Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
The Changing World of Endpoint Protection Hashem El Telawi October 2015 Identify trends Understand customer behavior INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Analyze opportunities Discover efficiencies 2 Payment Card Industry (PCI) Protected Health Information (PHI) INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET Intellectual Property (IP) Personally Identifiable Information (PII) 3 Payment Card Industry (PCI) Protected Health Information (PHI) 552 90 COMMERCIAL EXPLOIT ESTIMATED KITS COST NEWORGANIZATIONS NOT THREATS EVENCREATED AWAREHAVE OF EVERY USED BY VIRTUALLY OF ALL RECENT RETAIL SECOND ACTIVE INTRUSIONS MALWARE EASTERN EUROPEAN DATA CYBERCRIMINALS BREACH % $1B+ Intellectual Property (IP) Personally Identifiable Information (PII) Source: Jeffries Group Inc. retail analysts 4 World’s Biggest Data Breaches: Most are Hacks Hacked Inside Job Interesting story Accidental publish Source: www.informationisbeautiful.net 5 Sophistication Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2014 Trend Micro Inc. 6 Then. . .! File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin Copyright 2014 Trend Micro Inc. 7 Now. . . ! File/Folder & Removable Media Email & Messaging Web Access Device Hopping Cloud Sync & Sharing Collaboration Social Networking Employees IT Admin Copyright 2014 Trend Micro Inc. 8 IT Workload Increasing More complex compliance Many more environments IT Admin Copyright 2014 Trend Micro Inc. 9 A Gradual Transition to the Cloud “25% of Office customers now have Office 365. Microsoft, April 2013 Copyright 2014 Trend Micro Inc. 10 Attackers Attackers Increased Opportunity for Threats and Data Loss Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2013 Trend Micro Inc. 14 Customers need a range of capabilities… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc. 15 …but don’t want lots of consoles! No interconnected threat response Reduced timeliness Email Security !#$%*?! Higher cost Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Higher workload IT Admin Copyright 2014 Trend Micro Inc. 16 …or separate cloud / on-premise consoles Copyright 2014 Trend Micro Inc. 17 Suite vendors help improve this… Email Security Mobile Security Advanced Threat Protection Secure Web Gateway Endpoint Protection Application Control SharePoint Security Encryption DLP Copyright 2014 Trend Micro Inc. 18 Requirements of an effective endpoint solution Copyright 2014 Trend Micro Inc. 19 File/Folder & Removable Media Email & Messaging Web Access Device Hopping Cloud Sync & Sharing Collaboration Social Networking Employees Anti-Malware Content Filtering Data Loss Prevention Encryption Device Management Endpoint Solutions Application Control Intelligence Network Security IT Admin Copyright 2014 Trend Micro Inc. 20 It’s not about traditional AV anymore Copyright 2014 Trend Micro Inc. 21 Sophistication Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Time Copyright 2013 Trend Micro Inc. 22 Sandboxing Device Control Behavior Monitoring Forensics File Reputation Network Web Reputation Web Gateway Unpacking Email Reputation Email Gateway or Server Memory Inspection Command & Control Blocking Copyright 2014 Trend Micro Inc. 284M in March 2014 Vulnerability Protection DLP Encryption 827M in March 2014 Application Whitelisting SharePoint Server Comprehensive Protection vs Threats The Modern Suite DEVICE POLICY ENCRYPTION DLP SIG-BASED Employee Data Leaks Traditional malware Copyright 2014 Trend Micro Inc. WEB REP SANDBOXING INTEGRATION COMMAND&CONTROL BLOCK BEHAVIOR MONITORING VULNERABILITY PROTECTION BROWSER EXPLOIT PROTECTION APPLICATION CONTROL Vulnerability exploits Advanced Malware Targeted Attacks 24 Protection On-Premise and in the Cloud Copyright 2014 Trend Micro Inc. Endpoint Protection Messaging Security Secure Web Gateway ✔ ✔ ✔ ✔ ✔ ✔ 25 Superior Cloud / Client Architecture Increases Efficiency Minimal endpoint / network impact Real-time protection Source: Trend Micro, tested on 22nd August 2013 using the latest endpoint products with the latest pattern at the time of testing 26 A GLOBAL INTELLIGENCE DATA NETWORK COLLECTS VIA GLOBAL SENSOR NET BIG DATA ANALYTICS GLOBAL THREAT INTELLIGENCE Copyright 2013 Trend Micro Inc. Trend Micro 26 years focused on security software, now largest pure-play Consistent – A World Safe for Exchanging Digital Information Enterprise Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) 8 consecutive years on Dow Jones Sustainability Indexes Customers include 48 of top 50 global corporations 5200+ employees, 38 business units worldwide 500k commercial customers & 155M endpoints protected Midsize Business Small Business Consume Consumers r Copyright 2014 Trend Micro Inc. 28 Thank you!