Smart, Data-Centric Security for the Post-PC Era
-
Upload
trend-micro-emea-limited -
Category
Technology
-
view
992 -
download
0
description
Transcript of Smart, Data-Centric Security for the Post-PC Era
![Page 1: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/1.jpg)
Copyright 2012 Trend Micro Inc.
Stephen FT Porter
Alliance & SI Business Manager
Simon Young
EMEA Alliances Director
Trend Micro Discussion
![Page 2: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/2.jpg)
Copyright 2012 Trend Micro Inc.
Product Approach Core Platform – Security Capabilities
Trend Micro Confidential 04/08/2023
2
EndpointPlatform
NetworkPlatform
Data CenterPlatform
ManagementPlatform
• Anti-Malware• Mobile• Data-Loss
Prevention• Encryption• SafeSync
• Anti-Malware• Data-Loss
Prevention• Application ID• Mobile• Web/DB
• Anti-Malware• IDS/IPS• File Integrity• Log Inspection• Data-Loss
Prevention• Encryption
• Policy• Reporting• Threat Intel• Dashboard• Configuration• Update
![Page 3: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/3.jpg)
Copyright 2012 Trend Micro Inc.
Virtual CloudPhysical
Trend is No.1 in Server and Virtualization Security
Trend Micro23.7%
Worldwide Endpoint SecurityRevenue Share by Vendor, 2010
Source: IDC, 2011
Trend Micro13%
Worldwide Endpoint SecurityRevenue Share by Vendor, 2010
Source: IDC, 2011
Source: 2011 Technavio – Global Virtualization Security Management
Solutions
![Page 4: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/4.jpg)
Copyright 2012 Trend Micro Inc.
Servers
Desktops
Stage 1Server Consolidation
Stage 2Expansion & Desktop
Virtualization Journey Stages
Stage 3Private > Public Cloud
15%
30%
70%
85%
Virtualizatio
n Adoption Rate
THE SECURITY INHIBITORSTO VIRTUALIZATION
![Page 5: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/5.jpg)
Copyright 2012 Trend Micro Inc.
The Ever-Changing Threat Landscape
2009
Global Threat Distributions
Based on estimations by a panel of experts within Trend Micro, 2012
2011 2013
![Page 6: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/6.jpg)
Copyright 2012 Trend Micro Inc.
AdvancedTargetedThreats
EmpoweredEmployees
Re-PerimeterizationVirtualization, Cloud Consumerization & Mobility
Outside-in Perimeter Defense Isn’t Enough…
Source: Forrester
![Page 7: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/7.jpg)
Copyright 2012 Trend Micro Inc.
Cloud Application
Consumerization and Mobility
Cloud Data
Cloud Era Revolution
Cloud Infrastructure
Hybrid Cloud Management• Physical • Virtual• Cloud
Technology Evolution
Customer Behaviour
Threat Landscape
Targeted AttackAPT
Cloud ComputingEndpoint Mobility
Data Risk /complianceManagement
![Page 8: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/8.jpg)
Copyright 2012 Trend Micro Inc.Cross-over year
The Enterprise Endpoint Evolution
9
Laptops/PCs
Mobile Devices/SaaS
Virtual
2011 3-5 Years
80%
20%
Total number of endpoints in an enterprise are rising,
driven primarily by consumerization
2013
EndPoint Management Driven
DataCenter Management Driven
15%
50%
35%
Vir
tua
lC
lou
dP
hys
ical
![Page 9: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/9.jpg)
Copyright 2012 Trend Micro Inc.10 Copyright 2011 Trend Micro Inc.
iPad
iPhone
Windows phone
• Challenges:– Manage mobile devices– Provide secure access to
applications and data– Defend against social media-
based attacks– Data protection for BYOIT
• 47%: Mobile workers who have a personally owned tablet that they use for at least some work
Consumerisation
![Page 10: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/10.jpg)
Copyright 2012 Trend Micro Inc.
Consumerization/BYOD
Control the Device
Secure the Data
Manage the Apps
Secure the App Data
Mobile DevicesIn the Enterprise
Hype Cycle
Enterprise(~2500+)
Mid-Market(~250-2500)
2012
Mobile Device Market
![Page 11: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/11.jpg)
Copyright 2012 Trend Micro Inc.
Manage Efficiently• Device Discovery• Device Enrollment• Device Provisioning• Asset Tracking• S/W Management• Remote Control
Secure the Devices• Anti-Malware• Firewall • Web Threat Protection • Email Security• Call/ SMS Anti-Spam• App Control/Lock-down
Protect the Data• Encryption• Remote Wipe• Remote Lock• SIM Change/ Watch• Feature Lock• Password Policy
Central Policy Management
Mobile Device Protection Requirements
![Page 12: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/12.jpg)
Copyright 2012 Trend Micro Inc.
Deep Security Virtual Appliance• Anti-malware• Integrity Monitoring• Firewall
Deep SecurityAn Agentless Security Environment
13
• Intrusion Prevention• Web App Protection• Application Control
VM VM VM
The Old Way
Security Virtual Appliance
VM VM VM
With Deep Security
VM
EasierManageability
HigherDensity
FewerResources
StrongerSecurity
VM
More VMs
![Page 13: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/13.jpg)
Copyright 2012 Trend Micro Inc.
VDI Example – Cost Breakdown
Classification 04/08/2023 14
1000 1250 875
2480 1160 928
1360 440 396
4840 2850 2199
STD VDI VDI+ Security
![Page 14: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/14.jpg)
Copyright 2012 Trend Micro Inc.
SecureCloud: Enterprise Controlled Data Protection for the Cloud
15
Enterprise Key
Hypervisor
VM
SharedStorage
Cloud Service ProviderEnterprise Datacenter or SaaS Offering
Trend MicroCloud Security
Console
CorporateApp
My Data
![Page 15: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/15.jpg)
Copyright 2012 Trend Micro Inc.
Test Test
Deep Security / Secure Cloud Example
Classification 04/08/2023 16
Vmware Vsphere ESX
CustomerCustomer
Customer 1 Customer 2
Unix/Win
Server
![Page 16: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/16.jpg)
Copyright 2012 Trend Micro Inc.
Dashboard (Threat Intelligence Map)
Classification 17
![Page 17: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/17.jpg)
Copyright 2012 Trend Micro Inc.04/08/2023 18
Corporate Network
Threat Discovery Appliance
Threat Intelligence ManagerControl Manager 3rd Party Products
Enterprise Security Manager
IxSVA
OSCE, DSM, IDF Servers
Trend Endpoints
• Risk Assessment
• Risk Mitigation
• Risk Escalation
• Configuration Management
• Update Management
• Log Management
• Alert Management
![Page 18: Smart, Data-Centric Security for the Post-PC Era](https://reader034.fdocuments.in/reader034/viewer/2022051816/546c21d6af795967298b4f11/html5/thumbnails/18.jpg)
Copyright 2012 Trend Micro Inc.
Q & A