti-spam, Behavior Monitoring, Trend Protect (Wi-Fi protection, Web Site Rating), Instant Messaging Content Filtering, Intuit QuickBook Protection, Windows 7 support. (Those are the features of WFBS 6.0.)
  8. Up until now, companies have addressed event management either by ignoring it, by leveraging Log Management solutions for event query, or to use more advanced and costy SIEM offerings for more complete event analysis. With the introduction of “Threat Intelligence” tools, a more focused analysis of malware related events can be leveraged to resolve the hidden and advanced threats.
  9. Threat Intelligence Manager utilizes multiple graphical methods for illustrating the different facets of an event. Showing you the timing, frequency, impact geography, as well as a more sophisticated look at showing the relationship of events between one another, to more easily highlight a potential threat.
  10. When products are tested using real-world multi-layer security tests, Trend Micro consistently outperforms the competition Products Tested Trend Micro OfficeScan v10.5.1083 Symantec Endpoint Protection v12.0.1001.95 McAfee VirusScan Enterprise v8.7.0.570 Microsoft Forefront Client Security v1.5.1981.0 Sophos Endpoint Security and Control v9.5.3
  11. With the Smart Protection Network, we are seeing very consistent results from multiple test labs in how effective our protection is. As you can see from this chart, we consistently perform the best in real-world protection tests, versus our competitors who tend to deviate much more widely. This can be attributed to the maturity of our protection network and the fact that it powers all of our solutions, from consumer to Enterprise.