Title: Confidential
1Securing your customers data from the latest
threats
Jon Clay Sr. PMM SMB Segment N. America
2Agenda
- The Changing Threat Landscape
- Protecting your data
- Customer benefits
- Q A
3The Changing Environment
4Its All About the Money
TODAY
YESTERDAY
5The Underground Economy
A sampling of items for sale in typical
cybercrime forums
6Threat Environment Evolution to Crimeware
Web Based Malware Attacks
Intelligent Botnets
Crimeware
- Multi-Vector
- Multi-Component
- Web Polymorphic
- Rapid Variants
- Single Instance
- Single Target
- Regional Attacks
- Silent, Hidden
- Hard to Clean
- Botnet Enabled
Spyware
Spam Mass Mailers
Complexity
Vulnerabilities Worm/Outbreaks
2001
2003
2004
2005
2007
7Web Threats
Web threats are any threat that uses the Web to
do bad and unwanted things. They
The threat landscape is shifting to Web-borne
attacks
Web Threats Total Growth Since 2005
- Use the Internet to perform malicious activities
- Arrive, propagate, deliver payload, and entrench
themselves via the Internet - Employ blended threats, or combinations of
malicious programs, and techniques that work
together to infect PCs - Are installed on a PC without the users implicit
knowledge or permission and aim to clandestinely
carry out their activities
1000
540
468
399
328
263
201
138
84
39
10
20052006
8Web Threat in the Wild LINKOPTIM
- Hackers created and hacked several Italian Web
pages - The infection infiltrated Italian Internet users
PCs in a variety of ways - Downloaded a legitimate looking file
(www.google.com) - Installed an ActiveX dropper
- Used a malicious Windows Media File dropper
- Exploited IE vulnerabilities
- Exploited the Java Byte
- LINKOPTIM then installed more downloaders and
rootkits until the system eventually crashed - Attackers cashed in on LINKOPTIMs ability to
affect search results from Google and display
results that were actually advertisements for
sites
9Sophistication of Attacks Top Concern Despite
Technology Deployments
Top Security Technologies Deployed
Top Concerns to Enterprise Security
86.1
85.7
Increasing sophistication of attacks
3.44
Desktop antivirus software
84.8
85.9
57.7
82.9
Employees underestimate importance of following
security policy
Server antivirus software
77.3
3.38
85.9
72.7
68.6
Increasing complexity of security solutions
Desktop antispyware software
57.6
3.11
57.8
71.6
65.7
Desktop firewalls
Business executives underestimate importance of
following security policy
57.6
3.10
65.6
51.0
74.3
Enterprise firewalls (appliances)
69.7
Increasing volume and complexity of network
traffic
75.0
3.08
50.0
57.1
Enterprise firewalls (software)
62.1
Budget too small to cover necessary security
purchases
65.6
3.07
55.7
Desktop/laptop/handheld file encryption software
51.4
45.5
67.2
Patchwork nature of network security
40.2
2.99
IPSec virtual private networks (VPNs)
55.2
63.6
73.4
39.2
Gateway antivirus software
Always-on environment
2.95
58.1
63.6
68.8
44.8
URL blocking and filtering
Mobile clients and unmanaged devices
49.5
2.91
60.6
68.8
Small
Medium sized
Large
Very Large
Source IDC 2006 Security Survey
10Customer Challenges Regarding Threat Protection
11How Trend Micro Is Responding
12What You Can Expect From Trend Micro
Business Technology Approach
CONTINUOUS
Innovation
Leadership
Commitment
Growth
Messaging Security
13Trend Micro Total Web Threat Protection
Trend Global DNS Network
2 Billion Hits/Day 99.999 Availability
Domain Reputation Database
Zone Files
URL Filtering Security Rating
Email Reputation Database
DNS
Portal
Total Web Threat Protection Web Security
Rating URL Filtering Malware URL Blocking
Internet
14Web Security Rating Service
Characteristics
- Web Reputation comprised of 50 Web site
characteristics - Static
- Historic
- Community
- Geographic
- Content
- IP
- Protect against unknown malware and sequential
attacks through in-the-cloud Web security rating
service
15The 21st Century Solution
Web Reputation
- Web reputation is like applying the combined
intelligence of the FBI and Interpol - Exhaustive databases with full profiles on
- Known offenders
- Suspected offenders
- Possible future offenders
- Constantly updated with input from all over the
world - Instantly accessible by any special agent (Trend
product)
16Web Security Best Practices
17Protection from Barbarians at the Gate
Layered security of a castle
- Criminals
- Arrows
- Fire Bombs
- Send in spy or trader
- Personal Armor
- Locked Chest
Protection Points
File Server Security (Operating System)
Desktop Security
Gateway Security
Mail Server Security (Mail Application)
In-the-cloud Services
- Criminals
- Web Threats
- Malware
- Keyloggers
- Trojans
- Spyware
- More
- Web Reputation
- Email Reputation
- OfficeScan
- Worry-Free Products
- SMB
- IGSA
- ISVW
- Enterprise
- IMSA/IMSS/IMHS
- IWSA/IWSS
- ServerProtect
- Worry-Free Products
- ScanMail for Exchange/Lotus Domino
- Worry-Free Products
Damage Cleanup Services
Industry Unique
Layered security of Trend Micro solutions
18Trend Micro Customer Benefits
19Trend Micro Foundation TrendLabs
TrendLabs helps provide a worldwide platform for
delivering timely threat intelligence, service,
and support anytime, anywhere.
- More than 800 threat research and service and
support experts at 15 locations - Collaborative account management
- Automated alerts for new threats
- ISO 9001 2000, BS7799 certifications
- COPC-2000 Standards Certification
Protection requires more than a product
It requires servicetimelyand expert service.
20Continuous Innovation
Our 1 goal is to create value for our customers
throughcontinuous innovation
Integrated Gateway Content Security InterScan
Messaging Security SuiteWith Spam Prevention
Solution
Botnet Identification Service
Trend Micro and Cisco Integrated Security in the
Network
Threat Lifecycle Management Strategy Enterprise
Protection Strategy (EPS)
LAN Server Virus ProtectionServer Protect
Server-based Email Virus ProtectionScanMail
Gateway Virus ProtectionInterScan
Web Filtering InterScan WebManager
2-Hour Virus ResponseSLA
Total Web Threat Protection Web Reputation
Email Reputation Services
Web-based Centralized ManagementTrend Micro
Virus Control System
Network Access ControlNetwork VirusWall
21Trend Micro Delivers Vendor Value to IT
Ranked 1 in Security Vendor
Ranked 2 in Overall Industry
CIO Insight's 2006 Vendor Value Survey measures
how U.S.-based IT executives generally perceive
the value of their vendors' product and service
offerings, and those executives' overall
satisfaction with the support these vendors
provide.
22Industry Recognition
Product/Service Recognition
Business Recognition
23In Summary
Threat Landscape has evolved to where no one is
safe and threats are constantly being launched.
Trend Micro is dedicated to managing the negative
impact of security threats within Enterprise,
SMB, and Consumer environments to ensure our
customers protection and peace of mind.
Trend Micro understands the threat landscape and
has the infrastructure, people, and processes in
place to respond rapidly to the changing
environment.
Trend Micro is more than a smart, long term
technology investment Trend Micro is a trusted
security partner for millions of customers across
the globe.
Trend Micro enables customers to surf the Web and
use their computers as they wish without
worrying about protecting their systems and data
against a growing range of Web threats.
24(No Transcript)