Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Windows Server 2012 Certification and Training June 2012.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
[Name / Title] [Date] Effective Threat Protection Strategies.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Dell Connected Security Solutions Simplify & unify.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Module 6 Planning and Deploying Messaging Security.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Sky Advanced Threat Prevention
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Windows Server 2012 Certification and Training
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
The Changing World of Endpoint Protection
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Trend Micro Consumer 2010 Easy. Fast. Smart.
Cloud Firewall.
Data Center Firewall.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Comodo Dome Data Protection
Presentation transcript:

Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.

Copyright 2009 Trend Micro Inc. SharePoint remains Microsoft’s fastest growing product with over 17,000 customers, 100m seats and $1bn revenue. Which is great for business…but also for Cybercriminals Dynamic collaboration environments optimize productivity but also multiply your security risks –Increased file sharing –Users outside of IT control –Vulnerable Web 2.0 infrastructure –A wealth of sensitive data Web 2.0 Collaboration

Copyright 2009 Trend Micro Inc. Business Opportunity: Helping Customers Collaborate Externally Source: AIIM, June 2009 “Nearly every enterprise I speak with is being asked to enable and foster secure collaboration with external entities.“ - Neil Macdonald, Gartner, Jan 2010

Copyright 2009 Trend Micro Inc. 58% SharePoint installations contain sensitive documents 2 1 CSI.Computer Crime and Security Survey.” 12/09. 2 AIIM SharePoint Survey Sep Infoweek. Strategic Security Survey, 6/09 Attack Fallout: What were the effects of the attack(s)? 1 Information confidential compromised 32% Network unavailable 30% Minor financial losses 23% Business applications unavailable 23% Alienated customers 17% The average security incident cost $234K 3 SharePoint is becoming “mission-critical” for many organizations 64% of organizations experienced a malware infection in

Copyright 2009 Trend Micro Inc. 5 Application Server roles Database Servers Corporate users External users Trend Micro PortalProtect™ for Microsoft SharePoint Proven, highly effective protection –Leading antivirus, antispyware, and Web threat scanning with the Smart Protection Network –File, Web and text content filtering Minimal impact to the server –Tight Microsoft antivirus API integration –Agent-less database inspection Scanning Options: –Real-time as file or Web content is uploaded or accessed –Automatic/Manual scan of the entire repository Web Server Role

Copyright 2009 Trend Micro Inc. What’s New in PortalProtect 2.0 Advanced Content Filtering for both file and Web content –Pre-built templates to filter profanity, racist and sexually discriminatory words and phrases –Integrated DLP with regional templates to scan for sensitive information –Microsoft Active Directory (AD) and SharePoint User/Group Web Reputation filters URLs in Web content such as blogs, wikis, forums with real-time information Management & Installation Enhancements –Supports Single Sign-On (SSO) –Real-Time Monitoring –Quarantine Management SharePoint 2010 support

Copyright 2009 Trend Micro Inc. New! Pre-built Content Filtering Templates

Copyright 2009 Trend Micro Inc. Why Trend Micro PortalProtect Beyond AV protection for SharePoint –Web threat protection –Advanced content filter –Regional DLP templates Enterprise class effectiveness and scalability Low administration / High Throughput –Half the administration of other solutions –Twice the throughput of other solutions

Copyright 2009 Trend Micro Inc. Appendix

Copyright 2009 Trend Micro Inc. Messaging 25 word description Trend Micro™ PortalProtect for SharePoint blocks malware malicious links, inappropriate content, and Personally Identifiable Information. It is used by customers with hundreds of thousands of users. Messages PortalProtect for Microsoft SharePoint enables your organization to realize SharePoint’s full potential to increase the efficiency of your operations and the quality of your care. A top concern for healthcare organizations is ensuring their SharePoint deployment remain compliant with industry regulations such as HIPAA. PortalProtect for SharePoint is the only AV security product for SharePoint which also includes web threat protection and web content filtering.

Copyright 2009 Trend Micro Inc. Screenshot: Administrator Summary

Copyright 2009 Trend Micro Inc. Staying Ahead Of The Threat Landscape Innovative Cloud-Client Infrastructure Stopping threats before they reach your network Physical ServersVirtual Servers Web & Gateways Web Servers Datacenter Corporate Network Private Cloud On-site Employees Security & Systems Management Threat Management Off-site Employees File Reputation Threat Correlation, Feedback Loops, Analysis Reputation Web Reputation THREATS FILE THREATS WEBSITE THREATS 4-year R&D investment Powers Trend Micro Enterprise Security 30 billion queries daily 4 billion threats blocked daily #1 in NSS Labs Rankings Web, file, reputation Enterprise, SMB, Consumer, Partner product integration Automated Smart Feedback All data collected, analyzed, cross-correlated to provide the best, real-time protection The Smart Protection Network Difference

Copyright 2009 Trend Micro Inc. New! Advanced Content Filtering Keyword, regular expression filtering True file type filtering –Including embedded objects (for example an mp3 file embedded in a Word doc) Web content filtering –Blocks malicious URLs before they are posted to, web content, blogs, wikis, discussion forums, or within embedded in files Pre-built DLP regional templates to filter Personally Identifiable Information (PII) –For example, disallow US social security numbers “xxx-xx-xxxx” to be posted Create detailed policies based on AD users/groups or SharePoint users/groups