27

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy
Page 2: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Enabling a Smart Protection Strategyin the age of Consumerization, Cloud and new Cyber Threats

Gastone NenciniTrend Micro Italy Leader and Snr. Technical

Manager Trend Micro Southern Europe

Page 3: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

2.4BInternet Users 1

1 Trillion+ URLs indexed

by Google 2

665MWeb Sites 3

1BFacebook

Users 4427M Smart Phones Sold

Last Year 5

54%of Facebook Access is via

Mobile 6

Sources – 1: Internet World Stats, Dec 2012; 2: Goog le, 2008; 3: NetCraft Site Data, July 2012; 4: Facebook, Oct 2012; 5: Gartner 2012; 6: SocialBak ers, May 2012;

Page 4: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013

Source: IBM

2.5 QUINTILLIONBYTES OF DATA/DAY!90%

CREATED IN LAST 2 YEARS

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Page 5: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Identify trends

Understand customer behavior

Analyze opportunities

Discover efficiencies

Page 6: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013

INFORMATION HAS BECOME YOUR MOST STRATEGIC ASSET

Payment Card Industry (PCI)

Protected Health Information (PHI)

Personally Identifiable Information (PII)

Intellectual Property (IP)

Page 7: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013

Payment Card Industry (PCI)

Protected Health Information (PHI)

Personally Identifiable Information (PII)

Intellectual Property (IP)

NEW THREAT CREATED EVERY SECOND90% ORGANIZATIONS HAVE

ACTIVE MALWARE55%1 NOT EVEN AWARE OF INTRUSIONS

COMMERCIAL EXPLOIT KITS USED BY VIRTUALLY ALLEASTERN EUROPEAN CYBERCRIMINALS

AVERAGE COST OF DATA BREACH$3.7M

Page 8: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Empower the business:Improve business agility by providing quick and intuitive access to the right information, tools and applications

Mitigate risk:Protect sensitive information to maintain brand and comply with regulations, while controlling costs

CIO

Page 9: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Cyber Threats

Attackers

Employees IT

Page 10: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Smart protection for information

Simple yet flexible to manage and deploy

Security that fits an evolving ecosystem

Information no longer protected by traditional defenses

Customers Need…

Point solutions; limited visibility, de-centralized administration

Dynamic, complex environment; many new apps and platforms

The New Reality…

Page 11: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Smart protection for information

� Layered – lines of defense

� Interconnected – intelligent protection

� Real-time – cloud updates

� Transparent – no user impact

Page 12: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Simple yet flexibleto deploy and manage

� Centralized – visibility and control

� Automated – policy management

� Lightweight – resource efficient

� Flexible – on-premise or as a service

Page 13: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Security that fits an evolving ecosystem

� Open – broad platform support

� Optimized – designed in partnership

� Focused – 100% dedicated to security

� Innovative – ahead of the latest threats …and more

Page 14: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

� Interconnected� Real-time � Transparent

Organizations Need a Smart Protection Strategy

� Layered

Smart protection for information

Simple yet flexible to manage and deploy

� Centralized� Automated� Lightweight� Flexible

Security that fits an evolving ecosystem

� Open� Optimized� Focused� Innovative

…and more

Copyright 2013 Trend Micro Inc.

Page 15: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

SIGNATURE BASED ANTI-MALWARE

1988 - 2007

Smart protection begins with global threat intelligence…

CLOUD BASEDGLOBAL THREAT INTELLIGENCE

2008

BIG DATA ANALYTICS-DRIVEN

GLOBAL THREAT INTELLIGENCE

NOW!

• Email reputation• File reputation• Web reputation

• Whitelisting• Network traffic rules• Mobile app reputation• Vulnerabilities/Exploits• Threat Actor Research• Enhanced File Reputation• Enhanced Web Reputation

Page 16: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Page 17: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Protects

Identifies

Collects

Page 18: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

GLOBAL SENSORNET

(via honeypots, community, customers,

threat researchers and more)

DAILY STATS:• 1.15B threat events• 6TB threat feeds• 11B threat queries• 7M new files…

Collects

Protects

Identifies

• URLs• Vulnerabilities• Files• Domains• Network Traffic

• Cyber Criminals• Mobile Apps• IP Addresses• Exploit Kits

Page 19: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Collects

Protects

Identifies

BIGDATA

ANALYTICS(Data Mining,

Machine Learning, Modeling, Correlation)

DAILY STATS:• 7.2 TB data correlated• 1B IP addresses• 90K malicious

threats identified • 100+M good files

Page 20: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Collects

Protects

Identifies

GLOBALTHREAT

INTELLIGENCE

DAILY STATS:• 200M threats blocked• 50M malicious URL’s• 700K cloud email entries•1.4B whitelist queries• 80M malicious files

• Email Reputation• Web Reputation• File Reputation• Whitelisting

• Vulnerabilities & Exploits• Mobile App Reputation• Network Traffic Rules• Threat Actor Research

Page 21: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Global CLOSER TO

THE SOURCE OF THREATS

CorrelatedIDENTIFIES ALLCOMPONENTS OF AN ATTACK

ProactiveBLOCKS THREATSAT THEIR SOURCE

Real-timeIDENTIFIES

NEW THREATS FASTER

Page 22: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Source: Trend Micro, tested on 6th October, 2011, and 8th June 2012 using the latest endpoint products with the latest pattern at the time of testing

200MB

June 2012Oct 2011

289MB

Competitor A

34MB

Trend MicroJune 2012Oct 2011

33 MB 34 MB

100 --

200 --

300 --

End

poin

t Mal

war

e D

efin

ition

Siz

e (M

B)

Competitor BJune 2012Oct 2011

122MB

156MB

• Lightweight cloud infrastructure• Minimal user and network impact• Real-time protection

IT Admin

Security

Page 23: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Complete End User Protection

Email &Messaging

Web Access

Device Hopping

CollaborationCloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Anti-Malware EncryptionApplication

ControlDevice

ManagementData LossPrevention

ContentFiltering

Employees

IT Admin

Security

Page 24: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Enabling a Complete Lifecycle

Copyright 2013 Trend Micro Inc.

Custom Defense

Network-wideDetection

AdvancedThreat Analysis

Threat Toolsand Services

AutomatedSecurity Updates

ThreatIntelligence

CustomSandboxes

Detect malware, communications and behavior invisible to standard defenses

Analyze the risk and characteristics of the attack and attacker

Adapt security automatically (IP black lists, custom signatures…)

Respond using the insight needed to respond to your specific attackers

Network Admin

Security

Page 25: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Smart Protection

Copyright 2013 Trend Micro Inc.

Page 26: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

� Interconnected� Real-time � Transparent

Trend Micro Enables a Smart Protection Strategy

� Layered

Smart protection for information

Simple yet flexible to manage and deploy

� Centralized� Automated� Lightweight� Flexible

Security that fits an evolving ecosystem

� Open� Optimized� Focused� Innovative

…and more

Page 27: festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smart Protection Strategy

Thank You!