Cloud-Client Security – The Smart Protection Network

Transcription

Cloud-Client Security – The SmartProtection NetworkAnthony UngPublicAPAC Product Marketing3/19/2009

093SmartProtectionNetwork2Copyright 2007 - Trend Micro Inc.Benefits

Today’s Security ThreatsA Lot Can Happen in Just One dOnelink. A single attack can stealyour confidential data,damage your infrastructure,and ruin your reputation.Content security threats are increasinglydangerous and harder to detect!

The Threat Is REALMalware is MultiplyingMalware is SophisticatedMalware is Profit-DrivenCopyright 2007 - Trend Micro Inc.{{{Malware Samples 1988: 1,738 1998: 177,615 2008: 1,100,000 Pattern Files Can’t Keep UpMalware Variants Multi-Vector Polymorphic Rapid VariantsMalware Actions Stealthy Targeted Crime & Espionage Increased Liability Costs

The Underground EconomyAssetGoing-ratePay-out for each unique adware installation 0.02-0.30 1,000 –was 2,000Quiz: How muchMalware package, basic versionMalware package with add-on servicesStarting at 20Conficker/DownadSelling for?Exploit kit rental (1 hour) 0.99 to 1Exploit kit rental (2.5 hours) 1.60 to 2Exploit kit rental (5 hours) 4, may varyUndetected copy of info-sealing Trojanmay varyAnswer: 80, 38.70Distributed Denial of Service attack 100 per day10,000 compromised PCs 1,000Stolen bank account credentialsStarting at 501 million freshly-harvested emails (unver) 8 and upSample data from research on the underground digital economy in 2007Copyright 2007 - Trend Micro Inc.

Growing 005,000.000.00200620072008200920102011Copyright 2007 - Trend Micro Inc.2012201320142015

Challenges to Creating a Defense Many factors are making itmore difficult to create asolid defense Enterprises spend billionslayering solutions, creatingCompliancepoint-productsprawl The biggest security challengeGatewayVendoris managingthe complexityAIn-the-Cloud of securityMobile WorkforcePoint-product sprawl is difficultto acquire, deploy, and manageNetwork ServersVirtualizationmore VendorBVendorWeb ToolsVendorCVendorEManaging security isdifficult today than it hasever beenEndpointeCommerceWeb 2.0DVendorFVendorGVendorHVendorIOff Network

Security Latency Impacts RiskContent SecurityRisk/CostRisk Profile2008If you think your business is safeThink againTraditional security cannot keepup with today’s threatsRiskProfile2003Damage& LossContainedCost & EffortSaved byTraditionalPattern FileApproachTimeThreatDetectedPattern FileReceivedPattern FileDeployedAs the Speed of Threats Increases Risks and Costs,Minimizing Security Latency Becomes Critical

Has Security Kept Up?Threat ProtectionDatabasesSlowly Updating Patterns 50 Per DaySmall Pattern DBPatternsPastPASTCopyright 2007 - Trend Micro Inc.

Trend Micro Enterprise SecurityA Tightly IntegratedOffering of Content SecurityProducts, Services, and Solutionsfor Enterprises Concerned aboutStaying Ahead of Content Security ThreatsImmediateProtectionLower your riskLessComplexityLower your costs

Trend Micro Smart Protection NetworkEnterprise Security Gets SmartWEBREPUTATION CustomersEMAILREPUTATION Partners TrendLabs Research,ServiceSupportTrend &MicroEnterprise Samplespowered by SubmissionsFILE HoneypotsTHREATREPUTATION Web CrawlingANALYSIS Feedback Loops Behavioral AnalysisGlobal ThreatSecurityisFeedbackEach new reputationcheck becomes partof a feedback loopthat automaticallyupdates databasesaround the world.Smart Protection NetworkBlocks All Components of an AttackSpam sources, embedded links, dangerous files,and websites with malicious content

tionNetwork12BenefitsClassification

Cloud Client Security – The Smart Protection Network 3.5 billion URL requests per day20 million install base99.9999% uptimeWebReputationThreatsThreat Collection Customers Partners TrendLabs Research,Service & Support Samples Submissions Honeypots Web Crawling Feedback Loops Behavioral AnalysisEmailReputationFileReputationURL 5 data center (US, EMEA, APAC)1000 production serversThreat AnalysisIPTrendLabs &Malware nersSaaS/Managed ISPs Routers Etc.CloudEndpointGatewayOff NetworkMessagingCopyright 2007 - Trend Micro Inc.

How It WorksFake news by email.A compromisedweb siteOneclick in a link.WEBREPUTATIONFILEREPUTATIONEMAILREPUTATIONA fake videoInternal ConfidentialFeb 2009Copyright 2007 - Trend Micro Inc.

Already Live5 Billion1.2 Terabyte1,00024/750 Million250 MillionQueries Handled DailyDedicated Content SecurityExperts at TrendLabsNew IP Addresses / URLsProcessed DailyData Processed DailyMultiple Data Centers OperatingAround the WorldMalware Samples ProcessedEach YearCopyright 2007 - Trend Micro Inc.

Trend Micro Enterprise SecurityImmediate Protection GatewayWeb Security Hosted EmailSecurityWebSecurityMessagingSecurityPowered bySmartProtectionNetwork Data Leak Protection Mail ServerSecurity Email Encryption IM Security Client Security Server Security Gateway EmailSecurityEndpointSecurity SharePointProtection Mobile SecurityMinimizes the Time toIdentify Risks and Create Protection

tionNetwork17BenefitsClassification

Smart Protection Network: BenefitsMinimizes time to identify risks and create protection Better ProtectionMinimizes the time to acquire, deploy and manage solutions Less ComplexityReduced security management costs & improved savings on reduced productivity lossHours until protection is in place9The Impact of a Cloud-Client SolutionSavings of Over8Respondents project significant savings:Pattern file deployedAdvantage 300K / Year7 62% reduction in endpoint infectionsOf cloud6 40% reduction in security managementcostspattern 60 / EmployeePattern file received5 20% reduction in security breaches4Threat Detected Protection deployed3Correlation &Protection updated2CollaborationThreat DetectedOf reputation(s)10Internal ConfidentialFeb 2009ConventionalContents SecurityCloud-ClientArchitectureCopyright 2009 - Trend Micro Inc.

Reducing Business CostsLess Network TrafficReduce Bandwidth CostsLightweight Clients, LessMemoryReduce Hardware CostsRemoves Pattern Monitoring/ManagementReduce Manpower & SupportCostsProtects Customers inNear Real TimeReduce Downtime CostsCopyright 2009 - Trend Micro Inc.

Why Trend Micro for Your EnterpriseTrend Micro Offers aNew Protection ParadigmContent SecurityRisk/CostRisk Profile2008Trend Micro Enterprise SecurityDefends Against Today’s ThreatsRiskProfile2003Cost & EffortSaved byTraditionalPattern FileApproachDamage& LossContainedTimeProtectionDeployedTrend MicroThreatDetectedPattern FileReceivedPattern FileDeployedConventional Content SecurityCopyright 2009 - Trend Micro Inc.

Thank YouLearn More:www.trendmicro.com/go/enterpriseTrendWatch http://itw.trendmicro.com/ Technologies SPN

Gateway Network Servers Endpoint Vendor Point-product sprawl is difficult to acquire, deploy, and manage The biggest security challenge is managing the complexity In-the-Cloud Off Network A Vendor G Vendor I of security Managing security is more difficult today than it has ever been