Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Lalgèbre Diviser les polynômes Multiplier les polynômes Soustraire les polynômes Additionner les polynômes La vocabulaire des polynômes.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
The National Plateforme for Tracking Cyber Attacks :
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Oracle Application Express Rapid Application Development Tool
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Ed Duguid with subject: MACE Cloud
© 2014 Extreme Networks, Inc. All rights reserved. Extreme Networks Confidential and Proprietary. Information contained herein presents our current product.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud Confidential | Copyright.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
Cloud Computing PRESENTED BY- Rajat Dixit (rd2392)
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Trend Micro xSP license model Security for Service Providers
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SharePoint de Contact SharePoint 2010 au service des Ressources Humaines
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
2013 Trend Micro 25th Anniversary Threat Connect : a visualized cyber-threats entity reporting system backed with Hadoop ecosystem Scott Miao, Trend Micro.
Copyright 2011 Trend Micro Inc. Trend Micro Real-Time Threat Management June 13, 2011—launch date; Press Presentation Dan Glessner, Vice-President, Enterprise.
Copyright 2011 Trend Micro Inc. Securing your Journey to the Cloud Kamal Sharma Technical Consultant Classification 8/27/
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Securing Information Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Tim Vander Kooi Systems
Introduction to VMware Virtualization
Dell Connected Security Solutions Simplify & unify.
Computing on the Cloud Jason Detchevery March 4 th 2009.
In the name of God :).
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
Copyright 2012 Gladinet Inc. Cloud Storage Storage Account Access Key Gladinet Cloud Identity Active Directory Identity Cloud Cluster Remote Access CIFS/SMB.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Changing World of Endpoint Protection
IIM Intro What is IIM? An information delivery and management solution. IIM App iPad Client Integration IIM Services Interface IIM Web Account Payment.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Catherine Lian Managing Director, Dell Indonesia
Safe’n’Sec IT security solutions for enterprises of any size.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Edit the text with your own short phrases. The animation is already done for you; just copy and paste the slide into your existing presentation. This animation.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Real-time protection for web sites and web apps against ATTACKS
Virtualization & Security real solutions
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Healthcare Cloud Security Stack for Microsoft Azure
AKAMAI INTELLIGENT PLATFORM™
Healthcare Cloud Security Stack for Microsoft Azure
Security Delivery Platform for the Micro-segmented Data Center
Administrative Software in Microsoft Azure Lets Companies Increase Productivity and Control “After conducting analysis and research for the best offer.
Presentation transcript:

Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect

Copyright 2010 Trend Micro Inc. Datacenter Architecture Public Cloud Private Cloud Browser Client Infrastructure as a Service DatabaseFiles Platform as a Service Development, Administration, Management tools Runtime & Data Management Engine Security & User Management Services Software as a Service WebAnalyticsFinanceMedical High Performance Computing Network + Storage APP Web Server Application APIs – AJAX File System – BigTable Browser Local Storage Cloud – Nouvel Eco système

Copyright 2010 Trend Micro Inc. Des menaces croissantes More than 100 companies targeted by Google hackers January 2010 Mariposa data-stealing botnet uncovered in more than 50% of Fortune 1000 March % of tested enterprises have active data-stealing malware Trend Micro Research 89% of enterprise security breaches not reported RSA Survey 3

Copyright 2010 Trend Micro Inc. Operation Aurora (12 janvier 2010) Une faille « poste de travail » qui a affecté le plus important « Nuage »

Copyright 2010 Trend Micro Inc. La proposition Trend Micro Sécurité depuis le Cloud Sécurité pour le Cloud Sécurité dans le Cloud Smart Protection Network SecureCloud Deep Security

Copyright 2010 Trend Micro Inc. La Sécurité depuis le Cloud Stopper les menaces avant quelles ne gagnent le Système dInformation File Reputation Threat Correlation, Feedback Loops, Analysis Reputation Web Reputation THREATS FILE THREATS WEBSITE THREATS Trend Micro Enterprise Security 6 Powered by the Smart Protection Network

Copyright 2010 Trend Micro Inc. Smart Protection Network contre les Botnets Incident Trigger Reputation Web Reputation File Reputation Monitor Many clients processes are dropping similar filenames in a short time Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Community Intelligence Smart Protection Network Correlate to figure out where the threat come from & where it would connect to Correlate to figure out where the threat come from & where it would connect to FileScore FromConnect to Crypt.NS.GenX /aexjiire/Euwl.tsst.com:88/e34jg/ Dropper.GenXNdj.sexadult.com/ssr/ee :80/ Nqe.exeVwww.xyz.comwww.abc.com Conflicker_DXqd.wqwwor.com/omnadasm0.info:80/bugsy Conflicker_DXFdjhg.wopqfe.com7f7fewf.cn:80/sina/ Correlation Customer Feedback Log Immediate Protection

Copyright 2010 Trend Micro Inc. Pourquoi sommes-nous différents ? Pourquoi notre solution est-elle efficace contre les vraies menaces ? ERS 295 Go / jour WRS 1305 Go / jour FRS 334 Go / jour

Copyright 2010 Trend Micro Inc. Sécurité du Cloud Protection dun Cloud public SecureCloud permet la protection de services hébergés dans un « nuage » publique

Copyright 2010 Trend Micro Inc. Sécurité dans le Cloud 10 IDS / IPS Web Application Protection Application Control Firewall Deep Packet Inspection Integrity Monitoring Log Inspection Anti-Virus Deep Security permet la protection de systèmes dans un Cloud grâce à 5 modules

Copyright 2010 Trend Micro Inc. Scada et protection depuis le Cloud 11 « Virtual Patching » pour protéger les systèmes dun réseau Scada Stuxnet

Copyright 2010 Trend Micro Inc. Merci à tous