Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud With a Smart Protection.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Is technology ubiquity a chance to re-connect security? Greg Day Director of Security Strategy.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
The System Center Family Microsoft. Mobile Device Manager 2008.
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud Confidential | Copyright.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
© 2011 VMware Inc. All rights reserved Confidential VMware Direction Jonathan Gohstand, Director, Security & Networking Product Marketing.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Security in Real Business
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright 2011 Trend Micro Inc. Securing your Journey to the Cloud Kamal Sharma Technical Consultant Classification 8/27/
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Market reaction to consumerization ““…pressure from users to support non IT-procured, or individual liable devices whilst still providing convenient.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2011 VMware Inc. All rights reserved VMware – Cloud Security Solutions.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Copyright 2011 Trend Micro Inc. Securing Your Journey to the Cloud Data Center Evolution: Physical. Virtual. Cloud. 1.
Deep Security and VMware NSX Advanced Security Framework for the Software-Defined Data Center Anand Patil National Sales Manager, SDDC CONFIDENTIAL1.
Clouding with Microsoft Azure
Boost VM Density with AV Designed for VDI
Barracuda Web Security Flex
Barracuda Web Filtering Service
Hybrid Management and Security
Securing your Journey to the Cloud
Virtualization & Security real solutions
Secure & Unified Identity
Company Overview & Strategy
Healthcare Cloud Security Stack for Microsoft Azure
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Check Point Connectra NGX R60
Secure once, run anywhere Simplify your security with Sophos
Healthcare Cloud Security Stack for Microsoft Azure
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Matt Hubbard Regional Product Marketing Securing Today’s Computing Ecosystem: Physical, Virtual and Cloud With a Smart Protection Strategy Confidential | Copyright 2012 Trend Micro Inc.

Amount of data needing protection will grow by a factor of 90 by IDC Data Everywhere – Is It Protected? Only 20% of Virtual systems use Virtualization specific security tools. Computer Security Institute 2010/2011 Computer Crime and Security Survey 72% of server workloads will be virtualized By 2014

Worm Outbreaks Vulnerabilities 2001 The Changing Threat Landscape Copyright 2013 Trend Micro Inc. Worm Outbreaks Vulnerabilities DAMAGE CAUSED Spyware Intelligen t Botnets Web Threats Spam Mass Mailers Worm Outbreaks Vulnerabilities Now Targeted Attacks Now it’s personal! Financially motivated Targeting valuable information Now it’s personal! Financially motivated Targeting valuable information

Copyright 2013 Trend Micro Inc. Source: Trend Micro, tested on 6 th October, 2011, and 8 th June 2012 using the latest endpoint products with the latest pattern at the time of testing 200 MB June 2012 Oct MB Competitor A 34MB Trend Micro June 2012 Oct MB 34 MB Endpoint Malware Definition Size (MB) Competitor B June 2012 Oct MB 156 MB IT Admin Security

Copyright 2013 Trend Micro Inc. Collects Protects Identifies GLOBAL THREAT INTELLIGENCE DAILY STATS: 200M threats blocked 50M malicious URL’s 700K cloud entries 1.4B whitelist queries 80M malicious files Reputation Web Reputation File Reputation Whitelisting Vulnerabilities & Exploits Mobile App Reputation Network Traffic Rules Threat Actor Research

Copyright 2013 Trend Micro Inc. 2.4B Internet Users 1 1 Trillion+ URLs indexed by Google 2 665M Web Sites 3 1B Facebook Users 4 427M Smart Phones Sold Last Year 5 54% of Facebook Access is via Mobile 6 Sources – 1: Internet World Stats, Dec 2012; 2: Google, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBakers, May 2012;

Unprecedented Adoption Rates Copyright 2013 Trend Micro Inc. Source: KPCB, Apple Quarterly Results M iPads 21.2M iPhones 1.3M iPods

Stretching Networks Perimeters So Network Security Must Be Elastic to Stretch with the Network Mobile User Remote Office Internet New Perimeter IaaSSaaS Main Campus Old Perimeter Security Scanning Cloud Central Security Policy VPN

My Campus Network My Cloud Network My Branch Network My Mobile Network V V V V V V 100 Employees 6 Months Onsite Services Christmas Season Ad Campaigns The Elastic Network

Data System Data System My Campus Network Data System My Branch Network My Mobile Network Data System Data System Data System Data System Data System Data System My Cloud Network Data System Data System My Campus Network Data System My Branch Network My Mobile Network Data System Data System Data System Data System Data System Data System My Cloud Network Because the perimeter is elastic, systems and data are more vulnerable to attack. Protecting this “Spectrum of Computing” means Securing the Elastic Network and data in motion and at rest.

The “Spectrum of Computing ” Security for Elastic Networks & User Environments Laptops, Dtops Smart Phones Handhelds Tablets, Social Media… Laptops, Dtops Smart Phones Handhelds Tablets, Social Media… Physical & Virtual Servers & Desktops…. Physical & Virtual Servers & Desktops…. Private & Public Cloud SaaS, PaaS, ITaaS... Private & Public Cloud SaaS, PaaS, ITaaS... Cloud Endpoints Endpoint Oriented Products Server/Gateway Oriented Products Cloud & Virtual Oriented Products Deep Security Secure Cloud… Deep Security Secure Cloud… Deep Security Server Protect Portal Protect IMS/IWS…. Deep Security Server Protect Portal Protect IMS/IWS…. OfficeScan, DLP Encryption WorryFree... OfficeScan, DLP Encryption WorryFree... Effective Security Must Span From “Endpoint-to-Cloud” Devices, Systems, Data, Applications

Integrated Security Across Platforms Traditional Outside-in Model of Perimeter Defense Layer protection from outside in keeps threats as far away as possible! Outside-InSecurity

Data Protection Data Self-Secured Workload Local Threat Intelligence When-Timeline Aware Who-Identity Aware Where-Location Aware What-Content Aware User-defined Access Policies Encryption All network-connected data must be able to defend itself from attacks Integrated Security Across Platforms Virtual and Cloud Oriented Inside-out Security Inside-OutSecurity EndpointsDatacenters

Typical AV Console 3:00am Scan Antivirus Storm Automatic security scans overburden an entire system whether multi-tenant server or VDI host system Virtualization Security Challenge: Resource Contention – Desktop or Server

Reactivated and cloned VMs can have out-of-date security Dormant Virtualization Security Challenge: Instant-on Gaps Active Reactivated with out dated security Cloned   

VM sprawl inhibits compliance Virtualization Security Challenge: Complexity of Management Patch agents Rollout patterns Provisioning new VMs Reconfiguring agents

Attacks can spread across VMs Virtualization Security Challenge: Inter-VM Attacks / Blind Spots

Antivirus Integrity Monitoring AgentlessSecurityforVMware—Beyond Antivirus Agentless Security for VMware—Beyond Antivirus VM The Old Way Security Virtual Appliance VM With Agentless Security VM Intrusion Prevention Virtual Patching Firewall Web Application Protection Virtualization Security What is the Solution? A Dedicated Security Virtual Appliance VM Maximizes Performance and ROI

vShield Endpoint Security Virtual Machine Other VMware APIs Security agent on individual VMs Integrates with vCenter Antivirus Agentless IDS / IPS Web Application Protection Application Control Firewall Log Inspection Agent-based Trend Micro Deep Security Integrity Monitoring vSphere Virtual Environment 1 Virtualization Security Fit for the VMware Ecosystem

Cost Reduction & Consolidation In the Cloud: Who Has Control? Who is responsible for security ? With IaaS the customer is responsible for VM-level security With SaaS or PaaS the service provider is responsible for security Public Cloud PaaS Public Cloud IaaS ServersVirtualization & Private Cloud End-User (Enterprise) Service Provider Public Cloud SaaS

Amazon Web Services™ Customer Agreement 4.2 Other Security and Backup. You are responsible for properly configuring and using the Service Offerings and taking your own steps to maintain appropriate security, protection and backup of Your Content, which may include the use of encryption technology to protect Your Content from unauthorized access and routine archiving Your Content. (30 March 2011) The cloud customer has responsibility for their data security and needs to plan for this.

What is there to worry about? Name: John Doe SSN: Visa #: … Name: John Doe SSN: Visa #: … Use of encryption is rare: Who can see your information? Virtual volumes and servers are mobile: Your data is mobile — has it moved? Rogue servers might access data: Who is attaching to your volumes? Rich audit and alerting modules lacking: What happened when you weren’t looking? Encryption keys remain with vendor: Are you locked into a single security solution? Who has access to your keys? Virtual volumes contain residual data: Are your storage devices recycled securely?

Compliance 23 Template Integrity VM Isolation Real-time Protection Data Protection What is the Solution? Security that Travels with the VM Self-Defending VM Security in the Cloud Agent on VM - can travel between cloud solutions One management portal for all modules SaaS security deployment option

SecureCloud – Securing Data in the Cloud Encrypts data in public or private cloud environments –Military grade, FIPS compliant encryption to 256-bits Manages encryption keys –Typically a very tedious, detailed and expensive process –Application upkeep offloaded to trusted partner Authenticates servers requesting access to data –Policy-based system gives wide range of factors on which key deployment decisions are made –Delivers keys securely over encrypted SSL channels Audits, alerts, and reports on key delivery activities –Multiple reports and alerting mechanisms available

VM Data Center Private Cloud Public Cloud VMware vCloud VMware vSphere Encryption throughout your cloud journey— data protection for virtual & cloud environments Cost Reduction & Consolidation 1 Cloud Security Fitting Encryption into a VMware Ecosystem Enterprise Key Key Service Console Encryption Solution

VM VMware Virtualization Security Virtual Appliance VM Agentless security Layered server security Encryption for vSphere Private Cloud Agentless security Layered server security Security Virtual Appliance VM Public Cloud Server security console Shared policy profile Vulnerability shielding VM Encryption for vCloud Compliance support (FIM, Encryption, etc.) Encryption console Shared policy profile Key ownership Encryption for leading cloud providers Compliance support (FIM, Encryption, etc.) Agent-based security Layered server security VM Virtualization and Cloud Security One Security Model

Copyright 2013 Trend Micro Inc. Data Center Physical Virtual Private CloudPublic Cloud Cloud and Data Center Security Anti-Malware Integrity Monitoring Encryption Log Inspection Firewall Intrusion Prevention Data Center Ops Security

Copyright 2013 Trend Micro Inc. Source: IDC, 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011 Trend Micro 27% VMware Technology Alliance ‘Partner of the Year’

Thank You!