18
Copyright 2012 Trend Micro Inc. Stephen FT Porter Alliance & SI Business Manager Simon Young EMEA Alliances Director Trend Micro Discussion

Smart, Data-Centric Security for the Post-PC Era

Embed Size (px)

DESCRIPTION

In the cloud, data is not tied to one server or even one group of servers, and it can be accessed from multiple devices simultaneously. To protect data, therefore, security solutions must shift from defense of a fixed perimeter towards an approach that protects the data as it travels from physical to virtual to cloud environments. In the post-PC era, Trend Micro envisions a smart, data-centric security framework that advances the capabilities of our cloud-based Smart Protection Network™, adds smarter threat protection that correlates local threat intelligence; smarter data protection that follows and protects your data; and unified security management that increases visibility into data access and potential attacks. This presentation was given at the Information Security Executive Summit on 28th / 29th February 2012

Citation preview

Page 1: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Stephen FT Porter

Alliance & SI Business Manager

Simon Young

EMEA Alliances Director

Trend Micro Discussion

Page 2: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Product Approach Core Platform – Security Capabilities

Trend Micro Confidential 04/08/2023

2

EndpointPlatform

NetworkPlatform

Data CenterPlatform

ManagementPlatform

• Anti-Malware• Mobile• Data-Loss

Prevention• Encryption• SafeSync

• Anti-Malware• Data-Loss

Prevention• Application ID• Mobile• Web/DB

• Anti-Malware• IDS/IPS• File Integrity• Log Inspection• Data-Loss

Prevention• Encryption

• Policy• Reporting• Threat Intel• Dashboard• Configuration• Update

Page 3: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Virtual CloudPhysical

Trend is No.1 in Server and Virtualization Security

Trend Micro23.7%

Worldwide Endpoint SecurityRevenue Share by Vendor, 2010

Source: IDC, 2011

Trend Micro13%

Worldwide Endpoint SecurityRevenue Share by Vendor, 2010

Source: IDC, 2011

Source: 2011 Technavio – Global Virtualization Security Management

Solutions

Page 4: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Servers

Desktops

Stage 1Server Consolidation

Stage 2Expansion & Desktop

Virtualization Journey Stages

Stage 3Private > Public Cloud

15%

30%

70%

85%

Virtualizatio

n Adoption Rate

THE SECURITY INHIBITORSTO VIRTUALIZATION

Page 5: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

The Ever-Changing Threat Landscape

2009

Global Threat Distributions

Based on estimations by a panel of experts within Trend Micro, 2012

2011 2013

Page 6: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

AdvancedTargetedThreats

EmpoweredEmployees

Re-PerimeterizationVirtualization, Cloud Consumerization & Mobility

Outside-in Perimeter Defense Isn’t Enough…

Source: Forrester

Page 7: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Cloud Application

Consumerization and Mobility

Cloud Data

Cloud Era Revolution

Cloud Infrastructure

Hybrid Cloud Management• Physical • Virtual• Cloud

Technology Evolution

Customer Behaviour

Threat Landscape

Targeted AttackAPT

Cloud ComputingEndpoint Mobility

Data Risk /complianceManagement

Page 8: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.Cross-over year

The Enterprise Endpoint Evolution

9

Laptops/PCs

Mobile Devices/SaaS

Virtual

2011 3-5 Years

80%

20%

Total number of endpoints in an enterprise are rising,

driven primarily by consumerization

2013

EndPoint Management Driven

DataCenter Management Driven

15%

50%

35%

Vir

tua

lC

lou

dP

hys

ical

Page 9: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.10 Copyright 2011 Trend Micro Inc.

iPad

iPhone

Windows phone

• Challenges:– Manage mobile devices– Provide secure access to

applications and data– Defend against social media-

based attacks– Data protection for BYOIT

• 47%: Mobile workers who have a personally owned tablet that they use for at least some work

Consumerisation

Page 10: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Consumerization/BYOD

Control the Device

Secure the Data

Manage the Apps

Secure the App Data

Mobile DevicesIn the Enterprise

Hype Cycle

Enterprise(~2500+)

Mid-Market(~250-2500)

2012

Mobile Device Market

Page 11: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Manage Efficiently• Device Discovery• Device Enrollment• Device Provisioning• Asset Tracking• S/W Management• Remote Control

Secure the Devices• Anti-Malware• Firewall • Web Threat Protection • Email Security• Call/ SMS Anti-Spam• App Control/Lock-down

Protect the Data• Encryption• Remote Wipe• Remote Lock• SIM Change/ Watch• Feature Lock• Password Policy

Central Policy Management

Mobile Device Protection Requirements

Page 12: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Deep Security Virtual Appliance• Anti-malware• Integrity Monitoring• Firewall

Deep SecurityAn Agentless Security Environment

13

• Intrusion Prevention• Web App Protection• Application Control

VM VM VM

The Old Way

Security Virtual Appliance

VM VM VM

With Deep Security

VM

EasierManageability

HigherDensity

FewerResources

StrongerSecurity

VM

More VMs

Page 13: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

VDI Example – Cost Breakdown

Classification 04/08/2023 14

1000 1250 875

2480 1160 928

1360 440 396

4840 2850 2199

STD VDI VDI+ Security

Page 14: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

SecureCloud: Enterprise Controlled Data Protection for the Cloud

15

Enterprise Key

Hypervisor

VM

SharedStorage

Cloud Service ProviderEnterprise Datacenter or SaaS Offering

Trend MicroCloud Security

Console

CorporateApp

My Data

Page 15: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Test Test

Deep Security / Secure Cloud Example

Classification 04/08/2023 16

Vmware Vsphere ESX

CustomerCustomer

Customer 1 Customer 2

Unix/Win

Server

Page 16: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Dashboard (Threat Intelligence Map)

Classification 17

Page 17: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.04/08/2023 18

Corporate Network

Threat Discovery Appliance

Threat Intelligence ManagerControl Manager 3rd Party Products

Enterprise Security Manager

IxSVA

OSCE, DSM, IDF Servers

Trend Endpoints

• Risk Assessment

• Risk Mitigation

• Risk Escalation

• Configuration Management

• Update Management

• Log Management

• Alert Management

Page 18: Smart, Data-Centric Security for the Post-PC Era

Copyright 2012 Trend Micro Inc.

Q & A