33
Copyright 2018 Trend Micro Inc. 1 PRESENTERS Trend Micro Brand Manager at Virtual Graffiti Compliance Level Security Specialist +10 Years of Managed Security Service Provider Sales Experience US Channel Sales Engineer 20 Years Experience in Data Center Engineering and Security JOE PURCELL [email protected] ROY BALLARD [email protected]

Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.1

PRESENTERS

• Trend Micro Brand Manager at Virtual Graffiti

• Compliance Level Security Specialist

• +10 Years of Managed Security Service

Provider Sales Experience

• US Channel Sales Engineer

• 20 Years Experience in Data Center Engineering

and Security

JOE [email protected]

ROY [email protected]

Page 2: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.2

WEBINAR INFORMATION

• Duration: 45 mins

• Opportunity to Interact – Use the chat for questions

• Post Webinar Opportunity for Further Discussion

• Giveaway - Remain to the end to be eligible to win

Page 3: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.3

AGENDA

• Speaker Introductions

• About Virtual Graffiti & Trend Micro

• The 5 Challenges of Hybrid Cloud Security

• Post Webinar Discussion / Q&A

Page 4: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

• Founded in 2000, based in Irvine California

• Locations in Australia, the United Kingdom and Israel

• Reseller of 200 leading brands in multiple verticals

• Services customers across industries and sizes –

SMB to Enterprise & Government

• Specialists in Cyber/Network Security

• 160,000+ customers worldwide

Page 5: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

• Virtual Graffiti & Trend Micro - Partners for more than 15 years

• Gold Partner Status

• 30 Sales People including a Presales Engineering Team

• TrendDefense.com – dedicated website

• Purchase online, or speak to a product specialist via live chat, email or

phone

Page 6: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,
Page 7: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Introduction to The Evolving Data Center

• Data Centers were on-premise

• Organizations expanded into multiple locations, Data Centers needed to

keep up growth

• Virtualization, High Speed Internet and SAN storage, enabled Data

Centers to expand but were outgrowing their environments.

• Costs of real estate and utilities pushed alternative “Hosting” options for

ever-growing infrastructure

• IAAS (Infrastructure As a Service) aka Cloud Services enabled

organizations to bring their applications into Global Service, which has led

to the adoption of Hybrid Cloud

• Hybrid Cloud - A combination of On-Premise, Hosting and IAAS.

• Data has spread throughout multiple environments - > how do we keep it

secure?

Page 8: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Top

Challenges of the Evolving Data center

Joe Purcell, Compliance Level Security Specialist

Roy Ballard, Sales Engineer

Page 9: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.9

PublicCloud

Virtual Servers

Virtual Desktops

INFRASTRUCTURE CHANGE…

PhysicalServers

Containers

Serverless

1011

0100

0010

Page 10: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.10

Cloud workloads have different requirements for security than

end-user facing endpoints, and the adoption of hybrid

private/public cloud computing models compound the differences.

Source: Gartner, “Market Guide for Cloud Workload Protection Platforms”, March 2017 G00300334

ANALYST RECOMMENDATIONS

CISOs should deploy products specifically designed

for the protection of hybrid cloud workloads.

Page 11: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.11

You can solve Server Security

with only One Technique

Page 12: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.12

You can solve Server Security with One Technique

File-based

Network

System

Users

Page 13: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.13

Anti-Malware & Web Reputation

Intrusion Prevention (IPS) & Firewall

Integrity Monitoring & Log Inspection

Application Control

Safe files & actions allowed

Malicious files & actions blocked

LEG

END

Known Good

Known Bad

Unknown

Machine Learning

Behavioral Analysis

Run-Time Machine LearningCustom Sandbox Analysis

DEPLOY A CROSS-GENERATIONAL BLEND OF

THREAT DEFENSE TECHNIQUES

Page 14: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.14

MULTIPLE ENVIRONMENTS,

MULTIPLE TOOLS…

…COMPLEXITY ABOUNDS

Page 15: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.15

MULTIPLE ENVIRONMENTS

Containers

+ +Data Center Cloud

Page 16: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.16

Require vendors to support the security and

visibility of workloads that span physical, virtual

and multiple public cloud IaaS all from a single

policy management framework and console.

CRITICAL REQUIREMENTS

Source: Gartner, “Market Guide for Cloud Workload Protection Platforms”, March 2017 G00300334

Page 17: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.17

Deep Security

OPTIMIZED

Page 18: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.18

I Should Always rely on a

Perimeter Defense

Page 19: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.19

PERIMITER DEFENSES DON’T TRANSLATE TO CLOUD

Limited bandwidth of virtual appliances (<1Gbps)

Single point of failure

Lack of context of the guests

Page 20: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.20

No reconfiguration needed

Unlimited bandwidth

No single point of failure

Intrusion Prevention has context (lower false

positives) and System Security at the same time

HOST-BASED IPS BEST FOR CLOUD

Page 21: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.21

VULNERABILITIES DON’T STOP OR GO AWAY

2

Heartbleed

Shellshock

66.3% of all published

vulnerabilities in 2017

WannaCryErebus

Page 22: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.22

VIRTUAL PATCHING AT THE HOST

• Reduce operational costs of

emergency patching

• Protect systems where no

patches will be provided

• Secure server and application-

level vulnerabilities Patch

Available

Complete

Deployment

Test

Vulnerability Disclosed or Exploit Available

Begin

Deployment

Patched

Virtually patch with Trend Micro Shielding / IPS

Page 23: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.23

I Shouldn’t Trust The Cloud

Service Provider – Cloud Is

Insecure

Page 24: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.24

Page 25: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.25

Page 26: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.26

Cloud Is The Hardest Part of

Hybrid Cloud Security

Page 27: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.27

DATA CENTER SECURITY OWNERSHIP IS CLEAR

Foundation Services

Compute Storage Database Networking

Global Infrastructure

Regions

Domains, Availability Zones

Data Encryption Network Traffic Protection

Platform, Applications

Operating System, Network & Firewall Configuration

Content and Applications

Page 28: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.28

Data Encryption Network Traffic Protection

Platform, Applications

Operating System, Network & Firewall Configuration

Content and Applications

Foundation Services

Compute Storage Database Networking

Global Infrastructure

Regions

Domains, Availability Zones

Foundation Services

Compute Storage Database Networking

Global Infrastructure

Regions

Domains, Availability Zones

Cloud Provider

Customer!

RESPONSIBILITY IS SHARED IN THE CLOUD

Page 29: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.29

CLOUD DEPLOYMENTS CAN BE MORE SECURE

Page 30: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.30

Page 31: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.31

RECOMMENDATIONS

• Don't assume end-user Endpoint solutions are best-suited to protect cloud

server workloads, which have vastly different protection requirements*

• Due diligence to assess your environment

• Seek insights from Cloud & Virtualization security experts

• Invest in critical compliance program processes to enhance security and

maintain compliance

• Look for vendors to support the security and visibility of workloads that

span physical, virtual, multiple public cloud IaaS and containers*

• Look for vendors to support native integration with Vmware, AWS and

Azure**2018 Gartner Security Strategies & Risk Management Summit

Page 32: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.32

Questions

Page 33: Trend Micro Deep Security as a Service · 2018-12-13 · Introduction to The Evolving Data Center • Data Centers were on-premise • Organizations expanded into multiple locations,

Copyright 2018 Trend Micro Inc.33

TrendDefense.com

Contact Us For A Free Consultation

[email protected]

800-886-5369