Confidential

1 / 24
About This Presentation
Title:

Confidential

Description:

Trend Micro enables customers to surf the Web and use their computers ... Trend Micro is dedicated to managing the negative impact of security ... – PowerPoint PPT presentation

Number of Views:103
Avg rating:3.0/5.0
Slides: 25
Provided by: Its64

less

Transcript and Presenter's Notes

Title: Confidential


1
Securing your customers data from the latest
threats
Jon Clay Sr. PMM SMB Segment N. America
2
Agenda
  • The Changing Threat Landscape
  • Protecting your data
  • Customer benefits
  • Q A

3
The Changing Environment
4
Its All About the Money
TODAY
YESTERDAY
5
The Underground Economy
A sampling of items for sale in typical
cybercrime forums

6
Threat Environment Evolution to Crimeware
Web Based Malware Attacks
Intelligent Botnets
Crimeware
  • Multi-Vector
  • Multi-Component
  • Web Polymorphic
  • Rapid Variants
  • Single Instance
  • Single Target
  • Regional Attacks
  • Silent, Hidden
  • Hard to Clean
  • Botnet Enabled

Spyware
Spam Mass Mailers
Complexity
Vulnerabilities Worm/Outbreaks
2001
2003
2004
2005
2007
7
Web Threats
Web threats are any threat that uses the Web to
do bad and unwanted things. They
The threat landscape is shifting to Web-borne
attacks
Web Threats Total Growth Since 2005
  • Use the Internet to perform malicious activities
  • Arrive, propagate, deliver payload, and entrench
    themselves via the Internet
  • Employ blended threats, or combinations of
    malicious programs, and techniques that work
    together to infect PCs
  • Are installed on a PC without the users implicit
    knowledge or permission and aim to clandestinely
    carry out their activities

1000
540
468
399
328
263
201
138
84
39
10
20052006
8
Web Threat in the Wild LINKOPTIM
  • Hackers created and hacked several Italian Web
    pages
  • The infection infiltrated Italian Internet users
    PCs in a variety of ways
  • Downloaded a legitimate looking file
    (www.google.com)
  • Installed an ActiveX dropper
  • Used a malicious Windows Media File dropper
  • Exploited IE vulnerabilities
  • Exploited the Java Byte
  • LINKOPTIM then installed more downloaders and
    rootkits until the system eventually crashed
  • Attackers cashed in on LINKOPTIMs ability to
    affect search results from Google and display
    results that were actually advertisements for
    sites

9
Sophistication of Attacks Top Concern Despite
Technology Deployments
Top Security Technologies Deployed
Top Concerns to Enterprise Security
86.1
85.7
Increasing sophistication of attacks
3.44
Desktop antivirus software
84.8
85.9
57.7
82.9
Employees underestimate importance of following
security policy
Server antivirus software
77.3
3.38
85.9
72.7
68.6
Increasing complexity of security solutions
Desktop antispyware software
57.6
3.11
57.8
71.6
65.7
Desktop firewalls
Business executives underestimate importance of
following security policy
57.6
3.10
65.6
51.0
74.3
Enterprise firewalls (appliances)
69.7
Increasing volume and complexity of network
traffic
75.0
3.08
50.0
57.1
Enterprise firewalls (software)
62.1
Budget too small to cover necessary security
purchases
65.6
3.07
55.7
Desktop/laptop/handheld file encryption software
51.4
45.5
67.2
Patchwork nature of network security
40.2
2.99
IPSec virtual private networks (VPNs)
55.2
63.6
73.4
39.2
Gateway antivirus software
Always-on environment
2.95
58.1
63.6
68.8
44.8
URL blocking and filtering
Mobile clients and unmanaged devices
49.5
2.91
60.6
68.8
Small
Medium sized
Large
Very Large
Source IDC 2006 Security Survey
10
Customer Challenges Regarding Threat Protection
11
How Trend Micro Is Responding
12
What You Can Expect From Trend Micro
Business Technology Approach
CONTINUOUS
Innovation
Leadership
Commitment
Growth
Messaging Security
13
Trend Micro Total Web Threat Protection
Trend Global DNS Network
2 Billion Hits/Day 99.999 Availability
Domain Reputation Database
Zone Files
URL Filtering Security Rating
Email Reputation Database
DNS
Portal
Total Web Threat Protection Web Security
Rating URL Filtering Malware URL Blocking
Internet
14
Web Security Rating Service
Characteristics
  • Web Reputation comprised of 50 Web site
    characteristics
  • Static
  • Historic
  • Community
  • Geographic
  • Content
  • IP
  • Protect against unknown malware and sequential
    attacks through in-the-cloud Web security rating
    service

15
The 21st Century Solution
Web Reputation
  • Web reputation is like applying the combined
    intelligence of the FBI and Interpol
  • Exhaustive databases with full profiles on
  • Known offenders
  • Suspected offenders
  • Possible future offenders
  • Constantly updated with input from all over the
    world
  • Instantly accessible by any special agent (Trend
    product)

16
Web Security Best Practices
17
Protection from Barbarians at the Gate
Layered security of a castle
  • Criminals
  • Arrows
  • Fire Bombs
  • Send in spy or trader
  • Moat
  • Interior Building Walls
  • Personal Armor
  • Locked Chest
  • Exterior Wall
  • Tower

Protection Points
File Server Security (Operating System)
Desktop Security
Gateway Security
Mail Server Security (Mail Application)
In-the-cloud Services
  • Criminals
  • Web Threats
  • Malware
  • Keyloggers
  • Trojans
  • Spyware
  • More
  • Web Reputation
  • Email Reputation
  • OfficeScan
  • Worry-Free Products
  • SMB
  • IGSA
  • ISVW
  • Enterprise
  • IMSA/IMSS/IMHS
  • IWSA/IWSS
  • ServerProtect
  • Worry-Free Products
  • ScanMail for Exchange/Lotus Domino
  • Worry-Free Products

Damage Cleanup Services
Industry Unique
Layered security of Trend Micro solutions
18
Trend Micro Customer Benefits
19
Trend Micro Foundation TrendLabs
TrendLabs helps provide a worldwide platform for
delivering timely threat intelligence, service,
and support anytime, anywhere.
  • More than 800 threat research and service and
    support experts at 15 locations
  • Collaborative account management
  • Automated alerts for new threats
  • ISO 9001 2000, BS7799 certifications
  • COPC-2000 Standards Certification

Protection requires more than a product
It requires servicetimelyand expert service.
20
Continuous Innovation
Our 1 goal is to create value for our customers
throughcontinuous innovation
Integrated Gateway Content Security InterScan
Messaging Security SuiteWith Spam Prevention
Solution
Botnet Identification Service
Trend Micro and Cisco Integrated Security in the
Network
Threat Lifecycle Management Strategy Enterprise
Protection Strategy (EPS)
LAN Server Virus ProtectionServer Protect
Server-based Email Virus ProtectionScanMail
Gateway Virus ProtectionInterScan
Web Filtering InterScan WebManager
2-Hour Virus ResponseSLA
Total Web Threat Protection Web Reputation
Email Reputation Services
Web-based Centralized ManagementTrend Micro
Virus Control System
Network Access ControlNetwork VirusWall
21
Trend Micro Delivers Vendor Value to IT
Ranked 1 in Security Vendor
Ranked 2 in Overall Industry
CIO Insight's 2006 Vendor Value Survey measures
how U.S.-based IT executives generally perceive
the value of their vendors' product and service
offerings, and those executives' overall
satisfaction with the support these vendors
provide.
22
Industry Recognition
Product/Service Recognition
Business Recognition
23
In Summary
Threat Landscape has evolved to where no one is
safe and threats are constantly being launched.
Trend Micro is dedicated to managing the negative
impact of security threats within Enterprise,
SMB, and Consumer environments to ensure our
customers protection and peace of mind.
Trend Micro understands the threat landscape and
has the infrastructure, people, and processes in
place to respond rapidly to the changing
environment.
Trend Micro is more than a smart, long term
technology investment Trend Micro is a trusted
security partner for millions of customers across
the globe.
Trend Micro enables customers to surf the Web and
use their computers as they wish without
worrying about protecting their systems and data
against a growing range of Web threats.
24
(No Transcript)
Write a Comment
User Comments (0)