Download presentation
Presentation is loading. Please wait.
Published byJulianna Wade Modified over 9 years ago
1
Copyright 2011 Trend Micro Inc. Trend Micro Real-Time Threat Management June 13, 2011—launch date; Press Presentation Dan Glessner, Vice-President, Enterprise Marketing Kevin Faulkner, Director, Product Marketing
2
Advanced Targeted Threats Empowered Employees De-Perimeterization Virtualization, Cloud, Consumerization & Mobility Today, Traditional Security is Insufficient Source: Forrester i.e., Stuxnet, Epsilon, Aurora, Mariposa, Zeus, Sony PlayStation, etc. & Wikileaks Trend Micro evaluations find over 90% of enterprise networks contain active malicious malware!
3
3 Copyright 2011 Trend Micro Inc. The Need for Real-time Risk Management Source: Verizon 2011 Data Breach Report 1/3 of infections result in compromise within minutes, but most are not discovered or contained for weeks or months!
4
4 Copyright 2011 Trend Micro Inc. Analysts and Influencers Urge Action “Zero-Trust” security model Use of Network Analysis and Visibility Tools “Lean Forward” proactive security strategy Use of Network Threat Monitoring Tools “Real-Time Risk Management” Use of Threat Monitoring Intelligence US Federal Risk Management Framework Calls for “Continuous Monitoring”
5
5 Copyright 2011 Trend Micro Inc. Increased IT Security Priority: Vulnerability and Threat Management Source: Forrsights Security Survey, Q3 2010 Since 2008, “Managing vulnerabilities and threats” has moved from #5 to #2 “Which of the following initiatives are likely to be your firm’s top IT security priorities over the next 12 months?”
6
6 Copyright 2011 Trend Micro Inc. Announcing: Trend Micro Real-Time Threat Management Solutions Detect, analyze and remediate advanced threats Investigate incident events and contain their impact Monitor and optimize security posture Manage vulnerabilities & proactive virtual patching Augment security staff & expertise Network-Wide Visibility and Control Actionable Threat Intelligence Timely Vulnerability Protection Threat Management System Dynamic Threat Analysis System Threat Intelligence Manager Vulnerability Mgmt. Services Deep Security Virtual Patching Smart Protection Network Intelligence Risk Management Services
7
7 Copyright 2011 Trend Micro Inc. Trend Micro Threat Management System TMS is a Network Analysis and Visibility solution that provides the real-time visibility, insight, and control to protect your company from advanced persistent attacks Network Threat Detection & Deterrence Automated Remediation Malware Forensic Analysis Platform Multi-Level Reporting Risk Management Services Offering Over 300 Enterprise & Government Customers WW
8
8 Copyright 2011 Trend Micro Inc. TMS: Visibility – Insight – Control DataCenter APT Implanted Via Web, Email, USB… Threat Discovery Appliance Command & Control Server APT Communication Detected Threat Mitigator Additional Analysis Detailed Reports: Incident Analysis Executive Summary Root-cause Analysis Signature-free clean up Root-cause analysis Threat Confirmed
9
9 Copyright 2011 Trend Micro Inc. Detection Capabilities New – DTAS Sandbox Detection Engine New – Document Exploit Engine New – DTAS Sandbox Detection Engine New – Document Exploit Engine Multiple unique threat engines 24 hour event correlation Continually updated threat relevance rules Data loss detection Tracks unauthorized app usage and malicious destinations Powered by Smart Protection Network and dedicated Trend researchers Best Detection Rates Lowest False Positives Real-Time Impact
10
10 Copyright 2011 Trend Micro Inc. TMS + Dynamic Threat Analysis System Sandbox execution Malware actions & events Malicious destinations C&C Servers contacted Exportable reports & PCAP files Backend integration into TMS reporting & Mitigator Integrated malware execution and forensic analysis Threat Discovery Appliance Direct File Submission Other Trend Products
11
11 Copyright 2011 Trend Micro Inc. Event Management Customer Pain Points Trend Micro Confidential 8/17/2015 11 *SAN Survey Data 2010 Wide gap between those who know they have a problem, and those who have a solution
12
12 Copyright 2011 Trend Micro Inc. Trend Micro Threat Intelligence Manager Delivers threat intelligence and impact analysis needed to identify and reduce exposure to advanced threats. Incident Analysis and Security Posture Monitoring Real-Time Threat Analysis and Visualization Provide Actionable Intelligence for active threats Visualize event relationships in an attack Office Scan Incident Discovery Threat Discovery Appliance Suspicious Network Behavior Threat Intelligence Manager Threat Analysis and Response Consolidates threat events and uses advanced visualization and intelligence to uncover the hidden threats! Deep Security System Integrity
13
13 Copyright 2011 Trend Micro Inc. What Threat Intelligence Manager Enables Customers can: Identify the hidden or advanced threats Visualize the lifecycle of an attack Establish custom alerts for tracking future events Customized reporting and executive reporting Scorecards for monitoring security posture Answer key questions: –Are there suspicious events that I am missing from my logs? –Are there outbound active connections from compromised systems? –Are there additional endpoints with similar behaviors as the compromised system? –What systems are involved in the attack, and what steps can I take to defend?
14
14 Copyright 2011 Trend Micro Inc. Customizable Dashboard Access and visualization by role and responsibility
15
15 Copyright 2011 Trend Micro Inc. Threat Intelligence Manager Threat Management System Dynamic Threat Analysis System Endpoints Network Servers Multi-point detection Validation Threat Analysis Impact Assessment Automated Remediation Pro-active Protection Real-Time Threat Management In Action
16
Benefits of Trend Micro Real-Time Threat Management Solutions Compromise Days / Weeks Weeks / Months Discovery Containment Entry Hours Level of Damage from APT Trend expedites containment – helping identify, remediate and protect infiltrated and susceptible systems Intelligent threat and log analysis Automated remediation Virtual patching If entry successful, Trend shortens the time to discovery – minimizing the risk and damages of actual compromise Network-level analysis & visibility Intelligent threat and log analysis HIPS, virtual patching, Integrity Monitoring Trend minimizes the likelihood of APT intrusion - blocking threat exposure, vulnerability and communication Smart Protection Network reputation intelligence Network-level analysis & visibility Vulnerability scanning & virtual patching
17
17 Copyright 2011 Trend Micro Inc. New Risk Management Services Proactive monitoring and alerting Threat analysis and advisory Threat remediation assistance Risk posture review and analysis Strategic security planning Augment stretched IT security staff Put Trend Micro Threat Researchers and Service Specialists on your team A complete portfolio designed to further reduce risk exposure and security management costs Increase IT security responsiveness and expertise
18
18 Copyright 2011 Trend Micro Inc. Why Trend Micro? Trend Micro is the only vendor providing integrated real-time protection and risk management against advanced targeted threats. Network-Wide Visibility and Control Actionable Threat Intelligence Timely Vulnerability Protection Threat Management System Dynamic Threat Analysis System Threat Intelligence Manager Vulnerability Mgmt. Services Deep Security Virtual Patching Smart Protection Network Intelligence Risk Management Services “Trend Micro has always impressed me with its understanding of what its customers are going through and this reiterates it again.” Richard Stiennon, IT-Harvest
19
19 Copyright 2011 Trend Micro Inc. Appendix
20
20 Copyright 2011 Trend Micro Inc. The Virtual Patching Solution Close window of vulnerability for critical systems and applications Protect “unpatchable” systems Meet 30-day PCI patch requirement Risk Mgt & Compliance Reduce patch cycle frequency Avoid ad-hoc patching Minimize system downtime Operational Impact Trend Micro Security Center provides Virtual Patches within hours of vulnerability disclosure Automated centralized distribution Protection available: Deep Security product module With OfficeScan IDF plugin Automated Monitoring Application Analysis Filter “Patch” Development Protection Delivery Trend Micro Security Center Trend Micro Security Center Physical / Virtual / Cloud Servers Endpoints & Devices
21
21 Copyright 2011 Trend Micro Inc. Vulnerability Management System Vulnerability scanning –Vulnerability scanning of internal and external devices –Patch and configuration recommendations Web application scanning –Web site crawler to detect application design vulnerabilities like SQL injection and cross-site scripting etc. PCI compliant scanning –Vulnerability scanning with reports for PCI –Trend is an Approved Scanning Vendor Policy compliance –Define and track compliance with device security policies SaaS based management portal –Hosted scans of external devices –On-premise appliance for scanning internal devices managed from SaaS portal –On-demand scan 21
22
22 Copyright 2011 Trend Micro Inc. Flavors of “Intelligence” Security Information & Event Management (SIEM): The collection and advanced analysis of logs/events across all security disciplines into a central platform, for high-level status and event review. Threat Intelligence is: Threat Intelligence is a complementary technology to SIEM, with greater focus on the “threat space” of security
23
23 Copyright 2011 Trend Micro Inc. Advanced Visualization & Impact Analysis Visualize the relationship between cause and effect of each threat event, and fully understand the impact
24
24 Copyright 2011 Trend Micro Inc. Jan 2011 results of testing conducted by AV-Test.org (qualified for internal use) Results from T+60 test Trend Micro Smart Protection Network
25
25 Copyright 2011 Trend Micro Inc. http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/nss-labs/index.html?cm_re=HP:Sub:1-_-CORP-_- NSSlabs02 Trend Micro Smart Protection Network
26
26 Copyright 2011 Trend Micro Inc. Industry-proven real-world protection Note: If multiple products from one vendor were evaluated, then vendor’s best performance is listed. *1 : http://www.nsslabs.com/research/endpoint-security/anti-malware/ http://www.nsslabs.com/research/endpoint-security/anti-malware/ *2 : http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html *3 : http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf (Dec. Test performed for Computer Shopper UK) http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf *4 : http://www.av-comparatives.org/images/stories/test/dyn/stats/index.htmlhttp://www.av-comparatives.org/images/stories/test/dyn/stats/index.html Trend Micro Smart Protection Network
27
27 Copyright 2011 Trend Micro Inc. Interactive drill-down dashboards Navigate across corporate groups Pin-point infected sources Perform root-cause analysis Track suspicious user behavior and application usage Detect leakage of regulated data Customizable event alarms Multi-level reporting for managers and executives Available on-premise or hosted Threat Management Portal Coming 2H 2011 Improved drill down capability Sandbox analysis workbench
28
28 Copyright 2011 Trend Micro Inc. Threat Mitigator Technology: Root-cause and signature-free cleanup Cleanup request received Check forensic logs Locate which process performed malicious activity Remove malware process, file and registry entries Locate and remove parent malware Locate and remove child malware In case of failure, a custom cleanup kit is automatically generated by Trend
29
29 Copyright 2011 Trend Micro Inc. Risk Management Services Bronze Services Silver Services Gold Services Diamond Services On-demand advisory services On-demand remediation services Priority event alerting 8X5 access Product installation and configuration Bronze package plus… Weekly report reviews & advisory Monthly status; Quarterly reviews 24X7 access for urgent issues Silver package plus… Daily report reviews & advisory Customized security planning Annual assessment and training Gold package plus… Daily monitoring & communication Complete tailored services delivery Dedicated Technical Account Manager A component of Trend Micro Technical Account Management Services
30
Over 300 Enterprise and Government Customers WW Global Security & Logistics Co.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.