The Changing World of Endpoint Protection

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Security for Today’s Threat Landscape Kat Pelak 1.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Innovative IT Solutions for Indian Enterprises Alexander Zarovsky Chief Business Development Officer InfoWatch.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Protection from internal threats: Evolution of DLP or Who sets trends.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
McAfee Web Protection Protect Your Enterprise Against Web Threats.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Sky Advanced Threat Prevention
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Microsoft and Symantec
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
The Changing World of Endpoint Protection
Exchange Online Advanced Threat Protection
Journey to Microsoft Secure Cloud
Virtualization & Security real solutions
Exchange Online Advanced Threat Protection
Protect your OneDrive and SharePoint files on mobile devices
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

The Changing World of Endpoint Protection Hashem El Telawi October 2015

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET 4/23/2017 Identify trends Understand customer behavior INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Analyze opportunities All of this data can be converted to valuable information from which you can derive incredible insights and create a HUGE competitive advantage. Information has become YOUR MOST strategic asset. <Click> Knowing how to zero in on the strategic information and analyze it can allow you to: Identify new market opportunities Gain insight into customer behavior Analyze new opportunities Find operational efficiencies …and more And there is no doubt that this information is incredibly valuable. This information has become the most important, strategic asset for an organization. Discover efficiencies Confidential | Copyright 2012 Trend Micro Inc.

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Payment Card Industry (PCI) 4/23/2017 Protected Health Information (PHI) INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Intellectual Property (IP) Personally Identifiable Information (PII) But hidden amongst all that information is loads of sensitive information – information like credit card, health or personal data that your customers expect you to safeguard for them. As well as intellectual property that you need to protect. Confidential | Copyright 2012 Trend Micro Inc.

2 55% 90% $1B+ COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL Payment Card Industry (PCI) 4/23/2017 Protected Health Information (PHI) 2 55% 90% $1B+ COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALL EASTERN EUROPEAN CYBERCRIMINALS ESTIMATED COST OF RECENT RETAIL DATA BREACH NEW THREATS CREATED EVERY SECOND ORGANIZATIONS HAVE ACTIVE MALWARE NOT EVEN AWARE OF INTRUSIONS Intellectual Property (IP) Personally Identifiable Information (PII) And this is the same information that Cybercriminals are after. It has truly become a business. 2 new threats are created every second (Source: Trend Micro SPN statistics) <Click> It has become its own underground economy. Virtually all cybercriminals use toolkits. They can download prebuilt executables that allows them to exploit know vulnerabilities. <click> Not surprisingly, we have found that 90% of organizations have active malware, and shockingly more than half are not aware of intrusions. (Source: Trend Micro) Analysts estimate the Target breach has cost Target over $1B, not including the obvious damage to their brand reputation and CIO and CEO lost jobs Source: Jeffries Group Inc. retail analysts Confidential | Copyright 2012 Trend Micro Inc.

World’s Biggest Data Breaches: Most are Hacks 4/23/2017 World’s Biggest Data Breaches: Most are Hacks Hacked Inside Job Interesting story Accidental publish Here’s some recent information about the worlds largest data breaches, showing the number of records exposed. Note that most of these breaches were caused by some sort of hacking or malicious activity vs. an accidental loss or publish of information. Source: www.informationisbeautiful.net Confidential | Copyright 2012 Trend Micro Inc.

Vulnerability Exploits Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks It’s not just traditional malware and data leaks that organizations have to deal with. Today’s threats to a company’s are much more complex, and range from data leaks and traditional malware, both of which continue to threaten information, to more sophisticated threats of today like vulnerability exploits and advanced malware…not to mention the range of different techniques used in targeted attacks. This range of threats make it much more difficult to protect information, and deal with today’s trends of consumerization, cloud & virtualization, and cyber threats. Time Copyright 2014 Trend Micro Inc.

File/Folder & Removable Media 4/23/2017 Then. . .! Web Access Email & Messaging File/Folder & Removable Media Employees IT Admin In the past, IT had an easier time dealing with employees and all their activities. Users did email, surfed the web, and created documents locally and on file servers as well as USB drives, almost exclusively using Windows and Microsoft applications. You had av at the enpoint, gateway and mailserver. You had antispam at the mail server and gateway, and you had web url filtering at the gateway, and life was good. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

File/Folder & Removable Media 4/23/2017 Now. . . ! Device Hopping Cloud Sync & Sharing Collaboration Web Access Social Networking Email & Messaging File/Folder & Removable Media Employees IT Admin Today, users are doing more activities – using mobile devices, synchronizing files to the cloud with Drop box and other applications, sharing and collaborating with others using multiple web based applications, and using social networks. The range of devices, operating systems, and client and web based applications make this a very tough environment for IT to support, let alone secure. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

IT Workload Increasing 4/23/2017 IT Workload Increasing More complex compliance Many more environments IT Admin Today, users are doing more activities – using mobile devices, synchronizing files to the cloud with Drop box and other applications, sharing and collaborating with others using multiple web based applications, and using social networks. The range of devices, operating systems, and client and web based applications make this a very tough environment for IT to support, let alone secure. Copyright 2014 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

A Gradual Transition to the Cloud “25% of Office customers now have Office 365. Microsoft, April 2013 Copyright 2014 Trend Micro Inc.

Attackers

Attackers

Increased Opportunity for Threats and Data Loss

Evolving Threat Landscape Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks Time Copyright 2013 Trend Micro Inc.

Customers need a range of capabilities… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

…but don’t want lots of consoles! No interconnected threat response Reduced timeliness Higher cost Higher workload !#$%*?! Email Security Mobile Security Advanced Threat Protection IT Admin Secure Web Gateway Endpoint Protection Application Control ----- Meeting Notes (1/2/14 14:37) ----- Timeliness, not just workload. To react quickly enough. Formatting on the bubble. SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

…or separate cloud / on-premise consoles Copyright 2014 Trend Micro Inc.

Suite vendors help improve this… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc.

Requirements of an effective endpoint solution Copyright 2014 Trend Micro Inc.

Any device, any app, anywhere Web Access Device Hopping Cloud Sync & Sharing Email & Messaging Collaboration File/Folder & Removable Media Employees Social Networking Anti-Malware Content Filtering Data Loss Prevention Encryption Device Management Application Control Endpoint Solutions IT Admin Security Intelligence Network Copyright 2014 Trend Micro Inc.

It’s not about traditional AV anymore Copyright 2014 Trend Micro Inc.

Evolving Threat Landscape Targeted Attacks Advanced Malware Vulnerability Exploits Traditional Malware Sophistication Employee Data Leaks ----- Meeting Notes (12/30/13 11:02) ----- Ones on the left are the tallest. Y axis is volume. X axis is "Business impact". Remove red boxes, add icon imagery. ----- Meeting Notes (1/2/14 14:37) ----- Flip again. X axis is time. Y axis is Sophistication. Title "Evolving threat landscape. Time Copyright 2013 Trend Micro Inc.

Vulnerability Protection Web Reputation Web Gateway 827M in March 2014 284M in March 2014 Sandboxing Device Control Behavior Monitoring File Reputation Network Forensics Vulnerability Protection Web Reputation Web Gateway DLP Encryption Email Reputation Email Gateway or Server Unpacking Memory Inspection Application Whitelisting SharePoint Server Command & Control Blocking Copyright 2014 Trend Micro Inc.

Comprehensive Protection vs Threats APPLICATION CONTROL BEHAVIOR MONITORING COMMAND&CONTROL BLOCK SANDBOXING INTEGRATION SIG-BASED WEB REP VULNERABILITY PROTECTION BROWSER EXPLOIT PROTECTION DLP ENCRYPTION DEVICE POLICY The Modern Suite Employee Data Leaks Traditional malware Vulnerability exploits Advanced Malware Targeted Attacks Copyright 2014 Trend Micro Inc.

Protection On-Premise and in the Cloud Endpoint Protection Messaging Security Secure Web Gateway ✔ Copyright 2014 Trend Micro Inc.

Superior Cloud / Client Architecture Increases Efficiency Minimal endpoint / network impact Real-time protection 213 MB 118 MB 36 MB Source: Trend Micro, tested on 22nd August 2013 using the latest endpoint products with the latest pattern at the time of testing

A Global Intelligence Data Network 4/23/2017 A Global Intelligence Data Network Collects via global sensor net Big data analytics Global threat intelligence Copyright 2013 Trend Micro Inc. Confidential | Copyright 2012 Trend Micro Inc.

500k commercial customers & Trend Micro Enterprise 26 years focused on security software, now largest pure-play Consistent – A World Safe for Exchanging Digital Information Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) 8 consecutive years on Dow Jones Sustainability Indexes Customers include 48 of top 50 global corporations 5200+ employees, 38 business units worldwide Midsize Business Small Business Consumer Consumers 500k commercial customers & 155M endpoints protected Trend Micro has been in business for 26 years and has focused solely on the security business…Today, we are the largest pure-play security software company in the world. Since we were founded, we have had one consistent vision, and are passionate about making the world a safer place. We are headquartered in Tokyo, Japan, and are listed on the Nikkei Index as 4704. We have been on the Dow Jones Sustainability index for 8 straight years, and our customers include 48 of the top 50 global corporations. We currently have over 5200 employees, in 38 business units worldwide in over 50 countries, and we are protecting over 500,000 businesses and governments, and millions of consumers. Copyright 2014 Trend Micro Inc.

Thank you!