10/14/2015 Introducing Worry-Free SecureSite. Copyright 2007 - Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Araullo, Carlo Mari Chan, John Mark Dela Pena, Carmina Santillan, Jeane Pauline.
The Threat Landscape Jan Threat Report 2.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Team Members: Brad Stancel,
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Security Issues and Challenges in Cloud Computing
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
SiteLock Internet Security: Big Threats for Small Business.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Director of Research, SANS Institute
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Classification 10/3/2015 Worry-Free Business Security 5.0.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cross Site Scripting and its Issues By Odion Oisamoje.
Web Application Vulnerabilities ECE 4112 Internetwork Security, Spring 2005 Chris Kelly Chris Lewis April 28, 2005 ECE 4112 Internetwork Security, Spring.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
Deconstructing API Security
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
What Is XSS ? ! Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Reach us at Call: | Visit:
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
BUILD SECURE PRODUCTS AND SERVICES
Security Unit 1 Business skills for e-commerce
Jon Peppler, Menlo Security Channels
Virtualization & Security real solutions
Information Security Awareness
Presentation transcript:

10/14/2015 Introducing Worry-Free SecureSite

Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target customers Competitive Key Selling Points/Strategies

Copyright Trend Micro Inc. The threat environment Complexity Crimeware Spyware Spam Mass Mailers Intelligent Botnets Web Threats Multi-Vector Multi-Component Web Polymorphic Rapid Variants Single Instance Single Target Regional Attacks Silent, Hidden Hard to Clean Botnet Enabled Information Stealing Vulnerabilities Worm/ Outbreaks

Copyright Trend Micro Inc. How vulnerable are Web sites? Fifty per cent – one of every two – online retail sites have serious vulnerabilities 1 –SQL injection –XSS vulnerabilities More than 22,000 known xss vulnerabilities identified at named Web sites 2 –Only 5% fixed More than 40% of Web threat incidents involved legitimate sites unknowingly distributing malware 3 1)Trend Micro research ) April )TrendLabs Blog

Copyright Trend Micro Inc. What is SQL injection? Injecting a script into website’s SQL database via online form Injecting a script into SQL database via Web-based form –Can be prevented with field parameters –Proliferation of forms w/ distributed owners is challenge

Copyright Trend Micro Inc. What is SQL Injection?

Copyright Trend Micro Inc. What is XSS? XSS = cross–site scripting to inject malware into Web pages –Local –Non-persistent –Persistent Takes advantage of site-specific vulnerabilities Can be used to: –Hijack and redirect user’s session –Access user session cookie and impersonate end-user –Can bypass access controls such as same origin policy –Can be used to craft phishing attacks and browser exploits

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is XSS?

Copyright Trend Micro Inc. What is Worry-Free SecureSite? 1.Assess, validate and monitor web sites against vulnerabilities 2.SecureSite mark for validated sites 3.If necessary, remediation steps and documentation provided

Copyright Trend Micro Inc. How is Worry-Free SecureSite different than competition? Provided by a widely known and trusted security vendor Channel partners have required experience to help remediate vulnerabilities Affordable pricing to drive volume adoption and partner service revenue –Mark priced affordably for smaller online retailers –Ongoing scanning priced affordably for larger websites

Copyright Trend Micro Inc. Level the playing field for your online retail customers New service business –OnDemand web application vulnerability assessment –Remediation services –Ongoing vulnerability monitoring –PCI compliance Higher recurring revenue –Hosted solutions have up to 2x higher re-purchase rates than equivalent tradt’l software Worry-Free SecureSite Benefits to Channel Partners

Copyright Trend Micro Inc. How is Worry-Free SecureSite available? Annual hosted subscription Licensed per domain scanned Free trials available –Try and buy –Enable OnDemand scanning and reports

Copyright Trend Micro Inc. Why Trend Micro? Web Filtering Security-as- a-Service Web-based Centralized Management Network Access Control Reputation Services Gateway Virus Protection 2-Hour Virus Response SLA LAN Server Virus Protection Server-based Virus Protection Threat Lifecycle Management Strategy Trend Micro and Cisco Integrated Gateway Content Security Botnet Identification Service Our #1 goal is to create value for our customers through continuous innovation Compliance Data Leak Prevention Web Threat Protection

Copyright Trend Micro Inc. Why Trend Micro? More than 3.2 billion websites monitored on a daily basis

Copyright Trend Micro Inc. Why Trend Micro? TrendLabs helps provide a worldwide platform for delivering timely threat intelligence, service, and support anytime, anywhere.

Copyright Trend Micro Inc. Competition

Copyright Trend Micro Inc. Competition

Copyright Trend Micro Inc. Competition