Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.



Similar documents
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Cloud App Security. Tiberio Molino Sales Engineer

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

OVERVIEW. Enterprise Security Solutions

The Hillstone and Trend Micro Joint Solution

overview Enterprise Security Solutions

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Fighting Advanced Threats

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Networking for Caribbean Development

Comprehensive real-time protection against Advanced Threats and data theft

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Unified Security, ATP and more

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Agenda , Palo Alto Networks. Confidential and Proprietary.

Netzwerkvirtualisierung? Aber mit Sicherheit!

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Content Security: Protect Your Network with Five Must-Haves

TRITON APX. Websense TRITON APX

Windows Server 2003 End of Support. What does it mean? What are my options?

Automated Protection on UCS with Trend Micro Deep Security

overview Enterprise Security Solutions

WildFire. Preparing for Modern Network Attacks

Cisco Advanced Malware Protection

Superior protection from Internet threats and control over unsafe web usage

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Modular Network Security. Tyler Carter, McAfee Network Security

Breaking the Cyber Attack Lifecycle

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

24/7 Visibility into Advanced Malware on Networks and Endpoints

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Cloud and Data Center Security

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Protecting Your Organisation from Targeted Cyber Intrusion

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Analyzing HTTP/HTTPS Traffic Logs

Intelligent, Scalable Web Security

Cisco Advanced Malware Protection for Endpoints

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

On and off premises technologies Which is best for you?

Endpoint protection for physical and virtual desktops

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Data Center security trends

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Cisco Advanced Malware Protection for Endpoints

Defending Against Cyber Attacks with SessionLevel Network Security

ENABLING FAST RESPONSES THREAT MONITORING

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Palo Alto Networks. October 6

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

The Cloud App Visibility Blindspot

Devising a Server Protection Strategy with Trend Micro

Advanced Threats: The New World Order

Move over, TMG! Replacing TMG with Sophos UTM

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Devising a Server Protection Strategy with Trend Micro

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

AppGuard. Defeats Malware

FROM PRODUCT TO PLATFORM

McAfee Network Security Platform

Security Intelligence Services.

SourceFireNext-Generation IPS

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Cisco Web Security: Protection, Control, and Value

Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Secure Cloud Computing

Speed Up Incident Response with Actionable Forensic Analytics

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Uncover security risks on your enterprise network

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Attacks from the Inside

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

A Modern Framework for Network Security in Government

IBM Security X-Force Threat Intelligence

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Content-ID. Content-ID URLS THREATS DATA

Transcription:

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Your Valuable Data In The Cloud? How To Get The Best Protection!

A world safe for exchanging digital information Copyright 2014 Trend Micro Inc. 3

Our Mission: Defending Against Threats Attackers Employees By protecting users against: Loss of productivity Loss of information Loss of identity By reducing risk to infrastructure: System integrity and availability Intellectual property protection Network protection IT Copyright 2014 Trend Micro Inc. 4

Continual Innovation 1 st LAN Server Security 1 st Gateway Security 1 st Threat Management Solution 1 st In Netbook Security 1 st Integrated Virtualization Security 1 st Cloud Computing Security 1 st Comprehensive Mobile App Reputation Technology 1995 2013 Copyright 2014 Trend Micro Inc.

Agenda - Threat Landscape - Cloud Security for the Microsoft Cloud Copyright 2014 Trend Micro Inc. 6

Cyber Threats Attackers Consumerization Cloud & Virtualization Employees IT Copyright 2014 Trend Micro Inc. 7

Customers Cloud Security is a Shared Responsibility Customer content Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption Foundation Services Server-side Data Encryption Network Traffic Protection Compute Storage Database Networking Copyright 2014 Trend Micro Inc. Cloud Global Infrastructure Availability Zones Regions 8

Threat is coming from everywhere! Copyright 2014 Trend Micro Inc. 9

Today s Attacks: Social, Customized, Stealthy! Gathers intelligence about organization and individuals Targets individuals thru spear-phishing attack Attacker Establishes Command & Control server $$$$ Extracts data of interest can go undetected for months! Employees Moves laterally across network to broaden foothold and seek data of interest

Evolving Cyber Threats Two new threats every second * Moving up stack to app level Targeted attacks more frequent Digital/physical disruptions more linked Threat vectors change rapidly Basic detection/blocking not enough! *Trend Research 2013 Copyright 2014 Trend Micro Inc. Must manage across entire threat lifecycle, across a complex legacy and hybrid cloud environment, and provide security where the data is

ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Security principles remain the same CONTEXT Workload & applicationaware SOFTWARE Optimized for virtualization & cloud infrastructure but the APPROACH to security must change PLATFORM Comprehensive capabilities across data center & cloud Copyright 2014 Trend Micro Inc.

ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Host Firewall Intrusion Prevention Integrity Monitoring CONTEXT Workload & applicationaware SOFTWARE Optimized for virtualization & cloud infrastructure Anti-malware Data Encryption Application Scanning Log Inspection PLATFORM Comprehensive capabilities across data center & cloud Copyright 2014 Trend Micro Inc.

Security Solutions for the Microsoft Cloud Copyright 2014 Trend Micro Inc. 14

Security Concerns: Cloud App Inhibitor Security Concerns Top Barrier especially for Enterprise 50% Growing Security Concerns 60% 41% 41% 42% 50% 40% 30% Large-Sized Companies (over 1,000 employees) 40% Medium to Small-Sized Companies 30% (under 1,000 employees) 25% 32% 32% 34% 37% 20% 20% 10% 0% Security Concerns Security Concerns Complexity of integrating with existing IT Technology is too new General resistance to change Cost is too high 10% 0% lis.11 sij.12 tra.12 srp.12 lis.12 sij.13 tra.13 srp.13 Source: 451 Research Nov 2013 ChangeWave Cloud Trends Survey Pressure for SaaS adoption from mgmt and users but growing security concerns by IT Confidential 2014 Trend Micro Inc. 15

Copyright 2014 Trend Micro Inc. 91% of targeted attacks involve spear phishing emails. Trend Labs Nov 2012

Evolving Threat Landscape Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks coverage, in its silo

Enhancing Office 365 Threat Protection included security Malware engines update hourly 1 Scan engines look for active malicious code 1 Challenge 12,500 new unique threats discovered every hour 2 Criminals hide nonactive malicious code in PDF and other office documents Trend Micro Cloud App Security adds Smart Protection Network quickly detects known threats and sandboxing finds unknown threats Document exploit scanning and sandboxing find hidden malware 1. Microsoft online documentation, Jan 2015 2. TrendLabs Q4 2014 Copyright 2015 Trend Micro Inc. 18

Before Office 365 OWA Email data controlled by organization APT Protection Inbound email inspected for zero-day malware Multiple security layers MAPI SMTP Gateway Network boundary Mobile Exchange Compliance Outbound email scanned for compliance Copyright 2014 Trend Micro Inc.

Now with Office 365 Advanced malware and compliance controls no longer see traffic? OWA Outlook Mobile Copyright 2014 Trend Micro Inc.

Copyright 2013 Trend Micro Inc.

Now with Office 365? Data sovereignty concerns: Where is my data? Who has access to it? Will I know if it is accessed? OWA Outlook Mobile Copyright 2014 Trend Micro Inc.

Copyright 2014 Trend Micro Inc. Introducing Trend Micro Cloud App Security FOR OFFICE 365

Advanced Malware & Compliance Trend Micro Cloud App Security Copyright 2014 Trend Micro Inc.

Advanced Malware & Compliance No proxy required if not using encryption Trend Micro Cloud App Security Risk assessment including doc exploit detection identifies suspicious files Sandbox malware analysis in the cloud 200+ customizable DLP templates Real-time and discovery scans Copyright 2014 Trend Micro Inc.

Decryption Proxy Data at Rest Encryption Service Zach, I d to meet with you to discuss the project plan. Will you be ready to meet on Trend Micro Cloud App Security zvfwyya8vxnhemfydo ghxozgrtkhbzmsoqii5r nqb9yuarxdpjn8pw4r Uvfi3kRbpTdAaCVd OWA Copyright 2014 Trend Micro Inc. MAPI EAS Option: Trend Micro or customer managed keys Direct API integration (no SMTP routing) maintains Office 365 user, admin, security functionality

How it Works Email received. Passed to Cloud App Security 1 Cloud App Security Internet Employees IT Copyright 2013 Trend Micro Inc. 27

How it Works Cloud App Security 2 Index for searching later Scan for malware risk; sandbox if needed DLP compliance scan Internet Employees IT Copyright 2013 Trend Micro Inc. 28

How it Works Cloud App Security Internet 3 Encrypt and return to Office 365 Employees IT Copyright 2013 Trend Micro Inc. 29

How it Works Cloud App Security Internet User access via reverse proxy Decryption 5 4 Decrypt using cloud or on-premise keys Employees IT Copyright 2013 Trend Micro Inc. 30

Added Value to Office 365 Built in Security Data Encryption Threat Protection Data Loss Prevention Office 365 includes: Data encryption with Microsoft controlled encryption keys Basic antimalware checks for executable malware using pattern matching Limited templates, not easily customizable SharePoint/OneDrive DLP is not real-time Trend Micro Cloud App Security adds: Customer data ownership and control Additional data encryption layer with independent encryption keys (Trend Micro or customer managed) Customer control over who can access their data Advanced threat protection Blocks malware hidden in PDF and Office Docs by searching for exploits Finds advanced malware by opening files in a virtual sandbox Enhance visibility and control Real-time DLP for email, SharePoint, OneDrive 200+ DLP templates Integration with Trend Micro Control Manager for visibility across other layers Copyright 2013 Trend Micro Inc.

#1 Corporate EndPoint Server Security Market Share 31% Source: IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 Copyright 2014 Trend Micro Inc. 32

Hvala na pažnji!