Download the Presentation

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
The Changing World of Endpoint
Protection
Hashem El Telawi
October 2015
Identify trends
Understand customer behavior
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Analyze opportunities
Discover efficiencies
2
Payment Card Industry (PCI)
Protected Health Information (PHI)
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Intellectual Property (IP)
Personally Identifiable Information (PII)
3
Payment Card Industry (PCI)
Protected Health Information (PHI)
552
90
COMMERCIAL EXPLOIT
ESTIMATED
KITS
COST
NEWORGANIZATIONS
NOT
THREATS
EVENCREATED
AWAREHAVE
OF
EVERY
USED BY VIRTUALLY
OF
ALL
RECENT
RETAIL
SECOND
ACTIVE
INTRUSIONS
MALWARE
EASTERN EUROPEAN DATA
CYBERCRIMINALS
BREACH
%
$1B+
Intellectual Property (IP)
Personally Identifiable Information (PII)
Source: Jeffries Group Inc. retail analysts
4
World’s Biggest Data Breaches: Most are Hacks
Hacked
Inside Job
Interesting
story
Accidental
publish
Source:
www.informationisbeautiful.net
5
Sophistication
Employee Data
Leaks
Traditional
Malware
Vulnerability
Exploits
Advanced
Malware
Targeted
Attacks
Time
Copyright 2014 Trend Micro Inc.
6
Then. . .!
File/Folder &
Removable Media
Email &
Messaging
Web
Access
Employees
IT Admin
Copyright 2014 Trend Micro Inc.
7
Now. . . !
File/Folder &
Removable Media
Email &
Messaging
Web
Access
Device Hopping
Cloud Sync
& Sharing
Collaboration
Social
Networking
Employees
IT Admin
Copyright 2014 Trend Micro Inc.
8
IT Workload Increasing
More complex compliance
Many more environments
IT Admin
Copyright 2014 Trend Micro Inc.
9
A Gradual Transition to the Cloud
“25% of Office customers
now have Office 365.
Microsoft, April 2013
Copyright 2014 Trend Micro Inc.
10
Attackers
Attackers
Increased
Opportunity
for Threats
and Data
Loss
Sophistication
Evolving Threat Landscape
Employee Data
Leaks
Traditional
Malware
Vulnerability
Exploits
Advanced
Malware
Targeted
Attacks
Time
Copyright 2013 Trend Micro Inc.
14
Customers need a range of capabilities…
Email Security
Mobile Security
Advanced Threat Protection
Secure Web Gateway
Endpoint Protection
Application Control
SharePoint Security
Encryption
DLP
Copyright 2014 Trend Micro Inc.
15
…but don’t want lots of consoles!
No interconnected
threat response
Reduced
timeliness
Email
Security
!#$%*?!
Higher cost
Mobile Security
Advanced Threat Protection
Secure Web Gateway
Endpoint Protection
Application Control
SharePoint Security
Encryption
DLP
Higher workload
IT Admin
Copyright 2014 Trend Micro Inc.
16
…or separate cloud / on-premise consoles
Copyright 2014 Trend Micro Inc.
17
Suite vendors help improve this…
Email Security
Mobile Security
Advanced Threat Protection
Secure Web Gateway
Endpoint Protection
Application Control
SharePoint Security
Encryption
DLP
Copyright 2014 Trend Micro Inc.
18
Requirements of an effective endpoint
solution
Copyright 2014 Trend Micro Inc.
19
File/Folder &
Removable Media
Email &
Messaging
Web
Access
Device Hopping
Cloud Sync
& Sharing
Collaboration
Social
Networking
Employees
Anti-Malware
Content
Filtering
Data Loss
Prevention
Encryption
Device
Management
Endpoint Solutions
Application
Control
Intelligence
Network
Security
IT Admin
Copyright 2014 Trend Micro Inc.
20
It’s not about traditional AV anymore
Copyright 2014 Trend Micro Inc.
21
Sophistication
Evolving Threat Landscape
Employee Data
Leaks
Traditional
Malware
Vulnerability
Exploits
Advanced
Malware
Targeted
Attacks
Time
Copyright 2013 Trend Micro Inc.
22
Sandboxing
Device Control
Behavior
Monitoring
Forensics
File
Reputation
Network
Web
Reputation
Web Gateway
Unpacking
Email
Reputation
Email Gateway
or Server
Memory
Inspection
Command &
Control Blocking
Copyright 2014 Trend Micro Inc.
284M in
March 2014
Vulnerability
Protection
DLP
Encryption
827M in
March 2014
Application
Whitelisting
SharePoint
Server
Comprehensive Protection vs Threats
The Modern Suite
DEVICE POLICY
ENCRYPTION
DLP
SIG-BASED
Employee Data
Leaks
Traditional
malware
Copyright 2014 Trend Micro Inc.
WEB REP
SANDBOXING INTEGRATION
COMMAND&CONTROL BLOCK
BEHAVIOR MONITORING
VULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTION
APPLICATION CONTROL
Vulnerability
exploits
Advanced
Malware
Targeted
Attacks
24
Protection On-Premise and in the Cloud
Copyright 2014 Trend Micro Inc.
Endpoint Protection
Messaging Security
Secure Web Gateway
✔
✔
✔
✔
✔
✔
25
Superior Cloud / Client Architecture Increases Efficiency
 Minimal endpoint / network impact
 Real-time protection
Source: Trend Micro, tested on 22nd August 2013 using the latest
endpoint products with the latest pattern at the time of testing
26
A GLOBAL INTELLIGENCE DATA NETWORK
COLLECTS VIA GLOBAL SENSOR NET
BIG DATA ANALYTICS
GLOBAL THREAT INTELLIGENCE
Copyright 2013 Trend Micro Inc.
Trend Micro
 26 years focused on security software, now largest pure-play
 Consistent – A World Safe for Exchanging Digital Information
Enterprise
 Headquartered in Japan, Tokyo Exchange Nikkei Index (4704)
 8 consecutive years on Dow Jones Sustainability Indexes
 Customers include 48 of top 50 global corporations
 5200+ employees, 38 business units worldwide
500k commercial customers &
155M endpoints protected
Midsize
Business
Small
Business
Consume
Consumers
r
Copyright 2014 Trend Micro Inc.
28
Thank you!
Related documents