SlideShare une entreprise Scribd logo
1  sur  91
Solution Readiness Support Training Trend Micro Worry-Free Business Module 2
Trend Micro Worry-Free Business Security Module 2 Marketing and Selling WFBS
WFBS New Starter Training Course Contents ,[object Object],[object Object],[object Object]
Trend Micro Worry-Free Business Security Chapter 1 Today’s Threats
You will be able to ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Malware Threat Describe different malware types and how they have evolved ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some definitions Virus  – Autonomous, malicious code, infects boot sector or files but cannot spread itself to another computer. Spreads manually via floppy disks, later by email or web download. Worm  – Autonomous, malicious code, spreads across the network via email, via network vulnerabilities Trojan –  Malicious code that poses as legitimate code to get the user to execute it.   Remote Access Trojan  – Malicious code which poses as legitimate code to gain access, then permits the operator to gain remote control of the victim’s computer BotClients/Zombies  – Malicious code which permits a victim’s computer to be controlled by an agent.  The agent makes is easy for the operator (called a bot herder) to manage and operate  Tens and Hundreds of Thousands  of clients Army of Darkness  – Collectively all of the zombies controlled by botherders
Web Threats are Increasing Dramatically ,[object Object]
Copyright 2008 - Trend Micro Inc. 04/27/08 5 Crimeware  is  Driving  Malware
What makes a bot a bot? © 2008 Craig A Schiller … botnet clients IRC protocol C&C 100 to 100000 Bot Bot Bot Bot Traditional Botnet In the original use of the term “Bot”,  the bot client contained malicious code that would retrieve and execute commands that were sent by the botherder.
Today‘s Infection Chain Infection Vector Malware Writer Criminals Spyware/Trojan Downloader Web Drive By Downloader Email Spam Port Scan Vulnerabilities Spam & Phishing Dedicated Denial of Service Data Leakage Adware/Clickware Recruitment Activities Wait for Instructions Get Updates from  Command & Control Fool the AV Host Management Host Infection HTTP IRC DNS Bot Herder Botnet Command & Controller
Understand the motivation of today’s malware writers
Describe an infection chain involving a botnet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Describe the impact of malware in business terms  ,[object Object]
List the things on your PC network you should protect
Providing Comprehensive Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outline a policy for protecting a business network
List the features that a good small–business anti-malware product should have ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Review Question 1.1 ,[object Object],[object Object]
Review Question 1.2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Review Question 1.3 ,[object Object],[object Object]
Review Question 1.4 ,[object Object],[object Object]
Review Question 1.5 ,[object Object],[object Object]
Review Question 1.6 ,[object Object],[object Object]
Review Question 1.7 ,[object Object],[object Object]
Review Question 1.8 ,[object Object],[object Object]
Review Answer 1.1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Review Answer 1.2 ,[object Object],[object Object],[object Object]
Review Answer 1.3 ,[object Object],[object Object],[object Object]
Review Answer 1.4 ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.publictechnology.net/content/698 http://threatinfo.trendmicro.com/vinfo/virusencyclo/default5.asp?VName= WORM_NETSKY.P&Vsect = T#email
Review Answer 1.5 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.workz.com/content/view_content.html?section_id =531&content_id=5453
Review Answer 1.6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.ixdownload.com/forums/security/834-how-spot-prevent-being-fooled-email-spam-malware-attacks.html
Review Answer 1.7 ,[object Object],A Policy is a  formal, brief, and high-level statement or plan that embraces an organization’s general beliefs, goals,  objectives, and acceptable procedures for a specified subject area. Policy attributes include the following: •  Require compliance (mandatory) •  Failure to comply results in disciplinary action •  Focus on desired results, not on means of implementation •  Further defined by standards and guidelines http://www.sans.org/reading_room/whitepapers/policyissues/developing-security-policies-protecting-corporate-assets_490 http://www.sans.org/security-resources/policies/Policy_Primer.pdf
Review Answer 1.8 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.malwarebytes.org/mbam.php
Exercise ,[object Object],[object Object],[object Object]
Trend Micro Worry-Free Business Security Chapter 2 Product Overview
You will be able to ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State the benefits of WFBS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State the benefits of WFBS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Explain how Worry Free provides protection against today's coordinated threats
Describe the Client/Server architecture of WFBS
Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating  Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat  Correlation
Describe the “Smart Protection Network”
Trend Micro Smart Protection Network Threat Collection Partners ,[object Object],[object Object],[object Object],Endpoint Gateway SaaS/Managed Cloud Management Off Network Messaging EMAIL REPUTATION WEB REPUTATION FILE REPUTATION Threats
Smart Protection Network  Correlation A compromised web site One click in a link. Fake news by email. TROJ_CHOST.E A fake video A lot can happen in a minute EMAIL REPUTATION WEB REPUTATION FILE REPUTATION
Smart Protection Network 06/17/11 Classification
Core Features of WFBS – Version 5.x onwards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Reputation Technology WEB REPUTATION
Behavior Monitoring
Other Features of WFBS – Version 5.x onwards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Features of WFBS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standard vs. Advanced Small and medium businesses with Microsoft desktops, laptops, file servers,  and SMTP / Exchange Mail servers or Small Business Servers, who also want extra in-the-cloud protection from spam using IMHS WFBS Advanced Small and medium businesses with Microsoft desktops, laptops, and file servers  WFBS Standard Protection Edition
WFBS Version 5 Onwards ,[object Object],[object Object],[object Object]
Core Features of WFBS – Version 6.x onwards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Worry-Free Small Business Solutions 06/17/11 Classification
Smart Scanning
URL Web Content Filtering
Smart Protection Network Integration and Feedback
Other Features of WFBS – Version 6.x onwards ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s new in Worry Free 6 Service Pack 3
Basic information Classification  06/17/11 ,[object Object],[object Object],[object Object],[object Object]
WFBS 6.0 SP3 Overview Classification  06/17/11 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Upgrade information Classification  06/17/11
SEG Patch Release/Notification Plan Classification  06/17/11 Critical Patch 1 Quarterly Patch 3~4 months One year Critical Patch 2 Critical Patch 3 Accumulate Patch 1 (with internal HF) 3~4 months Quarterly Patch 2 Accumulate Patch 2 (with internal HF)
SMTP authentication Classification  06/17/11
UNC path for RealTime Scan exclusion Classification  06/17/11
Tool to reset console password Classification  06/17/11
IIS and DB recreate tool Classification  06/17/11
Connection test tool Classification  06/17/11
Roaming mode in Client Package Classification  06/17/11
How to information and FAQ Classification  06/17/11
Information during installation Classification  06/17/11
Error message during remote installation  Classification  06/17/11 ,[object Object],[object Object],[object Object],[object Object]
Temp file change Classification  06/17/11
Review Question 2.1 ,[object Object],[object Object]
Review Question 2.2 Explain how Worry Free provides protection against today's coordinated threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],P ROTECTIO N  A. Virus/Malware. Virus, Trojans, Worms, Backdoors, and Rootkits Spyware/Grayware. Spyware, Dialers, Hacking tools, Password cracking applications, Adware, Joke programs, and Keyloggers B. Virus/Malware and Spyware/Grayware transmitted through email messages and spam C. Network Worms/Viruses D. Intrusions E. Conceivably harmful Web sites/Phishing sites F. Malicious behaviour G. Fake access points H. Explicit/restricted content in IM applications T HREA T
Review Question 2.3 ,[object Object],[object Object]
Review Question 2.4 Describe the Client/Server architecture of WFBS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],G A B C D E F Windows 2008 server Windows XP and Win 7 PCs Exchange Server
Review Question 2.5 ,[object Object],What are two key benefits of the Smart Protection Network?
Review Question 2.6 ,[object Object],A Protects users when working on the Internet B Protects users when working wirelessly C Protects users when working out of the office D Protects users against viruses regardless of location E Protects users when chatting F Protects users when doing online banking 1 Web reputation 4 Wi Fi Advisor 7 Location Awareness 2 Behaviour Monitoring 3 IM Protection 6 Smart and Conventional Scan 5 Transaction Protect
Review Question 2.7 ,[object Object],What’s the difference between URL filtering and Web Reputation
Review Answers 2.1 ,[object Object],Trend Micro Worry-Free Business Security Advanced (WFBS) protects small business users and assets from data theft, identity theft, risky Web sites, and spam. Powered by the Trend Micro™ Smart Protection Network, Worry-Free Business Security Advanced is: •  Safer :  Stops viruses, spyware, spam, and Web threats from reaching computers or servers. URL filtering blocks access to risky Web sites and helps improve user productivity. •  Smarter :  Fast scans and continuous updates prevent new threats, with minimal impact to users’ PCs. •  Simpler :  Easy to deploy and requiring zero administration, WFBS detects threats more effectively so that you can focus on business instead of security.
Review Answer 2.2 ,[object Object],A 2 B 1 C 3 D 8 E 4 F 5 G 7
Review Answer 2.3 ,[object Object],[object Object],[object Object]
Review Answer 2.4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],G A B C D E F Windows 2008 server Windows XP and Win 7 PCs Exchange Server
Review Answer 2.5 ,[object Object],What are two key benefits of the Smart Protection Network? Stronger, Faster Protection. Lighter on Your System Resources.   The Trend Micro Smart Protection Network lightens the demand on your system resources by leveraging cloud-based technology to block Web threats before they even reach you, providing stronger protection while reducing your reliance on time-consuming signature-downloads. Better Together Security.  The Trend Micro Smart Protection Network is constantly updated and strengthened as more users access the network, providing &quot;better together&quot; security. http://emea.trendmicro.com/emea/technology/smart-protection-network/key-benefits/
Review Answers 2.6 ,[object Object],A Protects users when working on the Internet B Protects users when working wirelessly C Protects users when working out of the office D Protects users against viruses regardless of location E Protects users when chatting F Protects users when doing online banking 1 Web reputation 3 IM Protection 7 Location Awareness 2 Behaviour Monitoring 4 Wi Fi Advisor 6 Smart and Conventional Scan 5 Transaction Protect
Review Answer 2.7 ,[object Object],What’s the difference between URL filtering and Web Reputation URL Filtering  WFBS 6.0’s URL Filtering feature lets administrators control access to websites based on their rating. Filter strength can be set to high, medium, low, or custom settings, and by business and leisure hours.  Web Threat Protection  Uses the latest Web Reputation technology to assess the security risk of all Web URL requests. Web Threat Protection stops malware real-time, at the source, before it can be downloaded from the Internet. Unique to Trend Micro.  5.1: Enhanced feedback loop mechanism for unknown Web threats, part of the Smart Protection Network.
Exercise ,[object Object],[object Object]
Module Review
Thank You

Contenu connexe

Tendances

The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threatsMartin Holovský
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 

Tendances (20)

Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Malware
MalwareMalware
Malware
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Botnet
BotnetBotnet
Botnet
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Policy report barrat &amp; associates ltd
Policy report  barrat &amp; associates ltdPolicy report  barrat &amp; associates ltd
Policy report barrat &amp; associates ltd
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 

En vedette

Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Report on JGSY-II Abhishek Singh 2001-2003
Report on JGSY-II Abhishek Singh 2001-2003Report on JGSY-II Abhishek Singh 2001-2003
Report on JGSY-II Abhishek Singh 2001-2003Abhishek Singh
 
Data protection & government schemes
Data protection & government schemesData protection & government schemes
Data protection & government schemesMathew Thomas
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsESET
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Symantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSymantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSalesChannel International
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionSymantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 

En vedette (20)

Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Report on JGSY-II Abhishek Singh 2001-2003
Report on JGSY-II Abhishek Singh 2001-2003Report on JGSY-II Abhishek Singh 2001-2003
Report on JGSY-II Abhishek Singh 2001-2003
 
Data protection & government schemes
Data protection & government schemesData protection & government schemes
Data protection & government schemes
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Symantec I3 Presentation
Symantec I3 PresentationSymantec I3 Presentation
Symantec I3 Presentation
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Symantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSymantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product Positioning
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 

Similaire à Mod2 wfbs new starter

Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 

Similaire à Mod2 wfbs new starter (20)

Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
185
185185
185
 
Malware
MalwareMalware
Malware
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Mod2 wfbs new starter

  • 1. Solution Readiness Support Training Trend Micro Worry-Free Business Module 2
  • 2. Trend Micro Worry-Free Business Security Module 2 Marketing and Selling WFBS
  • 3.
  • 4. Trend Micro Worry-Free Business Security Chapter 1 Today’s Threats
  • 5.
  • 6.
  • 7. Some definitions Virus – Autonomous, malicious code, infects boot sector or files but cannot spread itself to another computer. Spreads manually via floppy disks, later by email or web download. Worm – Autonomous, malicious code, spreads across the network via email, via network vulnerabilities Trojan – Malicious code that poses as legitimate code to get the user to execute it. Remote Access Trojan – Malicious code which poses as legitimate code to gain access, then permits the operator to gain remote control of the victim’s computer BotClients/Zombies – Malicious code which permits a victim’s computer to be controlled by an agent. The agent makes is easy for the operator (called a bot herder) to manage and operate Tens and Hundreds of Thousands of clients Army of Darkness – Collectively all of the zombies controlled by botherders
  • 8.
  • 9. Copyright 2008 - Trend Micro Inc. 04/27/08 5 Crimeware is Driving Malware
  • 10. What makes a bot a bot? © 2008 Craig A Schiller … botnet clients IRC protocol C&C 100 to 100000 Bot Bot Bot Bot Traditional Botnet In the original use of the term “Bot”, the bot client contained malicious code that would retrieve and execute commands that were sent by the botherder.
  • 11. Today‘s Infection Chain Infection Vector Malware Writer Criminals Spyware/Trojan Downloader Web Drive By Downloader Email Spam Port Scan Vulnerabilities Spam & Phishing Dedicated Denial of Service Data Leakage Adware/Clickware Recruitment Activities Wait for Instructions Get Updates from Command & Control Fool the AV Host Management Host Infection HTTP IRC DNS Bot Herder Botnet Command & Controller
  • 12. Understand the motivation of today’s malware writers
  • 13.
  • 14.
  • 15. List the things on your PC network you should protect
  • 16.
  • 17. Outline a policy for protecting a business network
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Trend Micro Worry-Free Business Security Chapter 2 Product Overview
  • 37.
  • 38.
  • 39.
  • 40. Explain how Worry Free provides protection against today's coordinated threats
  • 41. Describe the Client/Server architecture of WFBS
  • 42. Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat Correlation
  • 43. Describe the “Smart Protection Network”
  • 44.
  • 45. Smart Protection Network Correlation A compromised web site One click in a link. Fake news by email. TROJ_CHOST.E A fake video A lot can happen in a minute EMAIL REPUTATION WEB REPUTATION FILE REPUTATION
  • 46. Smart Protection Network 06/17/11 Classification
  • 47.
  • 48. Web Reputation Technology WEB REPUTATION
  • 50.
  • 51.
  • 52. Standard vs. Advanced Small and medium businesses with Microsoft desktops, laptops, file servers, and SMTP / Exchange Mail servers or Small Business Servers, who also want extra in-the-cloud protection from spam using IMHS WFBS Advanced Small and medium businesses with Microsoft desktops, laptops, and file servers WFBS Standard Protection Edition
  • 53.
  • 54.
  • 55. Worry-Free Small Business Solutions 06/17/11 Classification
  • 57. URL Web Content Filtering
  • 58. Smart Protection Network Integration and Feedback
  • 59.
  • 60. What’s new in Worry Free 6 Service Pack 3
  • 61.
  • 62.
  • 64. SEG Patch Release/Notification Plan Classification 06/17/11 Critical Patch 1 Quarterly Patch 3~4 months One year Critical Patch 2 Critical Patch 3 Accumulate Patch 1 (with internal HF) 3~4 months Quarterly Patch 2 Accumulate Patch 2 (with internal HF)
  • 66. UNC path for RealTime Scan exclusion Classification 06/17/11
  • 67. Tool to reset console password Classification 06/17/11
  • 68. IIS and DB recreate tool Classification 06/17/11
  • 69. Connection test tool Classification 06/17/11
  • 70. Roaming mode in Client Package Classification 06/17/11
  • 71. How to information and FAQ Classification 06/17/11
  • 72. Information during installation Classification 06/17/11
  • 73.
  • 74. Temp file change Classification 06/17/11
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.

Notes de l'éditeur

  1. Control Manager 3.5  2006 Trend Micro Incorporated
  2. Control Manager 3.5  2006 Trend Micro Incorporated This portion of today’s training will focus on Worry Free Business Security. We’ll highlight some of the new features of version 6, which was just released last June. Worry Free Business Security is made up of different parts: the Security Server, the Security Dashboard, the Client/Server Security Agents, and the Messaging Security Agent. We’ll talk about the different ways to deploy and install these parts, both the Security Server and the CSA. To get a better understanding of each component, we’ll perform an installation. First we’ll install the Security Server, and then install a CSA client that we can use as an example in our discussion. We’ll go over the major features of WFBS, and point out some of the Best Practices or settings that we recommend. We’ll go over a lot of the common tasks and questions you might face when you’re out in the field using WFBS.
  3. Zero-day Exploits Malware writers
  4. It is the web threats that are increasing rapidly. Just a few years ago, the prevalent threats arrived in the form of email. Users would unknowingly click on malicious attachments and execute a virus on their system. Now phishing attempts are more common. People are clicking on links in emails and downloading malware which opens a backdoor on a user PC for a bot to be isntalled. Nowadays, web threats are the most common.
  5. Traditionally hackers created malware for notoriety. They wanted the press to write about how good their code propagated and infected. Many of the threats weren’t done for malicious intent, but solely to see how good their code was. Today cybercrime is driving the creation of malware mainly because of the amount of money that is being made from it. Organized crime and regional cybergangs are turning this into an industry with an underground economy that is in the billions of dollars.
  6. The operation was launched in May 2009 after FBI agents in Omaha, Nebraska, began investigating a computer fraud case that involved 46 unauthorized payments made to different bank accounts across the country. This type of fraud is the trademark of the Zeus network. In a typical Zeus theft, the criminals hack into the victim&apos;s online bank account and then move money out using the banking system&apos;s automated clearing house (ACH) money transfer system. &amp;quot;The cyber thieves targeted small- to medium-sized companies, and individuals, infecting their computers using a version of the Zeus Botnet,&amp;quot; the FBI said Friday in a press release. &amp;quot;The malware captured passwords, account numbers, and other data used to log into online banking accounts.&amp;quot; According to the FBI, the scammers tried to steal $220 million in total, and actually managed to move $70 million offshore from the U.S. There were about 390 victims in the U.S., the FBI said.
  7. Zero-day Exploits Malware writers
  8. Zero-day Exploits Malware writers
  9. 1. Safer—Stops more threats from the web • Blocks increasing web threats and spam before they reach the business • URL filtering keeps employees safer and helps productivity by blocking risky or inappropriate websites 2. Smarter—Scans faster, provides more effective protection, with less impact on computers • Powered by the Trend Micro™ Smart Protection Network™, hosted technologies provide more effective protection with no maintenance or configuration needed • Using file reputation, Smart Scan stores detection technologies centrally, resulting in quicker updates and minimizing impact to PCs 3. Simpler—Easy-to-use, all-in-one solution protects small businesses • Single solution protects business assets and customer information from web threats and more • Easily manage security with an improved web-based “traffic light” console, or can also choose to manage via Microsoft Windows Essential Server consoles
  10. Trend Micro is already ahead of the competition today, we will move further ahead over the next few months Past – little malware, not strongly financially motivated, slowly changing pattern files Today – most vendors still running with pattern file architecture Networks becoming overloaded Machines slow to boot due to need to load pattern files into memory from disk Too much PC memory being consumed Next generation Trend Micro already has been building out/investing in this infrastructure for more than 3 years now Email reputation, web reputation, file reputation in the cloud Trend Micro has had ER and WR operational for several years FR infrastructure is already in place with End-Point functionality being beta tested for the past 6 months with commercially available solutions this Spring Cloud rapidly updated with new information End-Points will hold a small database of Cache of recent patterns (recent apps for instance) to reduce network traffic/latency Store of critical and recent patterns for offline protection
  11. Trend Micro’s approach is to use the power of the cloud. [Click to bring up Threat Collection] Trend Micro has a unique position in the security industry – having millions of sensors globally distributed feeding threat information back to our large network of threat collection systems. [Click to bring up ER, WR &amp; FR] Global Multi-Threat Detection Network Trend Micro maintains the world’s largest, most reliable email, file and web reputation databases with over a billion dynamically rated websites, files and spam sources used to block malicious emails, files and web threats. By combining messaging, file and web security businesses get the benefit of integrated threat intelligence across all three threat vectors.  And these reputation services are based on in-the-cloud technologies not static on-site updates. Thus, allowing users to always have access to the latest protection instantly – without having to wait for a signature update.  [Click to start arrows spinning] How Correlation Works Cybercriminals often use multiple threat vectors to propagate and manage their attacks. The Smart Protection Network correlates all three reputation databases, allowing us to source, analyze and provide protection against multiple components of an attack. Trend Micro is unique in owning all the security technology used in this collaboration process allowing us to effectively integrate feedback from our own anti-spam, anti-malware, webcrawlers, honeypots and other technologies. [Click to bring up lower half] Smart Protection Network is working already to protect customers from data theft and infection today with our endpoint, messaging and gateway products. Whether a user is on or off the network, they are protected immediately from new threats. We also secure some of our Alliance Partner products and finally we support easy management of all of our solutions. The result is real-time protection against the largest possible number of threats in the fastest possible time. Today we process over 5B requests through our 5 Global data centers daily.
  12. One of Trend Micro’s unique advantages is that we own all of the threat protection available with the smart protection network and our ability to correlate all threat information we receive. Let me explain how this works. [Click to bring up TrendLabs image] TrendLabs is host to over 1000 researchers and automated systems that analyze all the different threat information we receive. [Click 3x to bring up the 3 reputation images] The solutions to these threats are added to our multiple reputation databases. [Click to bring up rotating arrows] All of the threat information is correlated together since most threats today have multiple components to make up an entire threat. Let me give you an example of how this correlation works. [Click to bring up email message] Many threats first start out as a spam message from a botnet controlled by a cybercriminal. [Click to send email message to Email Reputation] Trend Micro’s first line of defense is to check our Email Reputation database to determine if this email is coming from a spam source and if so we will block it. But we don’t stop there. [Click to bring up embedded links] The email you may have noticed had some embedded links. Most spam today use embedded links to entice the user into clicking. [Click to show URLs] [Click to send links to Web Reputation database] We extract those embedded links and check them against our Web Reputation database to see if they are malicious or not. But we don’t just stop there. If we have not seen these links before we automatically start a web crawling process that analyzes every new URL we see. [Click to bring up file image] From this process we are able to source many new files that are downloaded from these web pages. [Click to send file image to File Reputation database] Anytime we detect a new file we check it against our File Reputation database to determine if it is malicious or not. If we have not seen a file before TrendLabs will analyze it to determine if it is good or bad and add it to our whitelist or blacklist (virus pattern) [Click to show Trojan image] In this example you’ll see we detected a Trojan. [Click to bring up notepad image] You’ll see that in analyzing this trojan file we are able to find new IPs and domains that the cybercriminal will be using in their attack. [Click to send image to web reputation] We extract this threat information and add them to our Web Reputation database to block any new attempts to access these IPs and domains that we know are malicious. [Click to bring up red circle] So as you can see, we are able through our analysis of each threat we can provide protection for all aspects of a threat, from email, to web to file and add protection for our customers using any of our solutions that support the Smart Protection Network. In today’s threat landscape, the attack process does not take long. Even one minute of being unprotected can compromise security and infect the user. [Click to start build process] Users today can be infected by a number of methods. One click on a link in an email, falling for a phishing email, clicking on a legitimate site that’s been compromised or even clicking on a video link can provide an avenue for cybercrimals to steal data. But with Trend Micro Smart Protection Network and our correlation process we’re able to identify and analyze all components of an attack and provide immediate protection to our customers wherever they connect. It’s security made smarter.
  13. Transaction Protector Browser plug-in tool that protects users against malicious hijacking activities when doing online transactions. Wireless Protection Wi-Fi Advisor plug-in protects against Evil Twin attacks and wireless access points being hacked maliciously. It provides security-level settings to support different encryption modes of on-corporate or off-corporate Wi-Fi users. TrendProtect When users browse the Web, plug-in warns users about potentially malicious and Phishing Web sites. Instant Messaging (IM) Protection Provides outbound content filtering protection and restriction of sensitive corporate data in the form of words or phrases being sent out through chat sessions. Plug-in Manager Facilitates the installation, deployment, and management of plug-in programs that enhance performance, add new features, and improve security. POP3 Anti-Spam protection Filters anti-spam emails for POP3 clients. This feature comes in a form of client toolbar plug-in and is compatible with the Outlook client. Worry-Free Remote Manager 1.6 5.1: Integrated install link for Worry-Free Remote Manager Agent 1.6, for multi-site management.
  14. The difference with the Advanced version of WFBS is that it comes with messaging protection. There is a messaging agent that protects the Exchange server, and a license to implement InterScan Messaging Hosted Security (IMHS) Standard version. IMHS Standard is a hosted messaging solution that will scan your inbound emails before they reach your network. This is done by redirecting your MX Record so that all email will first be intercepted by IMHS, scanned for viruses and spam, before they are forwarded to your network.
  15. [HIGHLIGHT WF SOLUTONS AND WHAT THEY PROTECT]
  16. Security Settings Import/Export Allows administrators to export settings for desktops and servers and then later import them for new desktops and servers. This feature helps automate and migrate network security settings between subnets on the LAN. USB Device Control A function of WFBS’s Behavior Monitoring feature, USB Device Control protects against malware that could potentially auto-install from a R/W USB device. Autorun files are intercepted and blocked and a popup warns the user the autorun has been denied. Users can choose to continue or prevent the install. Streamlined Dashboard WFBS 6.0’s Dashboard is now streamlined, for simpler oversight and management. Threat, System, and License Status panels can now be expanded or contracted, and a View Mode lets you filter the Live Status view by the type of status displayed. Administrators can also customize email notifications for the various types of Threat Events. Improved Quarantine Tool asier display and recovery of quarantined files. CSA backs up encrypted files into a CSA folder before the quarantined file is sent to Security Server. The VSEncrypt tool provides a GUI mode to restore the encrypted files to original file paths. Integrated Install for WFRM 2.1 Integrated install is provided for the Worry-Free Remote Manager Agent 2.1, for multi-site reseller management of WFBS and IMHS customers.
  17. Zero-day Exploits Malware writers
  18. Zero-day Exploits Malware writers
  19. Zero-day Exploits Malware writers
  20. Zero-day Exploits Malware writers
  21. Zero-day Exploits Malware writers
  22. Zero-day Exploits Malware writers