Next Generation Trend Micro Eva Chen CEO and Co-Founder
Jan 15, 2015
Next Generation Trend Micro Eva Chen
CEO and Co-Founder
A computing category that did not exist six years ago has come to overtake one that has been around for 38 years!
Source: Asymco.com July 2013
iOS &
Android
PC
Copyright 2014 Trend Micro Inc.
Consumerization Cloud & Virtualization
Cyber Threats
IT Employees
Confidential © 2014 Trend Micro Inc. 3
Attackers
25% growth in active seats for SaaS
endpoint security Over 90% YoY revenue growth
85% customer growth
New offerings to secure Web Apps, AWS, SAP
All of Trend Micro Aligned to these Solutions
4 Copyright 2014 Trend Micro Inc.
Trend Micro 31%
1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013
#1 Corporate Server Security Market Share1
Copyright 2014 Trend Micro Inc.
Validated by Industry Experts
Copyright 2014 Trend Micro Inc. 6
(for Deep Discovery)
1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 2. Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 3. Experton Group, Cloud Vendor Benchmark, May 2013 4. Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 5. Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine
So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond?
7
Evolving Threat Landscape
Copyright 2014 Trend Micro Inc. 8
Time
Vulnerability Exploits
Traditional Malware
Advanced Malware
Employee Data Leaks
Targeted Attacks
Sop
his
tica
tio
n
9 Confidential | Copyright 2014 Trend Micro Inc.
110 ∧
Why Targeted Attacks are So Tricky!
Poison Ivy
Multiple Ports
EvilGrab MW
Multiple Protocols
IXESHE MW
Evolve/Morph over Time
Customized for each environment!
Copyright 2014 Trend Micro Inc.
Next Generation
Threat Defense
Current
Policy Enforcement
Application Control Identity Federation
Port Control(firewall) Access control(VPN)
Signature Matching AV Signature matching IPS Vulnerability Scan
IT Security Industry Overall Landscape
Sandbox
Copyright 2014 Trend Micro Inc.
Two Very Different Approaches
• Action is “Block” or “Pass”; no grey area
• Risk management approach, balance between high detection and false alert
• Focused on network traffic and rule enforcement
• Focused on understanding hacker behavior and evolving techniques
• Set and Forget • Dynamic updates and change
Threat Defense Policy Enforcement
Copyright 2014 Trend Micro Inc.
Analyze risk and
nature of attack and
attacker, and assess
impact of threats
retrospectively
Update protection automatically,
prioritize areas for remediation and adapt protection
Detect advanced
malware, behavior
and communications
invisible to standard
defenses
Assess potential vulnerabilities and proactively protect endpoints, servers and applications
To Enable New Generation Protection Process!
Copyright 2014 Trend Micro Inc. 13
MONITOR & CONTROL
PREVENT
DETECT
RESPOND
ANALYZE
Trend Micro Smart Protection Platform
Copyright 2014 Trend Micro Inc. 14
MONITOR & CONTROL
PREVENT
DETECT
RESPOND
ANALYZE
Network
Copyright 2014 Trend Micro Inc. 15
Servers End Users
Range of threat defense capabilities, including ‘next-gen’ approaches
Applies across endpoints, servers and network
On-premise and in cloud
Connected to cloud-based global threat intelligence
Trend Micro Smart Protection Platform
Consumer 3Cs
“Corporatization”
Cyber Threats
Cloud
Attackers
Family Applications
•Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix
•Consumer Fraud •Kids Safety • Identity Theft
•Unprotected network traffic •Data leakage •Privacy concerns
Copyright 2014 Trend Micro Inc.
Next Generation Consumer Protection Providing value Target device Protection target
Detect & Clean
Windows PC
Device, Data
In the past…
Now… Protect PC & Mobile
Individual
Future… Enjoy All home devices
Family
Copyright 2014 Trend Micro Inc.
3G/4G
Internet of Everything Protected at Home
Copyright 2014 Trend Micro Inc.
Base image source:: http://community.plus.net/blog/2012/02/23/smart-internet-will-help-manage-your-home-and-life-by-2027/
Enabling a Smart Protection Strategy for Customers
Simple yet flexible to manage and deploy
Centralized Automated Lightweight Flexible
Security that fits an evolving ecosystem
Open Optimized Focused Innovative
…and more
Interconnected Real-time Transparent
Layered security
Smart protection for information
Copyright 2014 Trend Micro Inc.
Zscaler Symantec
FireEye
Trend Micro
Threat Defense
End Users
Network
Servers/Data Center
Breadth of Environment Physical Cloud Virtual
Next Generation Threat Defense Range of Techniques, Across Layers and Environments
McAfee Kaspersky Symantec
Sophos
Copyright 2014 Trend Micro Inc.
Threat Defense
End Users
Network
Servers/Data Center
Breadth of Environment Physical Cloud Virtual
Next Generation Threat Defense Range of Techniques, Across Layers and Environments
Copyright 2014 Trend Micro Inc.
Q1 2014
Q2 2014
Trend Micro
Consistent Vision…
Copyright 2014 Trend Micro Inc. 22
A world safe for exchanging digital information
Thank You
23 Copyright 2013 Trend Micro Inc.