View
5
Download
0
Category
Preview:
Citation preview
Public3/19/2009
Anthony UngAPAC Product Marketing
Cloud-Client Security – The Smart Protection Network
Agenda
Changing
1
Smart
2 3
Copyright 2007 - Trend Micro Inc.3/19/2009 2Classification
Changing Malware Market
Smart Protection Network
Benefits
Today’s Security Threats
A Lot Can Happen in Just One Minute...
A single attack can steal your confidential data,
damage your infrastructure, and ruin your reputation.
One hijacked website.One deceptive email.One misleading link.
Content security threats are increasingly
dangerous and harder to detect!
Malware is Multiplying
Malware Samples
• 1988: 1,738
• 1998: 177,615
• 2008: 1,100,000+
• Pattern Files Can’t Keep Up{
Malware Variants
{
The Threat Is REAL
Copyright 2007 - Trend Micro Inc.
Malware is Sophisticated
Malware Variants
• Multi-Vector
• Polymorphic
• Rapid Variants{Malware is Profit-Driven
Malware Actions
• Stealthy
• Targeted
• Crime & Espionage
• Increased Liability Costs{
Asset Going-rate
Pay-out for each unique adware installation $0.02-0.30
Malware package, basic version $1,000 – $2,000
Malware package with add-on services Starting at $20
Exploit kit rental (1 hour) $0.99 to $1
Exploit kit rental (2.5 hours) $1.60 to $2
The Underground Economy
Quiz: How much was
Conficker/Downad Selling for?
Copyright 2007 - Trend Micro Inc.
Exploit kit rental (2.5 hours) $1.60 to $2
Exploit kit rental (5 hours) $4, may vary
Undetected copy of info-sealing Trojan $80, may vary
Distributed Denial of Service attack $100 per day
10,000 compromised PCs $1,000
Stolen bank account credentials Starting at $50
1 million freshly-harvested emails (unver) $8 and up
Sample data from research on the underground digital economy in 2007
Answer: $38.70
20,000.00
25,000.00
30,000.00
Growing Rapidly
Copyright 2007 - Trend Micro Inc.
0.00
5,000.00
10,000.00
15,000.00
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Challenges to Creating a Defense
• Many factors are making itmore difficult to create a
solid defense
Compliance
Mobile Workforce
• Enterprises spend billionslayering solutions, creating
point-product sprawl
Gateway Network Servers EndpointVendor
Point-product sprawl is difficult to acquire, deploy, and manage
• The biggest security challengeis managing the complexity
In-the-Cloud
Off Network
VendorA Vendor
G
VendorI
is managing the complexity of security
Managing security is more
difficult today than it has
ever been
VendorB
VendorD
VendorC
VendorE
VendorF
VendorH
Virtualization
Web Tools
eCommerce
Web 2.0
Security Latency Impacts Risk
Content SecurityRisk/Cost
2003
RiskProfile
Risk Profile2008
If you think your business is safe
Think againTraditional security cannot keep
up with today’s threats
ThreatDetected
Pattern FileReceived
Pattern FileDeployed
As the Speed of Threats Increases Risks and Costs,
Minimizing Security Latency Becomes Critical
Damage& Loss
Contained
Cost & EffortSaved byTraditionalPattern FileApproach
Time
Threat Protection Databases
Small Pattern DB
Slowly Updating Patterns< 50 Per Day
Has Security Kept Up?
Copyright 2007 - Trend Micro Inc.
PASTPast
Patterns
Trend Micro Enterprise Security
A Tightly Integrated
Offering of Content Security Products, Services, and Solutionsfor Enterprises Concerned about Staying Ahead of Content Security Threats
Lower your risk
ImmediateProtection
Lower your costs
LessComplexity
Trend Micro Smart Protection Network
Enterprise Security Gets Smart
• Customers
• Partners
• TrendLabs Research,
Service & Support
• Samples
• Submissions
• Honeypots
• Web Crawling
EMAILREPUTATION
FILEREPUTATION
WEBREPUTATION
THREAT
Global Threat
Feedback
Each new reputation
check becomes part
of a feedback loop
Trend Micro Enterprise Security is powered by
Smart Protection Network• Web Crawling
• Feedback Loops
• Behavioral Analysis
ANALYSIS
Blocks All Components of an AttackSpam sources, embedded links, dangerous files,
and websites with malicious content
of a feedback loop
that automatically
updates databases
around the world.
Changing
1
Smart
2 3
Agenda
3/19/2009 12 Classification
Changing Malware Market
Smart Protection Network
Benefits
Threat AnalysisTrendLabs &
Malware Database
Threat Collection
• Customers
• Partners
• TrendLabs Research, Service & Support
• Samples
• Submissions
• Honeypots
• Web Crawling
• Feedback Loops
• Behavioral Analysis
Management
Email Reputation
IP
URL
WebReputation
Files
FileReputation
Threats
• 3.5 billion URL requests per day 20 million+ install base
99.9999%+ uptime
• 5 data center (US, EMEA, APAC) 1000 production servers
Cloud Client Security – The Smart Protection Network
Copyright 2007 - Trend Micro Inc.
Partners
• ISPs
• Routers
• Etc.
Endpoint
Gateway
SaaS/Managed
Cloud
Off Network
Messaging
Multi-Threat Correlation
A compromised web siteOne click in a link.
Fake news by email.
A fake video
EMAILREPUTATION
WEBREPUTATION
FILEREPUTATION
How It Works
Copyright 2007 - Trend Micro Inc.Feb 2009
Internal -Confidential
A fake video
Already Live
5 BillionQueries Handled Daily
1.2 TerabyteData Processed Daily
1,000 24/7
Copyright 2007 - Trend Micro Inc.
1,000Dedicated Content Security
Experts at TrendLabs
24/7Multiple Data Centers Operating
Around the World
50 MillionNew IP Addresses / URLs
Processed Daily
250 MillionMalware Samples Processed
Each Year
Trend Micro Enterprise Security
Immediate Protection
WebSecurity
MessagingSecurity
Powered by
Smart
ProtectionNetwork
• Gateway
Web Security
• Hosted Email
Security
• Gateway Email
Security
• Mail Server
Security
• Email Encryption
EndpointSecurity
Network • Email Encryption
• IM Security
• SharePoint
Protection
• Client Security
• Server Security
• Data Leak Protection
• Mobile Security
Minimizes the Time to
Identify Risks and Create Protection
Agenda
Changing
1
Smart
2 3
3/19/2009 17 Classification
Changing Malware Market
Smart Protection Network
Benefits
Minimizes time to identify risks and create protection = Better Protection
Minimizes the time to acquire, deploy and manage solutions = Less Complexity
Hours until protection is in place
Reduced security management costs & improved savings on reduced productivity loss
Smart Protection Network: Benefits
Copyright 2009 - Trend Micro Inc.Feb 2009Internal -Confidential
Threat Detected
Protection updated
Cloud-ClientArchitecture
ConventionalContents Security
Threat Detected
Pattern file received
Pattern file deployed
Protection deployed
Hours until protection is in place
9
8
7
6
5
4
3
2
1
0
Correlation &CollaborationOf reputation(s)
AdvantageOf cloudpattern
The Impact of a Cloud-Client Solution
Respondents project significant savings:
�62% reduction in endpoint infections
�40% reduction in security management costs
�20% reduction in security breaches
Savings of Over
$60 / Employee
Savings of Over
$300K / Year
$60 / Employee
Less Network Traffic Removes Pattern Monitoring/ Management
Reduce Bandwidth Costs Reduce Manpower & Support
Costs
Reducing Business Costs
Copyright 2009 - Trend Micro Inc.
Lightweight Clients, Less Memory
Protects Customers in Near Real Time
Reduce Hardware Costs Reduce Downtime Costs
RiskProfile
Why Trend Micro for Your Enterprise
Content SecurityRisk/Cost
Risk Profile2008
Trend Micro Offers a
New Protection Paradigm
Trend Micro Enterprise Security
Defends Against Today’s Threats
Copyright 2009 - Trend Micro Inc.
2003
Profile
ThreatDetected
Pattern FileReceived
Pattern FileDeployed
Damage& Loss
Contained
Cost & EffortSaved by
TraditionalPattern FileApproach
ProtectionDeployed
Trend Micro Conventional Content Security
Time
Thank You
Learn More:www.trendmicro.com/go/enterprise
TrendWatch http://itw.trendmicro.com/ > Technologies > SPN
Recommended