smart, data-centric security for the post-pc era
Post on 18-Nov-2014
992 Views
Preview:
DESCRIPTION
TRANSCRIPT
Copyright 2012 Trend Micro Inc.
Stephen FT Porter
Alliance & SI Business Manager
Simon Young
EMEA Alliances Director
Trend Micro Discussion
Copyright 2012 Trend Micro Inc.
Product Approach Core Platform – Security Capabilities
Trend Micro Confidential 04/08/2023
2
EndpointPlatform
NetworkPlatform
Data CenterPlatform
ManagementPlatform
• Anti-Malware• Mobile• Data-Loss
Prevention• Encryption• SafeSync
• Anti-Malware• Data-Loss
Prevention• Application ID• Mobile• Web/DB
• Anti-Malware• IDS/IPS• File Integrity• Log Inspection• Data-Loss
Prevention• Encryption
• Policy• Reporting• Threat Intel• Dashboard• Configuration• Update
Copyright 2012 Trend Micro Inc.
Virtual CloudPhysical
Trend is No.1 in Server and Virtualization Security
Trend Micro23.7%
Worldwide Endpoint SecurityRevenue Share by Vendor, 2010
Source: IDC, 2011
Trend Micro13%
Worldwide Endpoint SecurityRevenue Share by Vendor, 2010
Source: IDC, 2011
Source: 2011 Technavio – Global Virtualization Security Management
Solutions
Copyright 2012 Trend Micro Inc.
Servers
Desktops
Stage 1Server Consolidation
Stage 2Expansion & Desktop
Virtualization Journey Stages
Stage 3Private > Public Cloud
15%
30%
70%
85%
Virtualizatio
n Adoption Rate
THE SECURITY INHIBITORSTO VIRTUALIZATION
Copyright 2012 Trend Micro Inc.
The Ever-Changing Threat Landscape
2009
Global Threat Distributions
Based on estimations by a panel of experts within Trend Micro, 2012
2011 2013
Copyright 2012 Trend Micro Inc.
AdvancedTargetedThreats
EmpoweredEmployees
Re-PerimeterizationVirtualization, Cloud Consumerization & Mobility
Outside-in Perimeter Defense Isn’t Enough…
Source: Forrester
Copyright 2012 Trend Micro Inc.
Cloud Application
Consumerization and Mobility
Cloud Data
Cloud Era Revolution
Cloud Infrastructure
Hybrid Cloud Management• Physical • Virtual• Cloud
Technology Evolution
Customer Behaviour
Threat Landscape
Targeted AttackAPT
Cloud ComputingEndpoint Mobility
Data Risk /complianceManagement
Copyright 2012 Trend Micro Inc.Cross-over year
The Enterprise Endpoint Evolution
9
Laptops/PCs
Mobile Devices/SaaS
Virtual
2011 3-5 Years
80%
20%
Total number of endpoints in an enterprise are rising,
driven primarily by consumerization
2013
EndPoint Management Driven
DataCenter Management Driven
15%
50%
35%
Vir
tua
lC
lou
dP
hys
ical
Copyright 2012 Trend Micro Inc.10 Copyright 2011 Trend Micro Inc.
iPad
iPhone
Windows phone
• Challenges:– Manage mobile devices– Provide secure access to
applications and data– Defend against social media-
based attacks– Data protection for BYOIT
• 47%: Mobile workers who have a personally owned tablet that they use for at least some work
Consumerisation
Copyright 2012 Trend Micro Inc.
Consumerization/BYOD
Control the Device
Secure the Data
Manage the Apps
Secure the App Data
Mobile DevicesIn the Enterprise
Hype Cycle
Enterprise(~2500+)
Mid-Market(~250-2500)
2012
Mobile Device Market
Copyright 2012 Trend Micro Inc.
Manage Efficiently• Device Discovery• Device Enrollment• Device Provisioning• Asset Tracking• S/W Management• Remote Control
Secure the Devices• Anti-Malware• Firewall • Web Threat Protection • Email Security• Call/ SMS Anti-Spam• App Control/Lock-down
Protect the Data• Encryption• Remote Wipe• Remote Lock• SIM Change/ Watch• Feature Lock• Password Policy
Central Policy Management
Mobile Device Protection Requirements
Copyright 2012 Trend Micro Inc.
Deep Security Virtual Appliance• Anti-malware• Integrity Monitoring• Firewall
Deep SecurityAn Agentless Security Environment
13
• Intrusion Prevention• Web App Protection• Application Control
VM VM VM
The Old Way
Security Virtual Appliance
VM VM VM
With Deep Security
VM
EasierManageability
HigherDensity
FewerResources
StrongerSecurity
VM
More VMs
Copyright 2012 Trend Micro Inc.
VDI Example – Cost Breakdown
Classification 04/08/2023 14
1000 1250 875
2480 1160 928
1360 440 396
4840 2850 2199
STD VDI VDI+ Security
Copyright 2012 Trend Micro Inc.
SecureCloud: Enterprise Controlled Data Protection for the Cloud
15
Enterprise Key
Hypervisor
VM
SharedStorage
Cloud Service ProviderEnterprise Datacenter or SaaS Offering
Trend MicroCloud Security
Console
CorporateApp
My Data
Copyright 2012 Trend Micro Inc.
Test Test
Deep Security / Secure Cloud Example
Classification 04/08/2023 16
Vmware Vsphere ESX
CustomerCustomer
Customer 1 Customer 2
Unix/Win
Server
Copyright 2012 Trend Micro Inc.
Dashboard (Threat Intelligence Map)
Classification 17
Copyright 2012 Trend Micro Inc.04/08/2023 18
Corporate Network
Threat Discovery Appliance
Threat Intelligence ManagerControl Manager 3rd Party Products
Enterprise Security Manager
IxSVA
OSCE, DSM, IDF Servers
Trend Endpoints
• Risk Assessment
• Risk Mitigation
• Risk Escalation
• Configuration Management
• Update Management
• Log Management
• Alert Management
Copyright 2012 Trend Micro Inc.
Q & A
top related