Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
Worry-Free Business Security 6.0 Filip Demianiuk – Technical Manager Central Eastern Europe Monday, April 13, 2015.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Virtual techdays INDIA │ august 2010 Threat Management Gateway 2010 – A Deep Dive Anirudh Singh Rautela │ TSP – Security, Microsoft Corporation.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
OpenField Consolidates Stadium Data, Provides CRM and Analysis Functions for an Intelligent, End-to-End Solution COMPANY PROFILE : OPENFIELD Founded by.
Sky Advanced Threat Prevention
Connect Applications and Business Partners in Integration Cloud, the Reliable and Transparent Integration Environment Built on Microsoft Azure MICROSOFT.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Exchange Online Advanced Threat Protection
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Barracuda Web Filtering Service
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Exchange Online Advanced Threat Protection
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Secure once, run anywhere Simplify your security with Sophos
Logicom Cloud Marketplace
Microsoft Data Insights Summit
Presentation transcript:

Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer

Agenda Trend Micro Overview 1 Changing Malware Market 2 Smart Protection Networks 3 Wrap-Up 4 Slide #2

Slide #3 Trend Micro Overview

Vision and Mission A world where it is absolutely safe to exchange digital information Our Vision Develop, deliver, and support the most flexible and customizable Internet security solutions to address the threats on the Web Our Mission ever-changing Smart Protection Network Launched June 18 th 2008 Slide #4

Trend Micro Vital Stats Founded: 1988 Operations in over 50 countries Headquartered: Tokyo, Japan Slide #5 3,600+ Employees

Trend Micro Vital Stats 2007 Revenue: $848 Million Sales: Channel/Partner Consultancy: Channel/Partner Support: Channel/Partner Slide #6

Segments Time to Protect Slide #7 Smart Protection Network

Slide #8 Changing Malware Market

Increasing Threat Malware is becoming increasingly dangerous and harder to detect. Slide #9 Malware is Multiplying Malware Samples 1988: 1, : 177, : 1,100,000+ Pattern Files Can’t Keep Up { Malware is Sophisticated Malware Variants Multi-Vector Polymorphic Rapid Variants { Malware is Profit-Driven Malware Actions Stealthy Targeted Crime & Espionage Increased Liability Costs {

Underground Economy AssetGoing-rate Pay-out for each unique adware installation$ Malware package, basic version$1,000 – $2,000 Malware package with add-on servicesStarting at $20 Exploit kit rental (1 hour)$0.99 to $1 Exploit kit rental (2.5 hours)$1.60 to $2 Exploit kit rental (5 hours)$4, may vary Undetected copy of info-sealing Trojan$80, may vary Distributed Denial of Service attack$100 per day 10,000 compromised PCs$1,000 Stolen bank account credentialsStarting at $50 1 million freshly-harvested s (unver)$8 and up Sample data from research on the underground digital economy in 2007 Slide #10

Projected Threats The Volume Problem Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) By ,000,000 Per Year Slide #11

Slide #12 Smart Protection Network

Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat Correlation Slide #13

Next generation architecture Competition are way behind. Slide #14

Press Launch Enterprise Strategy Group (ESG) Trend Micro Marries Security with Cloud Computing Date: July 2008 Author: Jon Oltsik, Senior Analyst and Charlotte Dunlap, Senior Analyst Last week in New York City, Trend Micro announced its Trend Micro Smart Protection Network, a new type of security model that marries a lightweight desktop agent to Trend’s vast network- based resources in the cloud. The new SaaS model is spot on and a view of things to come for threat management. If Trend Micro can 1. educate the market, 2. convert customers, and 3. execute with sales and marketing, the Trend Micro Smart Protection Network could enhance Trend’s market position, revenue, and valuation. Slide #15

Press Launch Slide #16

Hybrid Client Hybrid Client Cloud-based complementing traditional anti-malware pattern updates Enterprise Network Caches Pattern File Size Reduction Not Always Connected Performance Cache Host-Based Behavioral Anti-Malware (HIPS) is Helpful Some Traditional AV benchmarking may no longer be valid. Slide #17

Smart Protection Network It powers both on-premise and hosted solutions to protect users whether they are on the network, at home, or on the go, using light weight clients to access its unique in-the- cloud network of correlated , Web and file reputation technologies, as well as threat databases. Customers’ protection is automatically updated and strengthened as more products, services and users access the network, creating a real-time neighbourhood watch protection service for its users. Cloud-Client Hybrid (Formal Statement) Slide #18

Backend investment 3.5 billion URL requests per day 20 million+ install base %+ uptime 5 data center (US, EMEA, APAC) 1000 production servers Category Collaboration Anti-Spam Operation Anti-Spam Operation Anti-Malware Operation Anti-Malware Operation Threat Research Operation Threat Research Operation Security Services Reputation Services Reputation Services OEM Partners URL Sourcing End User Query Traffic End User Query Traffic Web Crawler Web Crawler Customer Feedback Customer Feedback URLs in Spam Mails URLs in Spam Mails URL Threat Research URL Threat Research 3rd Party Sources 3rd Party Sources URLs Malicious EXE or URLs URLs with malware URLs DNS & HTTP URL Analysis Automatic Rating Systems Zone Builder/Dispatcher URL Database JIT Human Validation Category Reputation Worldwide Services Dispatch Category & Reputation Score URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points TMUFE AV/AS Detection Signature or Heuristics Web Reputation Service URL Filtering Service Point Products Slide #19

Backend Investment Competition are way behind. Many cannot make the investment $ Most utilize non-integrated third-party products Slide #20

Key Infrastructure Components Specialized Threat Analysis Web reputation technology reputation technology File reputation technology Behavioural analysis “Neighbourhood Watch” Correlates multiple events from many sources Customer feedback Web Crawlers Honey Pots Trend Labs Other AV companies Prioritises further analysis Real-Time Services Feedback Loop Backend Correlation Technology TrendLabs Slide #21

In-the-Cloud File Reputation Product Launch in 1H 2009 Part of Smart Protection Network Rapid Protection from File Modifying Malware Extends Existing File Scanning Features White/ Black Listing Functionality Virtualization Support Strengthens Data-Centre Correlation In-the-Cloud Thin-Client File Scanning Slide #22

Already Live Slide #23

Slide #24 Smart Protection Network Products

Smart Protection Network Product Support Slide #25 Web Reputation TIS & TIS Pro 2008, 2009 WBFS Standard & Advanced OfficeScan 8.x IWSS/IWSVA 3.x C&CS { Reputation WFBS Advanced IMSS/IMSVA Advanced SPS IMHS Standard & Advanced (includes web reputation for embedded links within ) C&CS { File Reputation (Whitelisting) File Reputation (Whitelisting) TIS & TIS Pro 2008, 2009 WFBS Standard & Advanced {

Threats Services InterScan™ Messaging Hosted Security Internet Worry-Free™ SecureSite Desktop & ServerGateway Small Business Server/Exchange Worry Free Advanced Worry-Free Standard Gateway Security Partner Solutions Linksys Worry-Free™ Remote Manager Small Business Slide #26

Threats Medium Business 24 x 7 Support Trend Micro Message Archiver Trend Micro LeakProof ™ Desktop & ServerGateway Mail Server ScanMail™ OfficeScan™ InterScan™ Web Security InterScan™ Messaging Security NeatSuite™ Client Server Messaging Suite Services InterScan™ Messaging Hosted Security Internet Slide #27

Enterprise Business Threats Services InterScan™ Messaging Hosted Security Internet 24 x 7 Support Trend Micro Message Archiver Trend Micro LeakProof ™ Endpoint Gateway Servers Management InterScan™ Web Security InterScan™ Messaging Security ScanMail™ IM Security for OCS Solution ServerProtect™ SharePoint Portal Trend Micro Control Manager™ NeatSuite™ Client Server Messaging Suite OfficeScan™ Slide #28

Wrap-Up

Already Proven Over Many months (ERS & WRS) Data centres scale to enterprise Embedded in many TM products Still evolving -- FRS Smart Protection Network - Architecture Slide #30

Smart Protection Network - USP Smart Protection Network (USP) Less Network Traffic Lightweight Clients, Less Memory Removes Pattern Monitoring/ Management Protects Customers in Near Real Time Slide #31

Smart Protection Network - USP Less Staff TimeReduced CostsImproved ProductivityLowered Data TheftEnhanced Legal Compliance Slide #32

33 The End