Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect
Copyright 2010 Trend Micro Inc. Datacenter Architecture Public Cloud Private Cloud Browser Client Infrastructure as a Service DatabaseFiles Platform as a Service Development, Administration, Management tools Runtime & Data Management Engine Security & User Management Services Software as a Service WebAnalyticsFinanceMedical High Performance Computing Network + Storage APP Web Server Application APIs – AJAX File System – BigTable Browser Local Storage Cloud – Nouvel Eco système
Copyright 2010 Trend Micro Inc. Des menaces croissantes More than 100 companies targeted by Google hackers January 2010 Mariposa data-stealing botnet uncovered in more than 50% of Fortune 1000 March % of tested enterprises have active data-stealing malware Trend Micro Research 89% of enterprise security breaches not reported RSA Survey 3
Copyright 2010 Trend Micro Inc. Operation Aurora (12 janvier 2010) Une faille « poste de travail » qui a affecté le plus important « Nuage »
Copyright 2010 Trend Micro Inc. La proposition Trend Micro Sécurité depuis le Cloud Sécurité pour le Cloud Sécurité dans le Cloud Smart Protection Network SecureCloud Deep Security
Copyright 2010 Trend Micro Inc. La Sécurité depuis le Cloud Stopper les menaces avant quelles ne gagnent le Système dInformation File Reputation Threat Correlation, Feedback Loops, Analysis Reputation Web Reputation THREATS FILE THREATS WEBSITE THREATS Trend Micro Enterprise Security 6 Powered by the Smart Protection Network
Copyright 2010 Trend Micro Inc. Smart Protection Network contre les Botnets Incident Trigger Reputation Web Reputation File Reputation Monitor Many clients processes are dropping similar filenames in a short time Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Community Intelligence Smart Protection Network Correlate to figure out where the threat come from & where it would connect to Correlate to figure out where the threat come from & where it would connect to FileScore FromConnect to Crypt.NS.GenX /aexjiire/Euwl.tsst.com:88/e34jg/ Dropper.GenXNdj.sexadult.com/ssr/ee :80/ Nqe.exeVwww.xyz.comwww.abc.com Conflicker_DXqd.wqwwor.com/omnadasm0.info:80/bugsy Conflicker_DXFdjhg.wopqfe.com7f7fewf.cn:80/sina/ Correlation Customer Feedback Log Immediate Protection
Copyright 2010 Trend Micro Inc. Pourquoi sommes-nous différents ? Pourquoi notre solution est-elle efficace contre les vraies menaces ? ERS 295 Go / jour WRS 1305 Go / jour FRS 334 Go / jour
Copyright 2010 Trend Micro Inc. Sécurité du Cloud Protection dun Cloud public SecureCloud permet la protection de services hébergés dans un « nuage » publique
Copyright 2010 Trend Micro Inc. Sécurité dans le Cloud 10 IDS / IPS Web Application Protection Application Control Firewall Deep Packet Inspection Integrity Monitoring Log Inspection Anti-Virus Deep Security permet la protection de systèmes dans un Cloud grâce à 5 modules
Copyright 2010 Trend Micro Inc. Scada et protection depuis le Cloud 11 « Virtual Patching » pour protéger les systèmes dun réseau Scada Stuxnet
Copyright 2010 Trend Micro Inc. Merci à tous