eva ir presentation_final_e_final_web

Post on 15-Jan-2015

185 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Next Generation Trend Micro Eva Chen

CEO and Co-Founder

A computing category that did not exist six years ago has come to overtake one that has been around for 38 years!

Source: Asymco.com July 2013

iOS &

Android

PC

Copyright 2014 Trend Micro Inc.

Consumerization Cloud & Virtualization

Cyber Threats

IT Employees

Confidential © 2014 Trend Micro Inc. 3

Attackers

25% growth in active seats for SaaS

endpoint security Over 90% YoY revenue growth

85% customer growth

New offerings to secure Web Apps, AWS, SAP

All of Trend Micro Aligned to these Solutions

4 Copyright 2014 Trend Micro Inc.

Trend Micro 31%

1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013

#1 Corporate Server Security Market Share1

Copyright 2014 Trend Micro Inc.

Validated by Industry Experts

Copyright 2014 Trend Micro Inc. 6

(for Deep Discovery)

1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 2. Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 3. Experton Group, Cloud Vendor Benchmark, May 2013 4. Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 5. Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine

So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond?

7

Evolving Threat Landscape

Copyright 2014 Trend Micro Inc. 8

Time

Vulnerability Exploits

Traditional Malware

Advanced Malware

Employee Data Leaks

Targeted Attacks

Sop

his

tica

tio

n

9 Confidential | Copyright 2014 Trend Micro Inc.

110 ∧

Why Targeted Attacks are So Tricky!

Poison Ivy

Multiple Ports

EvilGrab MW

Multiple Protocols

IXESHE MW

Evolve/Morph over Time

Customized for each environment!

Copyright 2014 Trend Micro Inc.

Next Generation

Threat Defense

Current

Policy Enforcement

Application Control Identity Federation

Port Control(firewall) Access control(VPN)

Signature Matching AV Signature matching IPS Vulnerability Scan

IT Security Industry Overall Landscape

Sandbox

Copyright 2014 Trend Micro Inc.

Two Very Different Approaches

• Action is “Block” or “Pass”; no grey area

• Risk management approach, balance between high detection and false alert

• Focused on network traffic and rule enforcement

• Focused on understanding hacker behavior and evolving techniques

• Set and Forget • Dynamic updates and change

Threat Defense Policy Enforcement

Copyright 2014 Trend Micro Inc.

Analyze risk and

nature of attack and

attacker, and assess

impact of threats

retrospectively

Update protection automatically,

prioritize areas for remediation and adapt protection

Detect advanced

malware, behavior

and communications

invisible to standard

defenses

Assess potential vulnerabilities and proactively protect endpoints, servers and applications

To Enable New Generation Protection Process!

Copyright 2014 Trend Micro Inc. 13

MONITOR & CONTROL

PREVENT

DETECT

RESPOND

ANALYZE

Trend Micro Smart Protection Platform

Copyright 2014 Trend Micro Inc. 14

MONITOR & CONTROL

PREVENT

DETECT

RESPOND

ANALYZE

Network

Copyright 2014 Trend Micro Inc. 15

Servers End Users

Range of threat defense capabilities, including ‘next-gen’ approaches

Applies across endpoints, servers and network

On-premise and in cloud

Connected to cloud-based global threat intelligence

Trend Micro Smart Protection Platform

Consumer 3Cs

“Corporatization”

Cyber Threats

Cloud

Attackers

Family Applications

•Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix

•Consumer Fraud •Kids Safety • Identity Theft

•Unprotected network traffic •Data leakage •Privacy concerns

Copyright 2014 Trend Micro Inc.

Next Generation Consumer Protection Providing value Target device Protection target

Detect & Clean

Windows PC

Device, Data

In the past…

Now… Protect PC & Mobile

Individual

Future… Enjoy All home devices

Family

Copyright 2014 Trend Micro Inc.

3G/4G

Internet of Everything Protected at Home

Copyright 2014 Trend Micro Inc.

Base image source:: http://community.plus.net/blog/2012/02/23/smart-internet-will-help-manage-your-home-and-life-by-2027/

Enabling a Smart Protection Strategy for Customers

Simple yet flexible to manage and deploy

Centralized Automated Lightweight Flexible

Security that fits an evolving ecosystem

Open Optimized Focused Innovative

…and more

Interconnected Real-time Transparent

Layered security

Smart protection for information

Copyright 2014 Trend Micro Inc.

Zscaler Symantec

FireEye

Trend Micro

Threat Defense

End Users

Network

Servers/Data Center

Breadth of Environment Physical Cloud Virtual

Next Generation Threat Defense Range of Techniques, Across Layers and Environments

McAfee Kaspersky Symantec

Sophos

Copyright 2014 Trend Micro Inc.

Threat Defense

End Users

Network

Servers/Data Center

Breadth of Environment Physical Cloud Virtual

Next Generation Threat Defense Range of Techniques, Across Layers and Environments

Copyright 2014 Trend Micro Inc.

Q1 2014

Q2 2014

Trend Micro

Consistent Vision…

Copyright 2014 Trend Micro Inc. 22

A world safe for exchanging digital information

Thank You

23 Copyright 2013 Trend Micro Inc.

top related