Security Risk Assessment & Audit Report of Security Risk ...
Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content...
Transcript of Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content...
![Page 1: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/1.jpg)
Public3/19/2009
Anthony UngAPAC Product Marketing
Cloud-Client Security – The Smart Protection Network
![Page 2: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/2.jpg)
Agenda
Changing
1
Smart
2 3
Copyright 2007 - Trend Micro Inc.3/19/2009 2Classification
Changing Malware Market
Smart Protection Network
Benefits
![Page 3: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/3.jpg)
Today’s Security Threats
A Lot Can Happen in Just One Minute...
A single attack can steal your confidential data,
damage your infrastructure, and ruin your reputation.
One hijacked website.One deceptive email.One misleading link.
Content security threats are increasingly
dangerous and harder to detect!
![Page 4: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/4.jpg)
Malware is Multiplying
Malware Samples
• 1988: 1,738
• 1998: 177,615
• 2008: 1,100,000+
• Pattern Files Can’t Keep Up{
Malware Variants
{
The Threat Is REAL
Copyright 2007 - Trend Micro Inc.
Malware is Sophisticated
Malware Variants
• Multi-Vector
• Polymorphic
• Rapid Variants{Malware is Profit-Driven
Malware Actions
• Stealthy
• Targeted
• Crime & Espionage
• Increased Liability Costs{
![Page 5: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/5.jpg)
Asset Going-rate
Pay-out for each unique adware installation $0.02-0.30
Malware package, basic version $1,000 – $2,000
Malware package with add-on services Starting at $20
Exploit kit rental (1 hour) $0.99 to $1
Exploit kit rental (2.5 hours) $1.60 to $2
The Underground Economy
Quiz: How much was
Conficker/Downad Selling for?
Copyright 2007 - Trend Micro Inc.
Exploit kit rental (2.5 hours) $1.60 to $2
Exploit kit rental (5 hours) $4, may vary
Undetected copy of info-sealing Trojan $80, may vary
Distributed Denial of Service attack $100 per day
10,000 compromised PCs $1,000
Stolen bank account credentials Starting at $50
1 million freshly-harvested emails (unver) $8 and up
Sample data from research on the underground digital economy in 2007
Answer: $38.70
![Page 6: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/6.jpg)
20,000.00
25,000.00
30,000.00
Growing Rapidly
Copyright 2007 - Trend Micro Inc.
0.00
5,000.00
10,000.00
15,000.00
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
![Page 7: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/7.jpg)
Challenges to Creating a Defense
• Many factors are making itmore difficult to create a
solid defense
Compliance
Mobile Workforce
• Enterprises spend billionslayering solutions, creating
point-product sprawl
Gateway Network Servers EndpointVendor
Point-product sprawl is difficult to acquire, deploy, and manage
• The biggest security challengeis managing the complexity
In-the-Cloud
Off Network
VendorA Vendor
G
VendorI
is managing the complexity of security
Managing security is more
difficult today than it has
ever been
VendorB
VendorD
VendorC
VendorE
VendorF
VendorH
Virtualization
Web Tools
eCommerce
Web 2.0
![Page 8: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/8.jpg)
Security Latency Impacts Risk
Content SecurityRisk/Cost
2003
RiskProfile
Risk Profile2008
If you think your business is safe
Think againTraditional security cannot keep
up with today’s threats
ThreatDetected
Pattern FileReceived
Pattern FileDeployed
As the Speed of Threats Increases Risks and Costs,
Minimizing Security Latency Becomes Critical
Damage& Loss
Contained
Cost & EffortSaved byTraditionalPattern FileApproach
Time
![Page 9: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/9.jpg)
Threat Protection Databases
Small Pattern DB
Slowly Updating Patterns< 50 Per Day
Has Security Kept Up?
Copyright 2007 - Trend Micro Inc.
PASTPast
Patterns
![Page 10: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/10.jpg)
Trend Micro Enterprise Security
A Tightly Integrated
Offering of Content Security Products, Services, and Solutionsfor Enterprises Concerned about Staying Ahead of Content Security Threats
Lower your risk
ImmediateProtection
Lower your costs
LessComplexity
![Page 11: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/11.jpg)
Trend Micro Smart Protection Network
Enterprise Security Gets Smart
• Customers
• Partners
• TrendLabs Research,
Service & Support
• Samples
• Submissions
• Honeypots
• Web Crawling
EMAILREPUTATION
FILEREPUTATION
WEBREPUTATION
THREAT
Global Threat
Feedback
Each new reputation
check becomes part
of a feedback loop
Trend Micro Enterprise Security is powered by
Smart Protection Network• Web Crawling
• Feedback Loops
• Behavioral Analysis
ANALYSIS
Blocks All Components of an AttackSpam sources, embedded links, dangerous files,
and websites with malicious content
of a feedback loop
that automatically
updates databases
around the world.
![Page 12: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/12.jpg)
Changing
1
Smart
2 3
Agenda
3/19/2009 12 Classification
Changing Malware Market
Smart Protection Network
Benefits
![Page 13: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/13.jpg)
Threat AnalysisTrendLabs &
Malware Database
Threat Collection
• Customers
• Partners
• TrendLabs Research, Service & Support
• Samples
• Submissions
• Honeypots
• Web Crawling
• Feedback Loops
• Behavioral Analysis
Management
Email Reputation
IP
URL
WebReputation
Files
FileReputation
Threats
• 3.5 billion URL requests per day 20 million+ install base
99.9999%+ uptime
• 5 data center (US, EMEA, APAC) 1000 production servers
Cloud Client Security – The Smart Protection Network
Copyright 2007 - Trend Micro Inc.
Partners
• ISPs
• Routers
• Etc.
Endpoint
Gateway
SaaS/Managed
Cloud
Off Network
Messaging
Multi-Threat Correlation
![Page 14: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/14.jpg)
A compromised web siteOne click in a link.
Fake news by email.
A fake video
EMAILREPUTATION
WEBREPUTATION
FILEREPUTATION
How It Works
Copyright 2007 - Trend Micro Inc.Feb 2009
Internal -Confidential
A fake video
![Page 15: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/15.jpg)
Already Live
5 BillionQueries Handled Daily
1.2 TerabyteData Processed Daily
1,000 24/7
Copyright 2007 - Trend Micro Inc.
1,000Dedicated Content Security
Experts at TrendLabs
24/7Multiple Data Centers Operating
Around the World
50 MillionNew IP Addresses / URLs
Processed Daily
250 MillionMalware Samples Processed
Each Year
![Page 16: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/16.jpg)
Trend Micro Enterprise Security
Immediate Protection
WebSecurity
MessagingSecurity
Powered by
Smart
ProtectionNetwork
• Gateway
Web Security
• Hosted Email
Security
• Gateway Email
Security
• Mail Server
Security
• Email Encryption
EndpointSecurity
Network • Email Encryption
• IM Security
• SharePoint
Protection
• Client Security
• Server Security
• Data Leak Protection
• Mobile Security
Minimizes the Time to
Identify Risks and Create Protection
![Page 17: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/17.jpg)
Agenda
Changing
1
Smart
2 3
3/19/2009 17 Classification
Changing Malware Market
Smart Protection Network
Benefits
![Page 18: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/18.jpg)
Minimizes time to identify risks and create protection = Better Protection
Minimizes the time to acquire, deploy and manage solutions = Less Complexity
Hours until protection is in place
Reduced security management costs & improved savings on reduced productivity loss
Smart Protection Network: Benefits
Copyright 2009 - Trend Micro Inc.Feb 2009Internal -Confidential
Threat Detected
Protection updated
Cloud-ClientArchitecture
ConventionalContents Security
Threat Detected
Pattern file received
Pattern file deployed
Protection deployed
Hours until protection is in place
9
8
7
6
5
4
3
2
1
0
Correlation &CollaborationOf reputation(s)
AdvantageOf cloudpattern
The Impact of a Cloud-Client Solution
Respondents project significant savings:
�62% reduction in endpoint infections
�40% reduction in security management costs
�20% reduction in security breaches
Savings of Over
$60 / Employee
Savings of Over
$300K / Year
$60 / Employee
![Page 19: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/19.jpg)
Less Network Traffic Removes Pattern Monitoring/ Management
Reduce Bandwidth Costs Reduce Manpower & Support
Costs
Reducing Business Costs
Copyright 2009 - Trend Micro Inc.
Lightweight Clients, Less Memory
Protects Customers in Near Real Time
Reduce Hardware Costs Reduce Downtime Costs
![Page 20: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/20.jpg)
RiskProfile
Why Trend Micro for Your Enterprise
Content SecurityRisk/Cost
Risk Profile2008
Trend Micro Offers a
New Protection Paradigm
Trend Micro Enterprise Security
Defends Against Today’s Threats
Copyright 2009 - Trend Micro Inc.
2003
Profile
ThreatDetected
Pattern FileReceived
Pattern FileDeployed
Damage& Loss
Contained
Cost & EffortSaved by
TraditionalPattern FileApproach
ProtectionDeployed
Trend Micro Conventional Content Security
Time
![Page 21: Cloud-Client Security – The Smart Protection Network...Security Latency Impacts Risk Content Security Risk/Cost 2003 Risk Profile Risk Profile 2008 If you think your business is](https://reader030.fdocuments.in/reader030/viewer/2022041120/5f338faaf5411a1597690f5c/html5/thumbnails/21.jpg)
Thank You
Learn More:www.trendmicro.com/go/enterprise
TrendWatch http://itw.trendmicro.com/ > Technologies > SPN