Top Banner
Next Generation Trend Micro Eva Chen CEO and Co-Founder
23
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Eva ir presentation_final_e_final_web

Next Generation Trend Micro Eva Chen

CEO and Co-Founder

Page 2: Eva ir presentation_final_e_final_web

A computing category that did not exist six years ago has come to overtake one that has been around for 38 years!

Source: Asymco.com July 2013

iOS &

Android

PC

Copyright 2014 Trend Micro Inc.

Page 3: Eva ir presentation_final_e_final_web

Consumerization Cloud & Virtualization

Cyber Threats

IT Employees

Confidential © 2014 Trend Micro Inc. 3

Attackers

Page 4: Eva ir presentation_final_e_final_web

25% growth in active seats for SaaS

endpoint security Over 90% YoY revenue growth

85% customer growth

New offerings to secure Web Apps, AWS, SAP

All of Trend Micro Aligned to these Solutions

4 Copyright 2014 Trend Micro Inc.

Page 5: Eva ir presentation_final_e_final_web

Trend Micro 31%

1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013

#1 Corporate Server Security Market Share1

Copyright 2014 Trend Micro Inc.

Page 6: Eva ir presentation_final_e_final_web

Validated by Industry Experts

Copyright 2014 Trend Micro Inc. 6

(for Deep Discovery)

1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 2. Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 3. Experton Group, Cloud Vendor Benchmark, May 2013 4. Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 5. Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine

Page 7: Eva ir presentation_final_e_final_web

So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond?

7

Page 8: Eva ir presentation_final_e_final_web

Evolving Threat Landscape

Copyright 2014 Trend Micro Inc. 8

Time

Vulnerability Exploits

Traditional Malware

Advanced Malware

Employee Data Leaks

Targeted Attacks

Sop

his

tica

tio

n

Page 9: Eva ir presentation_final_e_final_web

9 Confidential | Copyright 2014 Trend Micro Inc.

110 ∧

Page 10: Eva ir presentation_final_e_final_web

Why Targeted Attacks are So Tricky!

Poison Ivy

Multiple Ports

EvilGrab MW

Multiple Protocols

IXESHE MW

Evolve/Morph over Time

Customized for each environment!

Copyright 2014 Trend Micro Inc.

Page 11: Eva ir presentation_final_e_final_web

Next Generation

Threat Defense

Current

Policy Enforcement

Application Control Identity Federation

Port Control(firewall) Access control(VPN)

Signature Matching AV Signature matching IPS Vulnerability Scan

IT Security Industry Overall Landscape

Sandbox

Copyright 2014 Trend Micro Inc.

Page 12: Eva ir presentation_final_e_final_web

Two Very Different Approaches

• Action is “Block” or “Pass”; no grey area

• Risk management approach, balance between high detection and false alert

• Focused on network traffic and rule enforcement

• Focused on understanding hacker behavior and evolving techniques

• Set and Forget • Dynamic updates and change

Threat Defense Policy Enforcement

Copyright 2014 Trend Micro Inc.

Page 13: Eva ir presentation_final_e_final_web

Analyze risk and

nature of attack and

attacker, and assess

impact of threats

retrospectively

Update protection automatically,

prioritize areas for remediation and adapt protection

Detect advanced

malware, behavior

and communications

invisible to standard

defenses

Assess potential vulnerabilities and proactively protect endpoints, servers and applications

To Enable New Generation Protection Process!

Copyright 2014 Trend Micro Inc. 13

MONITOR & CONTROL

PREVENT

DETECT

RESPOND

ANALYZE

Page 14: Eva ir presentation_final_e_final_web

Trend Micro Smart Protection Platform

Copyright 2014 Trend Micro Inc. 14

MONITOR & CONTROL

PREVENT

DETECT

RESPOND

ANALYZE

Page 15: Eva ir presentation_final_e_final_web

Network

Copyright 2014 Trend Micro Inc. 15

Servers End Users

Range of threat defense capabilities, including ‘next-gen’ approaches

Applies across endpoints, servers and network

On-premise and in cloud

Connected to cloud-based global threat intelligence

Trend Micro Smart Protection Platform

Page 16: Eva ir presentation_final_e_final_web

Consumer 3Cs

“Corporatization”

Cyber Threats

Cloud

Attackers

Family Applications

•Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix

•Consumer Fraud •Kids Safety • Identity Theft

•Unprotected network traffic •Data leakage •Privacy concerns

Copyright 2014 Trend Micro Inc.

Page 17: Eva ir presentation_final_e_final_web

Next Generation Consumer Protection Providing value Target device Protection target

Detect & Clean

Windows PC

Device, Data

In the past…

Now… Protect PC & Mobile

Individual

Future… Enjoy All home devices

Family

Copyright 2014 Trend Micro Inc.

Page 18: Eva ir presentation_final_e_final_web

3G/4G

Internet of Everything Protected at Home

Copyright 2014 Trend Micro Inc.

Base image source:: http://community.plus.net/blog/2012/02/23/smart-internet-will-help-manage-your-home-and-life-by-2027/

Page 19: Eva ir presentation_final_e_final_web

Enabling a Smart Protection Strategy for Customers

Simple yet flexible to manage and deploy

Centralized Automated Lightweight Flexible

Security that fits an evolving ecosystem

Open Optimized Focused Innovative

…and more

Interconnected Real-time Transparent

Layered security

Smart protection for information

Copyright 2014 Trend Micro Inc.

Page 20: Eva ir presentation_final_e_final_web

Zscaler Symantec

FireEye

Trend Micro

Threat Defense

End Users

Network

Servers/Data Center

Breadth of Environment Physical Cloud Virtual

Next Generation Threat Defense Range of Techniques, Across Layers and Environments

McAfee Kaspersky Symantec

Sophos

Copyright 2014 Trend Micro Inc.

Page 21: Eva ir presentation_final_e_final_web

Threat Defense

End Users

Network

Servers/Data Center

Breadth of Environment Physical Cloud Virtual

Next Generation Threat Defense Range of Techniques, Across Layers and Environments

Copyright 2014 Trend Micro Inc.

Q1 2014

Q2 2014

Trend Micro

Page 22: Eva ir presentation_final_e_final_web

Consistent Vision…

Copyright 2014 Trend Micro Inc. 22

A world safe for exchanging digital information

Page 23: Eva ir presentation_final_e_final_web

Thank You

23 Copyright 2013 Trend Micro Inc.