The Changing World of Endpoint Protection

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Security for Today’s Threat Landscape Kat Pelak 1.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
The Changing World of Endpoint Protection
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Microsoft and Symantec
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Kaspersky Small Office Security INTRODUCING New for 2014!
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Blue Coat Cloud Continuum
Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
BUILD SECURE PRODUCTS AND SERVICES
The time to address enterprise mobility is now
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Exchange Online Advanced Threat Protection
Ilija Jovičić Sophos Consultant.
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Data Center Firewall.
Hybrid Management and Security
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Makes Navigating Plants Safer, More Efficient
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Virtualization & Security real solutions
Exchange Online Advanced Threat Protection
Protect your OneDrive and SharePoint files on mobile devices
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft Data Insights Summit
Cybersecurity Simplified: Phishing
Presentation transcript:

The Changing World of Endpoint Protection Hashem El Telawi October 2015

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET 1/26/2018 Identify trends Understand customer behavior INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Analyze opportunities All of this data can be converted to valuable information from which you can derive incredible insights and create a HUGE competitive advantage. Information has become YOUR MOST strategic asset. <Click> Knowing how to zero in on the strategic information and analyze it can allow you to: Identify new market opportunities Gain insight into customer behavior Analyze new opportunities Find operational efficiencies …and more And there is no doubt that this information is incredibly valuable. This information has become the most important, strategic asset for an organization. Discover efficiencies Confidential | Copyright 2012 Trend Micro Inc.

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Payment Card Industry (PCI) 1/26/2018 Protected Health Information (PHI) INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Intellectual Property (IP) Personally Identifiable Information (PII) But hidden amongst all that information is loads of sensitive information – information like credit card, health or personal data that your customers expect you to safeguard for them. As well as intellectual property that you need to protect. Confidential | Copyright 2012 Trend Micro Inc.

2 55% 90% $1B+ COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL Payment Card Industry (PCI) 1/26/2018 Protected Health Information (PHI) 2 55% 90% $1B+ COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS ESTIMATED COST OF RECENT RETAIL DATA BREACH NEW THREATS CREATED EVERY SECOND ORGANIZATIONS HAVE ACTIVE MALWARE NOT EVEN AWARE OF INTRUSIONS Intellectual Property (IP) Personally Identifiable Information (PII) And this is the same information that Cybercriminals are after. It has truly become a business. 2 new threats are created every second (Source: Trend Micro SPN statistics) <Click> It has become its own underground economy. Virtually all cybercriminals use toolkits. They can download prebuilt executables that allows them to exploit know vulnerabilities. <click> Not surprisingly, we have found that 90% of organizations have active malware, and shockingly more than half are not aware of intrusions. (Source: Trend Micro) Analysts estimate the Target breach has cost Target over $1B, not including the obvious damage to their brand reputation and CIO and CEO lost jobs Source: Jeffries Group Inc. retail analysts Confidential | Copyright 2012 Trend Micro Inc.

World’s Biggest Data Breaches: Most are Hacks 1/26/2018 World’s Biggest Data Breaches: Most are Hacks Hacked Inside Job Interesting story Accidental publish Here’s some recent information about the worlds largest data breaches, showing the number of records exposed. Note that most of these breaches were caused by some sort of hacking or malicious activity vs. an accidental loss or publish of information. Source: www.informationisbeautiful.net Confidential | Copyright 2012 Trend Micro Inc.

Vulnerability Exploits Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks It’s not just traditional malware and data leaks that organizations have to deal with. Today’s threats to a company’s are much more complex, and range from data leaks and traditional malware, both of which continue to threaten information, to more sophisticated threats of today like vulnerability exploits and advanced malware…not to mention the range of different techniques used in targeted attacks. This range of threats make it much more difficult to protect information, and deal with today’s trends of consumerization, cloud & virtualization, and cyber threats. Time Copyright 2014 Trend Micro Inc.

File/Folder & Removable Media 1/26/2018 Then. . .! Web Access Email & Messaging File/Folder & Removable Media Employees IT Admin In the past, IT had an easier time dealing with employees and all their activities. Users did email, surfed the web, and created documents locally and on file servers as well as USB drives, almost exclusively using Windows and Microsoft applications. You had av at the enpoint, gateway and mailserver. You had antispam at the mail server and gateway, and you had web url filtering at the gateway, and life was good. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

File/Folder & Removable Media 1/26/2018 Now. . . ! Device Hopping Cloud Sync & Sharing Collaboration Web Access Social Networking Email & Messaging File/Folder & Removable Media Employees IT Admin Today, users are doing more activities – using mobile devices, synchronizing files to the cloud with Drop box and other applications, sharing and collaborating with others using multiple web based applications, and using social networks. The range of devices, operating systems, and client and web based applications make this a very tough environment for IT to support, let alone secure. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

IT Workload Increasing 1/26/2018 IT Workload Increasing More complex compliance Many more environments IT Admin Today, users are doing more activities – using mobile devices, synchronizing files to the cloud with Drop box and other applications, sharing and collaborating with others using multiple web based applications, and using social networks. The range of devices, operating systems, and client and web based applications make this a very tough environment for IT to support, let alone secure. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

A Gradual Transition to the Cloud “25% of Office customers now have Office 365. Microsoft, April 2013 Copyright 2014 Trend Micro Inc.

Attackers

Attackers

Increased Opportunity for Threats and Data Loss

Evolving Threat Landscape Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks Time Copyright 2013 Trend Micro Inc.

Customers need a range of capabilities… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

…but don’t want lots of consoles! No interconnected threat response Reduced timeliness Higher cost Higher workload !#$%*?! Email Security Mobile Security Advanced Threat Protection IT Admin Secure Web Gateway Endpoint Protection Application Control ----- Meeting Notes (1/2/14 14:37) ----- Timeliness, not just workload. To react quickly enough. Formatting on the bubble. SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

…or separate cloud / on-premise consoles Copyright 2014 Trend Micro Inc.

Suite vendors help improve this… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

Requirements of an effective endpoint solution Copyright 2014 Trend Micro Inc.

Any device, any app, anywhere Web Access Device Hopping Cloud Sync & Sharing Email & Messaging Collaboration File/Folder & Removable Media Employees Social Networking Anti-Malware Content Filtering Data Loss Prevention Encryption Device Management Application Control Endpoint Solutions IT Admin Security Intelligence Network Copyright 2014 Trend Micro Inc.

It’s not about traditional AV anymore Copyright 2014 Trend Micro Inc.

Evolving Threat Landscape Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks ----- Meeting Notes (12/30/13 11:02) ----- Ones on the left are the tallest. Y axis is volume. X axis is "Business impact". Remove red boxes, add icon imagery. ----- Meeting Notes (1/2/14 14:37) ----- Flip again. X axis is time. Y axis is Sophistication. Title "Evolving threat landscape. Time Copyright 2013 Trend Micro Inc.

Vulnerability Protection Web Reputation Web Gateway 827M in March 2014 284M in March 2014 Sandboxing Device Control Behavior Monitoring File Reputation Network Forensics Vulnerability Protection Web Reputation Web Gateway DLP Encryption Email Reputation Email Gateway or Server Unpacking Memory Inspection Application Whitelisting SharePoint Server Command & Control Blocking Copyright 2014 Trend Micro Inc.

Comprehensive Protection vs Threats APPLICATION CONTROL BEHAVIOR MONITORING COMMAND&CONTROL BLOCK SANDBOXING INTEGRATION SIG-BASED WEB REP VULNERABILITY PROTECTION BROWSER EXPLOIT PROTECTION DLP ENCRYPTION DEVICE POLICY The Modern Suite Employee Data Leaks Traditional malware Vulnerability exploits Advanced Malware Targeted Attacks Copyright 2014 Trend Micro Inc.

Protection On-Premise and in the Cloud Endpoint Protection Messaging Security Secure Web Gateway ✔ Copyright 2014 Trend Micro Inc.

Superior Cloud / Client Architecture Increases Efficiency Minimal endpoint / network impact Real-time protection 213 MB 118 MB 36 MB Source: Trend Micro, tested on 22nd August 2013 using the latest endpoint products with the latest pattern at the time of testing

A Global Intelligence Data Network 1/26/2018 A Global Intelligence Data Network Collects via global sensor net Big data analytics Global threat intelligence Copyright 2013 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

500k commercial customers & Trend Micro Enterprise 26 years focused on security software, now largest pure-play Consistent – A World Safe for Exchanging Digital Information Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) 8 consecutive years on Dow Jones Sustainability Indexes Customers include 48 of top 50 global corporations 5200+ employees, 38 business units worldwide Midsize Business Small Business Consumer Consumers 500k commercial customers & 155M endpoints protected Trend Micro has been in business for 26 years and has focused solely on the security business…Today, we are the largest pure-play security software company in the world. Since we were founded, we have had one consistent vision, and are passionate about making the world a safer place. We are headquartered in Tokyo, Japan, and are listed on the Nikkei Index as 4704. We have been on the Dow Jones Sustainability index for 8 straight years, and our customers include 48 of the top 50 global corporations. We currently have over 5200 employees, in 38 business units worldwide in over 50 countries, and we are protecting over 500,000 businesses and governments, and millions of consumers. Copyright 2014 Trend Micro Inc.

Thank you!