Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Your Valuable Data In The Cloud? How To Get The Best Protection!
A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 3
Our Mission: Defending Against Threats Attackers Employees By protecting users against: Loss of productivity Loss of information Loss of identity By reducing risk to infrastructure: System integrity and availability Intellectual property protection Network protection IT Copyright 2014 Trend Micro Inc. 4
Continual Innovation 1 st LAN Server Security 1 st Gateway Security 1 st Threat Management Solution 1 st In Netbook Security 1 st Integrated Virtualization Security 1 st Cloud Computing Security 1 st Comprehensive Mobile App Reputation Technology 1995 2013 Copyright 2014 Trend Micro Inc.
Agenda - Threat Landscape - Cloud Security for the Microsoft Cloud Copyright 2014 Trend Micro Inc. 6
Cyber Threats Attackers Consumerization Cloud & Virtualization Employees IT Copyright 2014 Trend Micro Inc. 7
Customers Cloud Security is a Shared Responsibility Customer content Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption Foundation Services Server-side Data Encryption Network Traffic Protection Compute Storage Database Networking Copyright 2014 Trend Micro Inc. Cloud Global Infrastructure Availability Zones Regions 8
Threat is coming from everywhere! Copyright 2014 Trend Micro Inc. 9
Today s Attacks: Social, Customized, Stealthy! Gathers intelligence about organization and individuals Targets individuals thru spear-phishing attack Attacker Establishes Command & Control server $$$$ Extracts data of interest can go undetected for months! Employees Moves laterally across network to broaden foothold and seek data of interest
Evolving Cyber Threats Two new threats every second * Moving up stack to app level Targeted attacks more frequent Digital/physical disruptions more linked Threat vectors change rapidly Basic detection/blocking not enough! *Trend Research 2013 Copyright 2014 Trend Micro Inc. Must manage across entire threat lifecycle, across a complex legacy and hybrid cloud environment, and provide security where the data is
ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Security principles remain the same CONTEXT Workload & applicationaware SOFTWARE Optimized for virtualization & cloud infrastructure but the APPROACH to security must change PLATFORM Comprehensive capabilities across data center & cloud Copyright 2014 Trend Micro Inc.
ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Host Firewall Intrusion Prevention Integrity Monitoring CONTEXT Workload & applicationaware SOFTWARE Optimized for virtualization & cloud infrastructure Anti-malware Data Encryption Application Scanning Log Inspection PLATFORM Comprehensive capabilities across data center & cloud Copyright 2014 Trend Micro Inc.
Security Solutions for the Microsoft Cloud Copyright 2014 Trend Micro Inc. 14
Security Concerns: Cloud App Inhibitor Security Concerns Top Barrier especially for Enterprise 50% Growing Security Concerns 60% 41% 41% 42% 50% 40% 30% Large-Sized Companies (over 1,000 employees) 40% Medium to Small-Sized Companies 30% (under 1,000 employees) 25% 32% 32% 34% 37% 20% 20% 10% 0% Security Concerns Security Concerns Complexity of integrating with existing IT Technology is too new General resistance to change Cost is too high 10% 0% lis.11 sij.12 tra.12 srp.12 lis.12 sij.13 tra.13 srp.13 Source: 451 Research Nov 2013 ChangeWave Cloud Trends Survey Pressure for SaaS adoption from mgmt and users but growing security concerns by IT Confidential 2014 Trend Micro Inc. 15
Copyright 2014 Trend Micro Inc. 91% of targeted attacks involve spear phishing emails. Trend Labs Nov 2012
Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks coverage, in its silo
Enhancing Office 365 Threat Protection included security Malware engines update hourly 1 Scan engines look for active malicious code 1 Challenge 12,500 new unique threats discovered every hour 2 Criminals hide nonactive malicious code in PDF and other office documents Trend Micro Cloud App Security adds Smart Protection Network quickly detects known threats and sandboxing finds unknown threats Document exploit scanning and sandboxing find hidden malware 1. Microsoft online documentation, Jan 2015 2. TrendLabs Q4 2014 Copyright 2015 Trend Micro Inc. 18
Before Office 365 OWA Email data controlled by organization APT Protection Inbound email inspected for zero-day malware Multiple security layers MAPI SMTP Gateway Network boundary Mobile Exchange Compliance Outbound email scanned for compliance Copyright 2014 Trend Micro Inc.
Now with Office 365 Advanced malware and compliance controls no longer see traffic? OWA Outlook Mobile Copyright 2014 Trend Micro Inc.
Copyright 2013 Trend Micro Inc.
Now with Office 365? Data sovereignty concerns: Where is my data? Who has access to it? Will I know if it is accessed? OWA Outlook Mobile Copyright 2014 Trend Micro Inc.
Copyright 2014 Trend Micro Inc. Introducing Trend Micro Cloud App Security FOR OFFICE 365
Advanced Malware & Compliance Trend Micro Cloud App Security Copyright 2014 Trend Micro Inc.
Advanced Malware & Compliance No proxy required if not using encryption Trend Micro Cloud App Security Risk assessment including doc exploit detection identifies suspicious files Sandbox malware analysis in the cloud 200+ customizable DLP templates Real-time and discovery scans Copyright 2014 Trend Micro Inc.
Decryption Proxy Data at Rest Encryption Service Zach, I d to meet with you to discuss the project plan. Will you be ready to meet on Trend Micro Cloud App Security zvfwyya8vxnhemfydo ghxozgrtkhbzmsoqii5r nqb9yuarxdpjn8pw4r Uvfi3kRbpTdAaCVd OWA Copyright 2014 Trend Micro Inc. MAPI EAS Option: Trend Micro or customer managed keys Direct API integration (no SMTP routing) maintains Office 365 user, admin, security functionality
How it Works Email received. Passed to Cloud App Security 1 Cloud App Security Internet Employees IT Copyright 2013 Trend Micro Inc. 27
How it Works Cloud App Security 2 Index for searching later Scan for malware risk; sandbox if needed DLP compliance scan Internet Employees IT Copyright 2013 Trend Micro Inc. 28
How it Works Cloud App Security Internet 3 Encrypt and return to Office 365 Employees IT Copyright 2013 Trend Micro Inc. 29
How it Works Cloud App Security Internet User access via reverse proxy Decryption 5 4 Decrypt using cloud or on-premise keys Employees IT Copyright 2013 Trend Micro Inc. 30
Added Value to Office 365 Built in Security Data Encryption Threat Protection Data Loss Prevention Office 365 includes: Data encryption with Microsoft controlled encryption keys Basic antimalware checks for executable malware using pattern matching Limited templates, not easily customizable SharePoint/OneDrive DLP is not real-time Trend Micro Cloud App Security adds: Customer data ownership and control Additional data encryption layer with independent encryption keys (Trend Micro or customer managed) Customer control over who can access their data Advanced threat protection Blocks malware hidden in PDF and Office Docs by searching for exploits Finds advanced malware by opening files in a virtual sandbox Enhance visibility and control Real-time DLP for email, SharePoint, OneDrive 200+ DLP templates Integration with Trend Micro Control Manager for visibility across other layers Copyright 2013 Trend Micro Inc.
#1 Corporate EndPoint Server Security Market Share 31% Source: IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Copyright 2014 Trend Micro Inc. 32
Hvala na pažnji!