Upload
kappa-data
View
197
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Is your cloud secure?
Frederik Van RoosendaelPSE Belgium – Luxembourg
Enabling a Smart Protection Strategyin the age of Consumerization, Cloud and new Cyber Threats
Frederik Van RoosendaelPSE Belgium – Luxembourg
Organizations Need a Smart Protection Strategy
Copyright 2013 Trend Micro Inc.
Smart protection against theft and loss
Simple yet flexible to manage and deploy
Security that fits an evolving ecosystem
Copyright 2013 Trend Micro Inc.
Empower the Business…
Copyright 2013 Trend Micro Inc.
…while Protecting Information from Theft and Loss
More Challenging than Ever!
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
Copyright 2013 Trend Micro Inc.
SIGNATURE BASED ANTI-MALWARE
1988 - 2007
Smart protection begins with global threat intelligence…
CLOUD BASEDGLOBAL THREAT
INTELLIGENCE2008
BIG DATA ANALYTICS-DRIVEN
GLOBAL THREAT INTELLIGENCE
2012
• Email reputation• File reputation• Web reputation
• Whitelisting• Network traffic rules• Mobile app reputation• Vulnerabilities/Exploits• Threat Actor Research• Enhanced File Reputation• Enhanced Web Reputation
Copyright 2013 Trend Micro Inc.
Global CLOSER TO
THE SOURCE OF THREATS
CorrelatedIDENTIFIES ALLCOMPONENTS OF AN ATTACK
ProactiveBLOCKS THREATSAT THEIR SOURCE
Real-timeIDENTIFIES
NEW THREATS FASTER
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
Worm Outbreaks
Vulnerabilities
2001
The Changing Threat Landscape
Copyright 2013 Trend Micro Inc.
Worm Outbreaks
Vulnerabilities
DA
MA
GE
CA
US
ED
2001 2004 2005 2007
CRIMEWARE
2003
Spyware
IntelligentBotnets
Web Threats
SpamMass
MailersWorm Outbreaks
Vulnerabilities
Now
TargetedAttacks
• Now it’s personal!• Financially motivated• Targeting valuable
information
Today’s Attacks: Social, Sophisticated, Stealthy!
Copyright 2013 Trend Micro Inc.
Attacker
Moves laterally across network seeking valuable data
Establishes Command & Control server
Extracts data of interest – can go undetected for months!
$$$$
Gathers intelligence about organization and individuals
Targets individuals using social engineering
Employees
Copyright 2013 Trend Micro Inc.
Attacker
Moves laterally across network seeking valuable data
Establishes Command & Control server
Extracts data of interest – can go undetected for months!
$$$$
Gathers intelligence about organization and individuals
Targets individuals using social engineering
Employees
Copyright 2013 Trend Micro Inc.
• In-depth reconnaissance on your employees
• Malware engineered and tested to evade your standard gateway/endpoint defenses
• Human interaction that adapts the attack as it moves within your network
Network Admin
Security
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wideDetection
SpecializedTools
ThreatServices
AutomatedSecurity Updates
AdvancedThreat Analysis
CustomSandboxes
Network Admin
Security
• Advanced threat
analytics
• Correlating local
and global threat
intelligence
Part of Your Smart Protection Strategy
CUSTOMDEFENSE
Smart• Advanced, targeted threat detection• Customizable sandboxes for accurate analysis • Actionable intelligence from global threat intelligence
Simple • Single appliance monitors multiple ports and protocols• Automated, customized security updates
Security that fits• Custom sandbox available to other security products• Custom signatures to other security products
Copyright 2013 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
CUSTOMDEFENSE
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
CUSTOMDEFENSE
Then...
Copyright 2013 Trend Micro Inc.
Email &Messaging
Web Access
File/Folder &Removable Media
Employees
IT Admin
Copyright 2013 Trend Micro Inc.
Now!
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Employees
IT Admin
IT Admin
Copyright 2013 Trend Micro Inc.
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Security
• User behavior is risky by nature
• So many applications and platforms to secure
Employees
IT Admin
Copyright 2013 Trend Micro Inc.
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Security
70% trace loss to USB memory sticks1
91% targeted attacks begin with spear-phishing2
50M+ malicious URLs blocked daily3
Sources: 1. Ponemon Institute study, July 2011; 2. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012; 3. Trend Micro Smart Protection Network daily statistics
Employees
Copyright 2013 Trend Micro Inc.
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
76% allow “BYOD”; about half had data breach1
1 million malicious Android apps by end of 20132
30% mobile devices lost each year3
1. Source: Trend Micro, Mobile Consumerization Trends & Perceptions, IT Executive and CEO Survey 20122. Source: Trend Micro Threat Predictions for 20133. Source: SANS Institute
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
1. Source: Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni, Sept 2012 2. Source: Cryptzone survey of SharePoint users, January 20123. Source: CSO Magazine, Oct 2012
1 in 5 use Dropbox at work, typically against rules1
30% SharePoint users knowingly risk data2
14M Facebook accounts are “undesirable”3
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Complete End User Protection
Email &Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync& Sharing
Social Networking
File/Folder &Removable Media
Anti-Malware EncryptionApplication
ControlDevice
ManagementData LossPrevention
ContentFiltering
Employees
IT Admin
Security
Part of Your Smart Protection Strategy
Copyright 2013 Trend Micro Inc.
COMPLETEEND USER
PROTECTION
Smart• Layered security from mobile devices to gateways• Transparent, real-time protection
Simple • Unified dashboard with centralized policy control• Modular, lightweight and efficient • Flexible deployment: on-premise or hosted• Purpose-built for enterprise, mid-market, service providers
Security that fits• Specialized plug-ins for Exchange, Domino, SharePoint• Open: Win, Mac, iOS, Android, Blackberry…
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
COMPLETEEND USER
PROTECTION
CUSTOMDEFENSE
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
COMPLETEEND USER
PROTECTION
CUSTOMDEFENSE
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Private Cloud
Source: Gartner, Forecast Analysis: Data Center, Worldwide, 2010-2016,1Q12 Update, Jonathon Hardcastle, 16 May, 2012
By 2016, 71% of server workloads
will be virtualized*• Increased business agility
• Lower capital and operational costs
• Instant scalabilityData Center Ops
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Private Cloud
Source: Forrester study
Organizations can cut costs by
74% by storing data in the cloud*
• Increased business agility
• Lower capital and operational costs
• Instant scalabilityData Center Ops
Public Cloud
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Private Cloud
• Server and VM integrity
• Appropriate policy enforcement
• Data protection, especially in the cloud
• Performance and manageability
Public Cloud
Data Center Ops
Security
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Private Cloud Public Cloud
Cloud and Data Center Security
Anti-MalwareIntegrity
MonitoringEncryption
Log InspectionFirewall
IntrusionPrevention
Data Center Ops
Security
Part of Your Smart Protection Strategy
Copyright 2013 Trend Micro Inc.
Smart• Context-aware virtual patching and automated protection• Comprehensive protection across physical, virtual, cloud
Simple • Single platform and administration with modular deployment• Agent-less security for VMware; efficient, high consolidation• Easy multi-tenant and service provider management
Security that fits• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…• Optimized, automated security for VMware and AWS
CLOUD &DATA CENTER
SECURITY
Copyright 2013 Trend Micro Inc.
ConsumerizationCloud & Virtualization
Employees IT
Cyber Threats
CLOUD &DATA CENTER
SECURITY
COMPLETEEND USER
PROTECTION
CUSTOMDEFENSE
Enabling Your Smart Protection Strategy
Copyright 2013 Trend Micro Inc.
Smart protection against theft and loss
Simple yet flexible to manage and deploy
Centralized Lightweight Flexible Purpose-built
Security that fits an evolving ecosystem
Open Optimized Dedicated Future-proof
Layered Real-time Transparent Intelligent
Thank You!