36
Is your cloud secure? Frederik Van Roosendael PSE Belgium – Luxembourg

Trend Micro - is your cloud secure

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Trend Micro - is your cloud secure

Is your cloud secure?

Frederik Van RoosendaelPSE Belgium – Luxembourg

Page 2: Trend Micro - is your cloud secure

Enabling a Smart Protection Strategyin the age of Consumerization, Cloud and new Cyber Threats

Frederik Van RoosendaelPSE Belgium – Luxembourg

Page 3: Trend Micro - is your cloud secure

Organizations Need a Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Smart protection against theft and loss

Simple yet flexible to manage and deploy

Security that fits an evolving ecosystem

Page 4: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Empower the Business…

Page 5: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

…while Protecting Information from Theft and Loss

Page 6: Trend Micro - is your cloud secure

More Challenging than Ever!

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

Page 7: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

SIGNATURE BASED ANTI-MALWARE

1988 - 2007

Smart protection begins with global threat intelligence…

CLOUD BASEDGLOBAL THREAT

INTELLIGENCE2008

BIG DATA ANALYTICS-DRIVEN

GLOBAL THREAT INTELLIGENCE

2012

• Email reputation• File reputation• Web reputation

• Whitelisting• Network traffic rules• Mobile app reputation• Vulnerabilities/Exploits• Threat Actor Research• Enhanced File Reputation• Enhanced Web Reputation

Page 8: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Global CLOSER TO

THE SOURCE OF THREATS

CorrelatedIDENTIFIES ALLCOMPONENTS OF AN ATTACK

ProactiveBLOCKS THREATSAT THEIR SOURCE

Real-timeIDENTIFIES

NEW THREATS FASTER

Page 9: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

Page 10: Trend Micro - is your cloud secure

Worm Outbreaks

Vulnerabilities

2001

The Changing Threat Landscape

Copyright 2013 Trend Micro Inc.

Worm Outbreaks

Vulnerabilities

DA

MA

GE

CA

US

ED

2001 2004 2005 2007

CRIMEWARE

2003

Spyware

IntelligentBotnets

Web Threats

SpamMass

MailersWorm Outbreaks

Vulnerabilities

Now

TargetedAttacks

• Now it’s personal!• Financially motivated• Targeting valuable

information

Page 11: Trend Micro - is your cloud secure

Today’s Attacks: Social, Sophisticated, Stealthy!

Copyright 2013 Trend Micro Inc.

Attacker

Moves laterally across network seeking valuable data

Establishes Command & Control server

Extracts data of interest – can go undetected for months!

$$$$

Gathers intelligence about organization and individuals

Targets individuals using social engineering

Employees

Page 12: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Attacker

Moves laterally across network seeking valuable data

Establishes Command & Control server

Extracts data of interest – can go undetected for months!

$$$$

Gathers intelligence about organization and individuals

Targets individuals using social engineering

Employees

Page 13: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

• In-depth reconnaissance on your employees

• Malware engineered and tested to evade your standard gateway/endpoint defenses

• Human interaction that adapts the attack as it moves within your network

Network Admin

Security

Page 14: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Custom Defense

Network-wideDetection

SpecializedTools

ThreatServices

AutomatedSecurity Updates

AdvancedThreat Analysis

CustomSandboxes

Network Admin

Security

Page 15: Trend Micro - is your cloud secure

• Advanced threat

analytics

• Correlating local

and global threat

intelligence

Page 16: Trend Micro - is your cloud secure

Part of Your Smart Protection Strategy

CUSTOMDEFENSE

Smart• Advanced, targeted threat detection• Customizable sandboxes for accurate analysis • Actionable intelligence from global threat intelligence

Simple • Single appliance monitors multiple ports and protocols• Automated, customized security updates

Security that fits• Custom sandbox available to other security products• Custom signatures to other security products

Copyright 2013 Trend Micro Inc.

Page 17: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

CUSTOMDEFENSE

Page 18: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

CUSTOMDEFENSE

Page 19: Trend Micro - is your cloud secure

Then...

Copyright 2013 Trend Micro Inc.

Email &Messaging

Web Access

File/Folder &Removable Media

Employees

IT Admin

Page 20: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Now!

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Employees

IT Admin

Page 21: Trend Micro - is your cloud secure

IT Admin

Copyright 2013 Trend Micro Inc.

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Security

• User behavior is risky by nature

• So many applications and platforms to secure

Employees

Page 22: Trend Micro - is your cloud secure

IT Admin

Copyright 2013 Trend Micro Inc.

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Security

70% trace loss to USB memory sticks1

91% targeted attacks begin with spear-phishing2

50M+ malicious URLs blocked daily3

Sources: 1. Ponemon Institute study, July 2011; 2. Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012; 3. Trend Micro Smart Protection Network daily statistics

Employees

Page 23: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

76% allow “BYOD”; about half had data breach1

1 million malicious Android apps by end of 20132

30% mobile devices lost each year3

1. Source: Trend Micro, Mobile Consumerization Trends & Perceptions, IT Executive and CEO Survey 20122. Source: Trend Micro Threat Predictions for 20133. Source: SANS Institute

Employees

IT Admin

Security

Page 24: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

1. Source: Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni, Sept 2012 2. Source: Cryptzone survey of SharePoint users, January 20123. Source: CSO Magazine, Oct 2012

1 in 5 use Dropbox at work, typically against rules1

30% SharePoint users knowingly risk data2

14M Facebook accounts are “undesirable”3

Employees

IT Admin

Security

Page 25: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Complete End User Protection

Email &Messaging

Web Access

Device Hopping

Collaboration

Cloud Sync& Sharing

Social Networking

File/Folder &Removable Media

Anti-Malware EncryptionApplication

ControlDevice

ManagementData LossPrevention

ContentFiltering

Employees

IT Admin

Security

Page 26: Trend Micro - is your cloud secure

Part of Your Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

COMPLETEEND USER

PROTECTION

Smart• Layered security from mobile devices to gateways• Transparent, real-time protection

Simple • Unified dashboard with centralized policy control• Modular, lightweight and efficient • Flexible deployment: on-premise or hosted• Purpose-built for enterprise, mid-market, service providers

Security that fits• Specialized plug-ins for Exchange, Domino, SharePoint• Open: Win, Mac, iOS, Android, Blackberry…

Page 27: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

COMPLETEEND USER

PROTECTION

CUSTOMDEFENSE

Page 28: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

COMPLETEEND USER

PROTECTION

CUSTOMDEFENSE

Page 29: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Data Center

Physical Virtual Private Cloud

Source: Gartner, Forecast Analysis: Data Center, Worldwide, 2010-2016,1Q12 Update, Jonathon Hardcastle, 16 May, 2012

By 2016, 71% of server workloads

will be virtualized*• Increased business agility

• Lower capital and operational costs

• Instant scalabilityData Center Ops

Page 30: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Data Center

Physical Virtual Private Cloud

Source: Forrester study

Organizations can cut costs by

74% by storing data in the cloud*

• Increased business agility

• Lower capital and operational costs

• Instant scalabilityData Center Ops

Public Cloud

Page 31: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Data Center

Physical Virtual Private Cloud

• Server and VM integrity

• Appropriate policy enforcement

• Data protection, especially in the cloud

• Performance and manageability

Public Cloud

Data Center Ops

Security

Page 32: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

Data Center

Physical Virtual Private Cloud Public Cloud

Cloud and Data Center Security

Anti-MalwareIntegrity

MonitoringEncryption

Log InspectionFirewall

IntrusionPrevention

Data Center Ops

Security

Page 33: Trend Micro - is your cloud secure

Part of Your Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Smart• Context-aware virtual patching and automated protection• Comprehensive protection across physical, virtual, cloud

Simple • Single platform and administration with modular deployment• Agent-less security for VMware; efficient, high consolidation• Easy multi-tenant and service provider management

Security that fits• Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…• Optimized, automated security for VMware and AWS

CLOUD &DATA CENTER

SECURITY

Page 34: Trend Micro - is your cloud secure

Copyright 2013 Trend Micro Inc.

ConsumerizationCloud & Virtualization

Employees IT

Cyber Threats

CLOUD &DATA CENTER

SECURITY

COMPLETEEND USER

PROTECTION

CUSTOMDEFENSE

Page 35: Trend Micro - is your cloud secure

Enabling Your Smart Protection Strategy

Copyright 2013 Trend Micro Inc.

Smart protection against theft and loss

Simple yet flexible to manage and deploy

Centralized Lightweight Flexible Purpose-built

Security that fits an evolving ecosystem

Open Optimized Dedicated Future-proof

Layered Real-time Transparent Intelligent

Page 36: Trend Micro - is your cloud secure

Thank You!