Top Banner
Public 3/19/2009 Anthony Ung APAC Product Marketing Cloud-Client Security – The Smart Protection Network
21

Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Jul 09, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Public3/19/2009

Anthony UngAPAC Product Marketing

Cloud-Client Security – The Smart Protection Network

Page 2: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Agenda

Changing

1

Smart

2 3

Copyright 2007 - Trend Micro Inc.3/19/2009 2Classification

Changing Malware Market

Smart Protection Network

Benefits

Page 3: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Today’s Security Threats

A Lot Can Happen in Just One Minute...

A single attack can steal your confidential data,

damage your infrastructure, and ruin your reputation.

One hijacked website.One deceptive email.One misleading link.

Content security threats are increasingly

dangerous and harder to detect!

Page 4: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Malware is Multiplying

Malware Samples

• 1988: 1,738

• 1998: 177,615

• 2008: 1,100,000+

• Pattern Files Can’t Keep Up{

Malware Variants

{

The Threat Is REAL

Copyright 2007 - Trend Micro Inc.

Malware is Sophisticated

Malware Variants

• Multi-Vector

• Polymorphic

• Rapid Variants{Malware is Profit-Driven

Malware Actions

• Stealthy

• Targeted

• Crime & Espionage

• Increased Liability Costs{

Page 5: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Asset Going-rate

Pay-out for each unique adware installation $0.02-0.30

Malware package, basic version $1,000 – $2,000

Malware package with add-on services Starting at $20

Exploit kit rental (1 hour) $0.99 to $1

Exploit kit rental (2.5 hours) $1.60 to $2

The Underground Economy

Quiz: How much was

Conficker/Downad Selling for?

Copyright 2007 - Trend Micro Inc.

Exploit kit rental (2.5 hours) $1.60 to $2

Exploit kit rental (5 hours) $4, may vary

Undetected copy of info-sealing Trojan $80, may vary

Distributed Denial of Service attack $100 per day

10,000 compromised PCs $1,000

Stolen bank account credentials Starting at $50

1 million freshly-harvested emails (unver) $8 and up

Sample data from research on the underground digital economy in 2007

Answer: $38.70

Page 6: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

20,000.00

25,000.00

30,000.00

Growing Rapidly

Copyright 2007 - Trend Micro Inc.

0.00

5,000.00

10,000.00

15,000.00

2006 2007 2008 2009 2010 2011 2012 2013 2014 2015

Page 7: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Challenges to Creating a Defense

• Many factors are making itmore difficult to create a

solid defense

Compliance

Mobile Workforce

• Enterprises spend billionslayering solutions, creating

point-product sprawl

Gateway Network Servers EndpointVendor

Point-product sprawl is difficult to acquire, deploy, and manage

• The biggest security challengeis managing the complexity

In-the-Cloud

Off Network

VendorA Vendor

G

VendorI

is managing the complexity of security

Managing security is more

difficult today than it has

ever been

VendorB

VendorD

VendorC

VendorE

VendorF

VendorH

Virtualization

Web Tools

eCommerce

Web 2.0

Page 8: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Security Latency Impacts Risk

Content SecurityRisk/Cost

2003

RiskProfile

Risk Profile2008

If you think your business is safe

Think againTraditional security cannot keep

up with today’s threats

ThreatDetected

Pattern FileReceived

Pattern FileDeployed

As the Speed of Threats Increases Risks and Costs,

Minimizing Security Latency Becomes Critical

Damage& Loss

Contained

Cost & EffortSaved byTraditionalPattern FileApproach

Time

Page 9: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Threat Protection Databases

Small Pattern DB

Slowly Updating Patterns< 50 Per Day

Has Security Kept Up?

Copyright 2007 - Trend Micro Inc.

PASTPast

Patterns

Page 10: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Trend Micro Enterprise Security

A Tightly Integrated

Offering of Content Security Products, Services, and Solutionsfor Enterprises Concerned about Staying Ahead of Content Security Threats

Lower your risk

ImmediateProtection

Lower your costs

LessComplexity

Page 11: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Trend Micro Smart Protection Network

Enterprise Security Gets Smart

• Customers

• Partners

• TrendLabs Research,

Service & Support

• Samples

• Submissions

• Honeypots

• Web Crawling

EMAILREPUTATION

FILEREPUTATION

WEBREPUTATION

THREAT

Global Threat

Feedback

Each new reputation

check becomes part

of a feedback loop

Trend Micro Enterprise Security is powered by

Smart Protection Network• Web Crawling

• Feedback Loops

• Behavioral Analysis

ANALYSIS

Blocks All Components of an AttackSpam sources, embedded links, dangerous files,

and websites with malicious content

of a feedback loop

that automatically

updates databases

around the world.

Page 12: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Changing

1

Smart

2 3

Agenda

3/19/2009 12 Classification

Changing Malware Market

Smart Protection Network

Benefits

Page 13: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Threat AnalysisTrendLabs &

Malware Database

Threat Collection

• Customers

• Partners

• TrendLabs Research, Service & Support

• Samples

• Submissions

• Honeypots

• Web Crawling

• Feedback Loops

• Behavioral Analysis

Management

Email Reputation

IP

URL

WebReputation

Files

FileReputation

Threats

• 3.5 billion URL requests per day 20 million+ install base

99.9999%+ uptime

• 5 data center (US, EMEA, APAC) 1000 production servers

Cloud Client Security – The Smart Protection Network

Copyright 2007 - Trend Micro Inc.

Partners

• ISPs

• Routers

• Etc.

Endpoint

Gateway

SaaS/Managed

Cloud

Off Network

Messaging

Multi-Threat Correlation

Page 14: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

A compromised web siteOne click in a link.

Fake news by email.

A fake video

EMAILREPUTATION

WEBREPUTATION

FILEREPUTATION

How It Works

Copyright 2007 - Trend Micro Inc.Feb 2009

Internal -Confidential

A fake video

Page 15: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Already Live

5 BillionQueries Handled Daily

1.2 TerabyteData Processed Daily

1,000 24/7

Copyright 2007 - Trend Micro Inc.

1,000Dedicated Content Security

Experts at TrendLabs

24/7Multiple Data Centers Operating

Around the World

50 MillionNew IP Addresses / URLs

Processed Daily

250 MillionMalware Samples Processed

Each Year

Page 16: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Trend Micro Enterprise Security

Immediate Protection

WebSecurity

MessagingSecurity

Powered by

Smart

ProtectionNetwork

• Gateway

Web Security

• Hosted Email

Security

• Gateway Email

Security

• Mail Server

Security

• Email Encryption

EndpointSecurity

Network • Email Encryption

• IM Security

• SharePoint

Protection

• Client Security

• Server Security

• Data Leak Protection

• Mobile Security

Minimizes the Time to

Identify Risks and Create Protection

Page 17: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Agenda

Changing

1

Smart

2 3

3/19/2009 17 Classification

Changing Malware Market

Smart Protection Network

Benefits

Page 18: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Minimizes time to identify risks and create protection = Better Protection

Minimizes the time to acquire, deploy and manage solutions = Less Complexity

Hours until protection is in place

Reduced security management costs & improved savings on reduced productivity loss

Smart Protection Network: Benefits

Copyright 2009 - Trend Micro Inc.Feb 2009Internal -Confidential

Threat Detected

Protection updated

Cloud-ClientArchitecture

ConventionalContents Security

Threat Detected

Pattern file received

Pattern file deployed

Protection deployed

Hours until protection is in place

9

8

7

6

5

4

3

2

1

0

Correlation &CollaborationOf reputation(s)

AdvantageOf cloudpattern

The Impact of a Cloud-Client Solution

Respondents project significant savings:

�62% reduction in endpoint infections

�40% reduction in security management costs

�20% reduction in security breaches

Savings of Over

$60 / Employee

Savings of Over

$300K / Year

$60 / Employee

Page 19: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Less Network Traffic Removes Pattern Monitoring/ Management

Reduce Bandwidth Costs Reduce Manpower & Support

Costs

Reducing Business Costs

Copyright 2009 - Trend Micro Inc.

Lightweight Clients, Less Memory

Protects Customers in Near Real Time

Reduce Hardware Costs Reduce Downtime Costs

Page 20: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

RiskProfile

Why Trend Micro for Your Enterprise

Content SecurityRisk/Cost

Risk Profile2008

Trend Micro Offers a

New Protection Paradigm

Trend Micro Enterprise Security

Defends Against Today’s Threats

Copyright 2009 - Trend Micro Inc.

2003

Profile

ThreatDetected

Pattern FileReceived

Pattern FileDeployed

Damage& Loss

Contained

Cost & EffortSaved by

TraditionalPattern FileApproach

ProtectionDeployed

Trend Micro Conventional Content Security

Time

Page 21: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is

Thank You

Learn More:www.trendmicro.com/go/enterprise

TrendWatch http://itw.trendmicro.com/ > Technologies > SPN