Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Similar documents
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

OVERVIEW. Enterprise Security Solutions

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

The Hillstone and Trend Micro Joint Solution

overview Enterprise Security Solutions

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

2012 North American Managed Security Service Providers Growth Leadership Award

Security Intelligence Services.

Palo Alto Networks. October 6

Content Security: Protect Your Network with Five Must-Haves

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS.

WildFire. Preparing for Modern Network Attacks

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cisco Security Intelligence Operations

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Stop advanced targeted attacks, identify high risk users and control Insider Threats

BeyondInsight Version 5.6 New and Updated Features

McAfee Server Security

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

Unified Security, ATP and more

How To Protect A Virtual Desktop From Attack

AppGuard. Defeats Malware

Trend Micro. Advanced Security Built for the Cloud

Cloud App Security. Tiberio Molino Sales Engineer

How To Buy Nitro Security

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Fighting Advanced Threats

I D C A N A L Y S T C O N N E C T I O N

Windows Server 2003 End of Support. What does it mean? What are my options?

Automated Protection on UCS with Trend Micro Deep Security

Cisco Advanced Malware Protection

Vulnerability Management

Security Analytics The Beginning of the End(Point)

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Symantec Endpoint Protection

Requirements When Considering a Next- Generation Firewall

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Data Center security trends

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

ENABLING FAST RESPONSES THREAT MONITORING

ORGANIZADOR: APOIANTE PRINCIPAL:

McAfee Network Security Platform

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Symantec Endpoint Protection

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

How To Protect Your Cloud From Attack

Cloud and Data Center Security

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Protection Against Advanced Persistent Threats

Achieve Deeper Network Security

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

CylanceINFINITYENGINE: Applying Data Science to Advanced Threats

Defending Against Cyber Attacks with SessionLevel Network Security

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Breaking the Cyber Attack Lifecycle

Microsoft s cybersecurity commitment

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Networking for Caribbean Development

24/7 Visibility into Advanced Malware on Networks and Endpoints

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Analyzing HTTP/HTTPS Traffic Logs

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Zak Khan Director, Advanced Cyber Defence

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Penta Security 3rd Generation Web Application Firewall No Signature Required.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Design Your Security

Securing Cloud-Based

Cisco Cloud Web Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Non-Geeks Guide to. Network Threat Prevention

Transcription:

Connected Threat Defense Strategy Eva Chen, Co-Founder and CEO

Japanese Pension Service Over a Million of Personal Data Leaked by APT IT Pro, June 1, 2015 Tokyo Government Office 9 PCs infected by watering hole attacks Mainichi article, July 22, 2015 2

Consumer Small Business Enterprise

User behavior New threats Infrastructure Mobile Social Networking Cloud Apps... Ransomware APTs Mac malware Cloud Virtualization Windows 10

New Generation Application Control Identity Federation Sandbox Threat Instance Response Big Data Analytics IOC-based Endpoint Detection Port Control (firewall) Access Control(VPN) Signature Matching AV Signature Matching IPS Vulnerability Scan Copyright 2014 Trend Micro Inc. Current

Policy Enforcement Focused on network traffic and rule enforcement Set and Forget Action is Block or Pass ; no grey area Threat Defense Focused on understanding hacker behavior and evolving techniques Dynamic updates and change Risk management approach, balance between high detection and false alert Copyright 2014 Trend Micro Inc.

A Connected Threat Defense Requires Next-Generation Techniques Fully context-aware (e.g. Correlation, Indicators of Compromise ) Application-Aware (e.g. Application Control, Vulnerability Protection ) Traditional signature-based scanning (e.g. Anti-malware, Intrusion Prevention ) Copyright 2014 Trend Micro Inc.

Device Infection Retrospection Run Script by CMD By Office VBA By Word Dropped Batch File Dropped VBScript File Victim Account Word File Name Mail Attachmen t 11

Consumer Small Business Enterprise 12

Cyber Security of Critical Infrastructures in the Americas (OAS Report) (April) Below the Surface: Exploring the Deep Web (June) US Government (IRS, Federal Reserve, OPM) and Healthcare (Anthem, Premera, Carefirst) Attacks (February, March, May, June) Adobe Flash Zero Days (February, June, July) Ransomware (January April)

14

100% 0-day and widespread malware protection YtD 2015 Enterprise Solutions to address toughest challenges: consumerization, cloud and virtualization, and advanced cyber threats 1.AVTest.org (Jan 2015 through July 2015 test results for Corporate Endpoint Protection) 2.IDC, Worldwide Endpoint Security 2014-1018 Forecast and 2013 Vendor Shares, August 2014 3.expertON Group, Cloud Vendor Benchmark, June 2014

Announced August 5, 2015 Trend Micro: Highest Security of Recommended Breach Detection Systems by NSS Labs For the second consecutive year, Deep Discovery recognized as leader in security, performance and total cost of ownership Source: 2015 NSS Labs Breach Detection Tests 16

Revenue Growth in 1H 2015 +2% Smart Protection Suites +80% Deep Discovery +47% Deep Security 17

Continued Innovation in 1H 2015 Cloud-based security for OFFICE 365 Tighter integration for a RAPID THREAT RESPONSE Easier purchase via AWS and Microsoft Azure MARKETPLACES 18

RESPOND PREVENT Insight & Control ANALYZE DETECT Solutions must work seamlessly together for a connected threat defense 19

Strategic Offerings Helped Expand or Land New Accounts in 1H Brewing company An existing endpoint customer, but needed to add protection for highly valuable web-based supply-chain environment. Deep Discovery (Q1) + Deep Security for SAP (Q2) Large financial institution Wanted best-of-class layered security, with protection against zero-days and targeted attacks. Ne Smart Protection Suite + Deep Discovery Broadband VoIP provider Needed PCI compliance and protection for highly scalable VoIP applications being migrated to the cloud. Deep Security for AWS US Hospital Wanted to be proactive against zero-day threats, and liked connected threat defense! Smart Protection Suite + Deep Security + Deep Discovery Inspector, Analyzer and Endpoint Sensor 20 Source: Sampling of customer deals, 1H 2015

FIFA: 1.1B viewers worldwide, 1.4M match attendees Trend Micro: 4.4M social media impressions and 55k engagements 900+ customers, prospects and partners from 30 countries

Fencing Sponsorship: Yuki Ota Photo:Shugo Takemi 22

Are you ready for the battle field? We are! 23

Conclusion 1. Strategic solutions driving growth 2. Threat defense expertise 3. Global brand presence 24

25