Smart Protection Network Kelvin Liu AVP, Core Tech Development.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect.
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
SPAM/BOTNETS and Malware  Neil Warner, CIO, GoDaddy.com  Moderator: Dan Kaplan, deputy editor, SC Magazine.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
The internet and the WWW
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Hacker Zombie Computer Reflectors Target.
Lectures and Practicals Mon 8-10 SC1222 TUE SC1222 Office: SC Website: mis.csit.sci.tsu.ac.th/kanida.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
The Changing World of Endpoint Protection
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Accessing Evitech network via FTP by Susan Jansson.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Web Content Security Unlock the Power of the Web
Trend Micro Consumer 2010 Easy. Fast. Smart.
Barracuda Firewall The Next-Generation Firewall for Everyone
3.1 Types of Servers.
Web Content Security Unlock the Power of the Web
Barracuda Web Filtering Service
3.1 Types of Servers.
Some bits on how it works
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Welcome To : Group 1 VC Presentation
Contact Norton Antivirus | Norton Antivirus Support UK
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Check Point Connectra NGX R60
Configuring Internet-related services
NETWORK TOOL -SOWMYASRI KONIJETI.
Protocol Application TCP/IP Layer Model
The Internet and Electronic mail
Presentation transcript:

Smart Protection Network Kelvin Liu AVP, Core Tech Development

Copyright Trend Micro Inc. Malware is multiplying Malware is sophisticated Malware is profit driven Spam Spyware Botnets Complexity Worms Web Evolving Threat Landscape Malware is getting increasingly dangerous and harder to detect.

Copyright Trend Micro Inc. Internal - Confidential Example : Conficker / Downadup Internet User receive a spam mail User open the mail then automatically download a file The file register itself as a system service Monitor the Internet browser’s address bar Block access to certain websites Connect to various websites, download other malicious files

Copyright Trend Micro Inc. Feb 2009 Internal - Confidential Smart Protection Network against Conficker Incident Trigger Reputation Web Reputation File Reputation Monitor Many clients’ processes are dropping similar filenames in a short time Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Community Intelligence Smart Protection Network Correlate to figure out where the threat come from & where it would connect to Correlate to figure out where the threat come from & where it would connect to FileScore FromConnect to Crypt.NS.GenX /aexjiire/Euwl.tsst.com:88/e34jg/ Dropper.GenXNdj.sexadult.com/ssr/ee :80/ Nqe.exeVwww.xyz.comwww.abc.com Conflicker_DXqd.wqwwor.com/omnadasm0.info:80/bugsy Conflicker_DXFdjhg.wopqfe.com7f7fewf.cn:80/sina/ Correlation Customer Feedback Log Immediate Protection

Copyright Trend Micro Inc. Incident Trigger Reputation Web Reputation File Reputation Monitor Correlation Feb 2009 Smart Protection Network against Conficker Domain / Name Server / IP / Register’s Correlation to build up a Spider Network Threat Intelligence Correlation Immediate Protection

Copyright Trend Micro Inc. Reputation Web Reputation File Reputation Incident Trigger Monitor Correlation Feb 2009 Smart Protection Network against Conficker Domain / Name Server / IP / Register’s Correlation to build up a Spider Network Threat Intelligence Correlation Immediate Protection

Copyright Trend Micro Inc. What & How Trend Micro use Cloud Computing Feb 2009 Internal - Confidential OS Server Farm Smart Protection Network Tracking System Hadoop ( HBASE / Meta Data ) Virtualization Hadoop (HDFS) Message Routing framework MapReduce Clustering Clawer Analyzer Monitor Incident Trigger Correlation HTTP DNS FTP Operating system Infrastructure Data Archive Data Processing Correlation

Copyright Trend Micro Inc. Feb 2009 Internal - Confidential Why Smart Protection Network Time to Protect Less Complexity Threat Intelligence Reduce Cost Immediate Protection Early Warning Immediate Protection Early Warning Lightweight Clients Less Memory Usage Lightweight Clients Less Memory Usage Reduce Downtime Costs Reduce Hardware Costs Reduce Downtime Costs Reduce Hardware Costs Threat Lifecycle Management

Copyright Trend Micro Inc.

Thank You 業務專線 : (02)