Cloud App Security. Tiberio Molino Sales Engineer

Similar documents
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

OVERVIEW. Enterprise Security Solutions

Stop advanced targeted attacks, identify high risk users and control Insider Threats

overview Enterprise Security Solutions

Cisco Advanced Malware Protection for Endpoints

Comprehensive real-time protection against Advanced Threats and data theft

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

WildFire. Preparing for Modern Network Attacks

Cisco Advanced Malware Protection for Endpoints

The Hillstone and Trend Micro Joint Solution

INTRODUCING isheriff CLOUD SECURITY

The Cloud App Visibility Blindspot

The Netskope Active Platform

WEBSENSE TRITON SOLUTIONS

User Documentation Web Traffic Security. University of Stavanger

On and off premises technologies Which is best for you?

Zscaler Cloud Web Gateway Test

CA Technologies Data Protection

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Secure Your Mobile Workplace

WEBSENSE SECURITY SOLUTIONS OVERVIEW

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Digital transformation

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Attacks from the Inside

IBM Endpoint Manager Product Introduction and Overview

Palo Alto Networks. October 6

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Cisco Cloud Security Interoperability with Microsoft Office 365

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

ENABLING FAST RESPONSES THREAT MONITORING

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

TRITON APX. Websense TRITON APX

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Simple security is better security Or: How complexity became the biggest security threat

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Finding Security in the Cloud

Cloud aber Sicher. Florian van Keulen. Senior Consultant Cloud & Security

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

McAfee Endpoint Protection Products

Web Security Gateway Anywhere

AppGuard. Defeats Malware

Cloud Services Prevent Zero-day and Targeted Attacks

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Move over, TMG! Replacing TMG with Sophos UTM

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

First Look Trend Micro Deep Discovery Inspector

Optimizing Service Levels in Public Cloud Deployments

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

How To Protect A Virtual Desktop From Attack

Securing Microsoft Office 365

IBM Endpoint Manager for Core Protection

Analyzing HTTP/HTTPS Traffic Logs

Unified Security, ATP and more

Microsoft SharePoint Architectural Models

Content-ID. Content-ID URLS THREATS DATA

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

DUBEX CUSTOMER MEETING

Protection Against Advanced Persistent Threats

Office 365 Adoption & Risk Report

End to End Security do Endpoint ao Datacenter

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Netzwerkvirtualisierung? Aber mit Sicherheit!

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Check Point: Sandblast Zero-Day protection

Uncover security risks on your enterprise network

Transcription:

Cloud App Security Tiberio Molino Sales Engineer

2

Customer Challenges 3

Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or URL Ransomware more prevalent Internal Phishing Attacks: Less common, more serious Indicator of an attack already in progress within an organization Not caught by email gateway security 4

Advanced Malware Difficult to Detect 90% of malware is used only once Network Breach Detection Systems help but miss traffic between offnetwork devices and SaaS services MS Office files with malware used in 60% targeted attacks 60% 5

User behavior changing: Email Attachments Cloud File Sharing 6 Email gateways don t see files which are already in the cloud!

What are Users Uploading to the Cloud? Compliance data? Sensitive information? 7

Many Companies Gradually Move to Cloud Intermediate stage to full cloud deployment May always keep group of users on premises Want equivalent protection without extra management 8

Before Cloud Apps Network boundary Most components are inside network boundary Can add layered protection including endpoint, SharePoint, DLP, gateways, sandboxing

Endpoints are frequently outside the corporate network Network boundary Email and documents move to the cloud, gateways can t see them

An attacker sends a zero-day infected PDF to a remote employee s personal email

The employee uploads to Office 365 Another employee sees the PDF and downloads it

And this employee sends the PDF to a customer Customer

500,000 NEW unique threats EVERY day! 90% of malware Data Center only affects 1 device 74% of attacks begin with a spear-phishing email 15 Copyright 2015 Trend Micro Inc. Source: Trend Research 2015

Why do I need to supplement the security built in to Office 365? Exchange Online is designed and SLA backed to catch 100% known malware But 90% malware is used only once. Only 10% malware is known. Every customer needs a strategy to deal with unknown malware If you bought a new home with a smoke detector guaranteed to detect 10% of fires would you supplement it? 16 Copyright 2015 Trend Micro Inc.

Securing SaaS-based Applications Advanced Threat Detection Finds zero-day and hidden threats Sandbox file analysis in the cloud Web reputation for URLs in email/files Data Loss Prevention (DLP) Discovery and visibility into confidential data usage. DLP enforcement for cloud file sharing 240 customizable templates Direct cloud-to-cloud integration using vendor API s. No user changes, email rerouting, or web proxy. 17

Cloud App Security s DLP Functionality 240 built in compliance templates which can be customized Import, create your own templates Exchange Online OneDrive for Business, Box, Dropbox, Google Drive, SharePoint Online Discovery (manual scan of database) Visibility / Reporting Enforcement delete/quarantine Not available* * in-line blocking of email DLP violations is not available due to a limit of the Microsoft API 18

Cloud App Security Architecture API s https DLP URL scan Malware scan / file risk assessment (Microsoft Azure datacenters) https Sandbox Analysis <2% of files (Trend Micro datacenters) Trend Micro Cloud App Security 19 All communications encrypted No email/files stored Quarantines located in customers accounts for Office 365, Box, Dropbox, Google Drive

Cloud App Security Service Delivery Netherlands US Germany US Japan Cloud App Security service, hosted by Microsoft Azure Sandbox service (<2% files), hosted by Trend Micro 99.9% Available No email/files stored by Trend Micro Quarantines located within customer accounts for Office 365, Box, Dropbox US & EMEA sites are not interconnected All communications use encrypted https 20

Simple and Elegant Integration with SaaS Services API Cloud App Security Direct cloud-to-cloud integration using vendor s API s No impact to user/admin functionality Supports all devices, anywhere Fully automatic setup (above 5000 users contact Trend Micro for best practices) MX R e c o r d S o f t w a r e U s e r settings We b p r o x y 21

Find Hidden and Zero Day Threats Document Exploit Detection Parses documents to look for attempts to exploit an application Known exploits identified for deletion/quarantine Files with suspect exploits sent to sandbox for behavioral analysis Key technology in helping Trend Micro discover more vulnerabilities in 1H 2015 than all other security vendors combined 22

Find Hidden and Zero Day Malware Dynamic Sandbox Malware Analysis versus Static technique: Checking fingerprints for known bad criminals (similar to antimalware scanning) Dynamic technique: Observing criminal behavior with a surveillance camera (similar to virtual sandbox analysis) 23

Find Hidden and Zero Day Malware Dynamic Sandbox Analysis Leverages technology from Trend Micro Deep Discovery: 24

Central Visibility with Control Manager User centric threat and DLP visibility across web, endpoint, email, cloud security layers Single viewpoint into hybrid Office 365 & on-premises Exchange architectures 25

Complementing Office 365 and other services built in security for Better Overall Protection Built in security blocks known threats Trend Micro Cloud App Security finds hidden and unknown threats 27 Cloud App Security scanned 70M email/files and detected an additional 500,000 malicious files/urls for Office 365 customers between July and Dec 2015

How is it different from Microsoft s Advanced Threat Protection Service? Better Protection Protects email + SharePoint Online and OneDrive as well as Box, Dropbox, Google Drive Experienced with email sandboxing since 2012 Leverages top rated Deep Discovery technology Avoids unnecessary delays Risk assessment before sandboxing avoids delaying >98% of email attachments More efficient sandbox technology AV-Test.org Jan-Jun 2015 testing of endpoint security products shows the effectiveness of security technologies against unknown malware 28

Why Trend Micro Cloud App Security? Control & Protection Advanced protection for Office 365 email + cloud file sharing Leverages top rated Deep Discovery detection technology Trusted Security Vendor 26 years focused on security Trusted by 48 of top 50 global corporations Microsoft Gold Partner for 20 years Hybrid Cloud Experience 15 years experience with on-prem Exchange protection Central visibility across multiple security layers 29

www.trendmicro.com/office365 30