SlideShare une entreprise Scribd logo
1  sur  67
Trend Micro
Corporate Overview
March, 2020
© 2020 Trend Micro Inc.3
DIGITAL
TRANSFORMATION
McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019
MANUFACTURING: Automation, robotics & AI
improve efficiencies & operations in unsafe working
environments: can reduce planned outages by 50%!
HEALTHCARE: Digitally-enabled tools for
diagnosis, treatment & management:
prevents up to 95% of adverse drug events!
FINANCIAL SERVICES: Mobile, blockchain & big data
AI drive customer engagement at a lower cost:
mobile payments will break $1T in 2019!
RETAIL: Omni-channel, IoT, augmented reality &
hyper-personalization drive customer experience
& revenue: in 5 years, 25% of malls will be gone!
© 2020 Trend Micro Inc.4
DIGITAL
TRANSFORMATION
Cloud,
Big data, AI, IoT,
Automation…
© 2020 Trend Micro Inc.5
Top 2 risk issues are organizational
misalignment and overall complexity
Lack of visibility and connectivity across
environments introduces significant risk
73% of organizations had at least one
data breach in 2019, 21% had 7 or more
DIGITAL
TRANSFORMATION
Cyber Risk Index
© 2020 Trend Micro Inc.6
Eva Chen, CEO & Co-founder
Trend Micro
• Cybersecurity focused for 30+ years
• Profitable since going public in 1998,
with over $1.5B in sales (FY2019)
• 500,000+ commercial customers
• 6700+ people passionate about
security across 65+ countries
A world safe for exchanging digital information
© 2020 Trend Micro Inc.7
Trend Micro instantly stops and gives us visibility on zero-
day attacks without us having to intervene, enabling our
small team to deal with protecting a complex environment
while delivering the right information for board-level
reporting and education.Pete Statia, InfoSec
“
“
© 2020 Trend Micro Inc.8
Extended network
and operational
technologies
Services moving to
the cloud, users
more mobile
Branch Office
Multi-cloud migration and
new cloud-native applications
© 2020 Trend Micro Inc.9
Data Center
Workloads
Cloud migration1
Workloads Workloads
Hybrid & multi-cloud
Evolving security processes
Windows relevance
Performance
Central visibility
IT & CLOUD OPS TEAMS
By 2021, over 75% of midsize & large organizations
will have adopted multi-cloud or hybrid IT strategy.
Gartner ; “5 Approaches to Cloud Applications Integration” | Smarter with Gartner | 14 May 2019
© 2020 Trend Micro Inc.10
Data Center
Workloads
Cloud migration1
Workloads Workloads
Ransomware
On-premises security controls, like IPS and
anti-malware, are often not optimized for
the scale and automation requirements of
the cloud, leaving security gaps
Unpatched OS
Unpatched OS
C&C communications
© 2020 Trend Micro Inc.11
Developers
Commit
Code
Repository
Push
Build
Automation
Build
Container Registry
Data Center
Workloads WorkloadsWorkloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Security causing delays
Automation in CI/CD pipeline
Too many tools
Heavy use of Linux
DEVOPS TEAMS
By 2022, 90% of software development
projects will claim to be following DevOps
practices, up from 40% in 2019.
Gartner; “Integrating Security Into the DevSecOps Toolchain” | 15 November 2019 |
G00377293 | Mark Horvath, Neil MacDonald
Cloud-native applications2
© 2020 Trend Micro Inc.12
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud-native applications2
Customer
Open to
malicious file
upload
Container image
vulnerabilities
Code
vulnerabilities
SQL injection3rd party app
vulnerability
Code re-use, DevOps and new
compute models like containers
and serverless expand your
attack surface
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.13
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Rapid growth in new cloud services
Learning curve for configuration
Many teams using cloud services
Lack of visibility
Proving compliance
CLOUD CENTERS OF EXCELLENCE
Through 2023, at least 99% of cloud
security failures will be the customer’s fault.
Gartner; ”Innovation Insight for Cloud Security Posture Management” | 25 January 2019 |
G00377795 | Neil MacDonald
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.14
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Cross-account
access to repository
Open to
Internet
Keys not rotated
frequently enough
Misconfigured cloud
formation templates
Explosion of new cloud services
creates a steep learning curve
resulting in misconfiguration
and vulnerabilities
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.15
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Container
security
File storage
security
Network
securityConformity
Workload
security
Application
security
Need optimized security
across the environment
to mitigate risk
Developers Code
Repository
Build
Automation
© 2020 Trend Micro Inc.17
• Flexible to secure your entire hybrid,
multi-cloud environment
• Automated so you can deliver
scalable security-as-code
• All-in-one solution minimizes
complexity with the right security
tools for all your cloud use cases
© 2020 Trend Micro Inc.18
Trend Micro has been named a
leader with highest score in
current offering and strategy
categories in The Forrester
Wave™: Cloud Workload
Security, Q4 2019
Source: The Forrester Wave™: Cloud Workload Security, Q4 2019
by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on
a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is
based on best available resources. Opinions reflect judgment at the time and are subject to change.
© 2020 Trend Micro Inc.19
8 of 8
Core Controls*
2019 Market Guide for
Cloud Workload Protection Platforms
Trend Micro’s assessment shows
that we deliver the most cloud
security controls and criteria. *
21 of 25
Additional Criteria*
*Based on Trend Micro’s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms;
8 April 2019 | G00356240 | Neil MacDonald.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its
research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartner’s research organization and shouldnot be
construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
© 2020 Trend Micro Inc.20
Source: IDC, Worldwide Software Defined Compute Workload
Security Market Shares, 2018 (DOC #US45638919, November 2019)
#1 market share
for Hybrid Cloud Workload
Security with 35.5%
© 2020 Trend Micro Inc.21
Mario Mendoza
Security Architecture
With Trend Micro’s SaaS-based cloud solution, PCI
compliance has moved from hours of work to a click of a
button. We not only get complete protection, but also time
savings for our team.
“ “
© 2020 Trend Micro Inc.22
Branch Office
© 2020 Trend Micro Inc.23
Wants fast detection & response on
endpoints
Visibility beyond the endpoint
(cross-layer)
SOC/IR TEAMS
Wants effective ransomware
protection
Less time re-imaging
IT OPS TEAMS (Endpoint & Email)
By 2025, cloud-delivered EPP solutions
will grow from 20% of new deals to 95%.
Gartner; “Magic Quadrant for Endpoint Protection Platforms” |
20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al.
By 2021, Gartner expects 70% of public & private
companies to be using cloud email services.
Gartner; “Market Guide for Email Security” | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
© 2020 Trend Micro Inc.24
S
Vulnerable
operating systems
Non-malware fraud (e.g. business email compromise,
credential compromise) focuses here, and 94% of
malware attacks arrive via email*.
*Verizon Data Breach Investigation Report, May 2019
Today’s attacks are stealthy
and often file-less, evading
outdated defenses.
It’s challenging to patch all
endpoints in a timely
fashion. New OS exploits
can spread quickly.
Attack starts with
spear-phishing
Employee tricked into
revealing credentials /
install malware
Lateral movement via
unpatched
vulnerabilities
Users vulnerable to
social engineering
Outdated
defenses
© 2020 Trend Micro Inc.25
Detection of malware,
phishing & fraud
(Office 365 / G Suite)
Modern Endpoint Protection
(advanced detection
techniques + built-in EDR)
Email security must not only
detect malware, but also the
latest social engineering attacks
with advanced features like
writing style analysis
Virtual patching blocks exploits
of unpatched operating system
vulnerabilities, buying time
ahead of patches
Modern endpoint security requires
pre-execution and runtime detection,
with ability to catch file-less threats
e.g. malicious PowerShell
© 2020 Trend Micro Inc.27
• Prevent the broadest range of
threats with the right technique, at
the right time
• Detect more, faster with integrated
detection and response across
endpoints and email
• Complete visibility for holistic
investigation and response
© 2020 Trend Micro Inc.28
Gartner Magic Quadrant for
Endpoint Protection Platforms
August 2019
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from http://www.gartner.com/reprints/trend-micro---
canada?id=1-1OEJAQ6E&ct=190819&st=sb
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner's research organization and should not be construed as statements of
fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
© 2020 Trend Micro Inc.29
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
THE FORRESTER WAVETM
Endpoint Security Suites
Q3 2019
www.trendmicro.com/en_ca/business/products/user
-protection.html?modal=rb-forrester-wave-endpoint-
see-how-07a253
© 2020 Trend Micro Inc.30
https://resources.trendmicro.com/Forrester-Wave-Email.html
THE FORRESTER WAVETM
Enterprise Email Security
Q2 2019
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
© 2020 Trend Micro Inc.31
Leon Backbier
ICT Manager
Trend Micro gives us an easy-to-deploy solution
for security and GDPR compliance, including
integrated management, visibility, and security that
has no performance impact on the endpoint.
“ “
© 2020 Trend Micro Inc.32
Branch Office
© 2020 Trend Micro Inc.33
Branch Office
Wants visibility and security
for the converging OT
environment, & expanding
cloud deployments.
NETWORK SECURITY TEAMS
Wants visibility to
network activity to
help detection &
response
SOC/IR TEAMS
By 2023, 30% of industrial enterprises will have
full, on-premises deployments of IIoT platforms,
up from 15% in 2019
Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019.
By 2021, 50% of all workloads will be run outside
the enterprise data center, either in cloud & data
center infrastructures or at the network edge.
Uptime Institute Annual Data Center Survey, 2019.
© 2020 Trend Micro Inc.34
Branch Office
Cloud deployments aren’t
protected by existing
network security
Unpatched OS & app
vulnerabilities in cloud
deployments
OT environments have wide variety
of device types and patching levels.
IT network security doesn’t fit OT.
Endpoint security & EDR
can’t see unprotected
endpoints / IT devices Unprotected contractor
endpoints
Vulnerable IT
and OT Devices
OS vulnerability
exploit
Compromised hosts
communicating with C&C
Outbound
C&C Traffic
OT exploit from
infected workloads
Contractor laptop as
initial attack vector
© 2020 Trend Micro Inc.35
Branch Office
Cloud IPS
IDS/IPS
Network Analytics
Specialized IDS/IPS
for OTVirtually patching against
exploits protects
unpatched endpoints
The network is the first
line of defense against
threats, and the only
defense for many devices
© 2020 Trend Micro Inc.37
• Wire-speed, network-layer protection
against against the broadest range of
threats
• Flexible network security that
seamlessly extends to the cloud and
OT environments
• Insightful to detect previously
unknown threats in your environment
and share that threat intelligence
with other security layers
© 2020 Trend Micro Inc.38
“Recommended”
Breach Detection System 5
5 Years in a Row and 98.7%
Detection Rate
“Recommended”
Data Center
Intrusion Prevention System
NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report
RECOMMENDED RECOMMENDED
© 2020 Trend Micro Inc.39
Claudia Anania
CIO
With visibility and protection across multiple
environments, we’ve been able to increase our speed
for incident response by 90%, while reducing our
effort for compliance reporting by 90%.
“ “
© 2020 Trend Micro Inc.40
Branch Office
© 2020 Trend Micro Inc.41
Branch Office
User behavior
Endpoint
Vulnerabilities
Social engineering
risk
Code from 3rd party
repositories
Network
vulnerabilities
Application
Vulnerabilities
Old operating
systems
Vulnerable OT
devices
MisconfigurationsRisks & vulnerabilities
across multiple
environments
© 2020 Trend Micro Inc.42
Branch Office
Wants fast detection &
response across
entire environment
SOC/IR TEAMS
88% of organizations will increase spending on
detection and response in the next 18 months to
address cross-layer visibility gaps.
ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
© 2020 Trend Micro Inc.43
Branch Office
Today, the SOC gets
siloed insight into
endpoints (EDR)…
…and limited visibility to
threats affecting cloud
workloads
…a separate siloed
view into network
events…
SOC / IR
Analyst
© 2020 Trend Micro Inc.44
SOC / IR
Analyst
Branch Office
Generating incomplete,
noisy SIEM alerts without
any context
© 2020 Trend Micro Inc.45
Spread to cloud
via compromised
credentials
Branch Office
SOC / IR
Analyst
Threat arrived via
email to another
endpoint
Additional apps
impacted
Spread from cloud to
OT infrastructure
There was more to the
story! It’s important to
see the whole picture.
© 2020 Trend Micro Inc.46
Branch Office
SOC / IR
Analyst
XDR breaks down the
silos and tells a story
instead of noise
XDR
© 2020 Trend Micro Inc.48
Branch Office
VISIBILITY, DETECTION
& RESPONSE (XDR)
© 2020 Trend Micro Inc.49
THE FORRESTER WAVETM
Enterprise Detection
and Response (EDR)
Q1 2020
https://resources.trendmicro.com/Forrester-Wave-EDR.html
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and
Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a
graphical representation of Forrester's call on a market and is plotted using a
detailed spreadsheet with exposed scores, weightings, and comments. Forrester
does not endorse any vendor, product, or service depicted in the Forrester Wave.
Information is based on best available resources. Opinions reflect judgment at the
time and are subject to change.
© 2020 Trend Micro Inc.50 Quotes need to be finalized
Trend Micro enabled me to reduce my breach risk across
ClubCorp AND save almost 30% off my cyber insurance
premiums based on the protection & visibility I now have.
Ed Martinez, CISO
“ “
© 2020 Trend Micro Inc.51
Why Trend Micro?
People, Research, Technology
© 2020 Trend Micro Inc.52
Every Trender is passionate about
making the world a safer and a
better place for everyone.
Donated $4.5M+ to those in
need, and built homes for
1800+ families
Educated 20,000+ small businesses,
1000+ university students, and
2.5M+ kids and families
Trained 300+ new cybersecurity
experts, and enhanced a culture of
diversity and inclusion
500,000+ commercial customers
and millions of consumers
protected
© 2020 Trend Micro Inc.53
Threats Vulnerabilities
& Exploits
Cybercriminal
Undergrounds
IoT OT / IIoTAI & ML Future Threat
Landscape
Targeted
Attacks
Trend Micro Core
Technology & Products
Responsible disclosure to
software/hardware vendors
Public/private partnerships
(e.g. law enforcement)
Threat intelligence and research for
consumers, businesses & governments
© 2020 Trend Micro Inc.54
Zero Day Initiative
• 3500+ independent
vulnerability researchers
• Discovered over half the
vulnerabilities in 2018
Source: IHS Markit, 2018 Public Vulnerability Market
Market Leader in Vulnerability Disclosure
52.3%
13.5%
12.4%
7.2%
5.3%
4.4%
1.8% 1.3%
0.8%
0.7%
0.4%
0.1%
Trend Micro
Cisco
Google
Check Point
Palo Alto
Secunia
Fortinet
iDefense
McAfee
Kaspersky Lab
CERT/CC
SecureAuth
© 2020 Trend Micro Inc.55
The Trusted Source For Law Enforcement
© 2020 Trend Micro Inc.56
VISIBILITY, DETECTION
& RESPONSE (XDR)
Technology Advantage:
Singular focus, years of expertise,
but we always anticipate and adapt
© 2020 Trend Micro Inc.57
Investigation & Response (XDR)
Custom Sandbox Analysis
Intrusion Prevention (IPS) & Firewall
Early Zero-Day Protection
Exploit Prevention & File/Web Reputation
Variant Protection
Application Control
Integrity Monitoring
Pre-execution Machine Learning
Behavioral Analysis
Runtime Machine Learning
Network Content Correlation
SMART
XGen
TM
Security Strategy Maximizes Protection
LEGEND
Known
Good Data
Known
Bad Data
Unknown
Data
Noise
Cancellation
Malicious files &
actions blocked
Safe files &
actions allowed
© 2020 Trend Micro Inc.58
OPTIMIZED
Minimizes IT impact
and operational
challenges
VISIBILITY, DETECTION
& RESPONSE (XDR)
© 2020 Trend Micro Inc.59
VISIBILITY, DETECTION
& RESPONSE (XDR)
CONNECTED
Speeds time to protect,
detect and respond
© 2020 Trend Micro Inc.60
Enable rapid response
through shared threat
intelligence and delivery of
real-time security updates
Detect advanced malware,
suspicious behavior and
communications invisible to
standard defenses
Assess potential
vulnerabilities and
proactively protect
endpoints, servers and
applications
PROTECT
DETECT
RESPOND
Gain holistic visibility, and
rapidly investigate and
respond to threats across
the environment
VISIBILITY, DETECTION
& RESPONSE (XDR)
Enabling Resilience with a Connected Threat Defense
© 2020 Trend Micro Inc.61
• Enable automated threat correlation and alerting on
high priority issues by processing massive amounts of
data in the cloud
• Continuous development and delivery of new
capabilities to solve your needs faster
• Simplify the purchase process with innovative, flexible
pricing aligned to the cloud
• Deliver security via SaaS, lowering operational impacts
and enabling you to focus on business-critical projects
Our Strategy: Cloud Excellence
© 2020 Trend Micro Inc.62
Trend Micro’s connected solutions enabled us to go from four
consoles to one with complete visibility, reducing our
operational workload while protecting us with ZERO breaches
since we deployed.Adrian Foo, IT Manager
“ “
© 2020 Trend Micro Inc.63
In this era of digital
transformation, we enable
organizations to be RESILIENT,
freeing them to go further
and do more.
Trend Micro deployment shifts over time—from
on-premises to SaaS-based solutions. Created
with real data by artist Stefanie Posavec.
© 2020 Trend Micro Inc.65
Extras
© 2020 Trend Micro Inc.66
9 of Top 10 Telecom
8 of Top 10 Petroleum
8 of Top 10 Healthcare
8 of Top 10 Automotive
7 of Top 10 Banking
© 2020 Trend Micro Inc.67
• 250M+ sensors globally
& threat telemetry from
500,000 commercial
customers
• Hundreds of researchers
across 15 global threat
centers
Global Threat Research
© 2020 Trend Micro Inc.68
Working with Industry Partners
© 2020 Trend Micro Inc.69
1990 2000 2010 2012 2014 2016 2018 2019
Gateway
scanning of
SMTP, HTTP, FTP
LAN security
for Microsoft
& Novell
Specialized
security
datacenter
servers
Optimized
security for
VMware
Optimized security
for Microsoft Azure
workloads
IoT Reputation
Service
Cloud workload
protection platform
with integrated
container security
XDR with endpoint,
email, servers, &
network combinedAI-based writing-style DNA
analysis for email fraud
Broadest cloud
security platform
as a serviceOptimized
security for
AWS workloads
2020
Specialized
IPS for OT
Continuous Industry Firsts
© 2020 Trend Micro Inc.70
FREE! Phishing Awareness Service
Send users a realistic
phishing campaign
Raise user awareness
with training
Analyze the results
https://phishinsight.trendmicro.com
© 2020 Trend Micro Inc.71
FREE Cyber Risk Awareness Tool
http://www.trendmicro.com/cyberrisk
Assess your organization’s cyber preparedness,
experience, and future outlook
© 2020 Trend Micro Inc.72
Free security assessment service that scans
O365 inboxes and endpoints to gauge the
overall security posture
A simple way for a security professional to:
• Check their O365 inboxes for undiscovered
email threats
• Check key endpoints for undiscovered
threats
• Review a final report in PDF form to share
with stakeholders outlining any threats
existing in their environments
Cybersecurity Assessment Service
https://assessment.xdr.trendmicro.com

Contenu connexe

Tendances

Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 

Tendances (20)

Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Building the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAseBuilding the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAse
 
How to Scale with Usage-Based Pricing with Kyle Poyar from OpenView
How to Scale with Usage-Based Pricing with Kyle Poyar from OpenViewHow to Scale with Usage-Based Pricing with Kyle Poyar from OpenView
How to Scale with Usage-Based Pricing with Kyle Poyar from OpenView
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 

Similaire à Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
 

Similaire à Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro (20)

The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
2019 Enterprise IT Predictions
2019 Enterprise IT Predictions2019 Enterprise IT Predictions
2019 Enterprise IT Predictions
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
The Future of Digital IAM
The Future of Digital IAMThe Future of Digital IAM
The Future of Digital IAM
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 

Plus de Prime Infoserv

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 

Plus de Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro

  • 2. © 2020 Trend Micro Inc.3 DIGITAL TRANSFORMATION McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019 MANUFACTURING: Automation, robotics & AI improve efficiencies & operations in unsafe working environments: can reduce planned outages by 50%! HEALTHCARE: Digitally-enabled tools for diagnosis, treatment & management: prevents up to 95% of adverse drug events! FINANCIAL SERVICES: Mobile, blockchain & big data AI drive customer engagement at a lower cost: mobile payments will break $1T in 2019! RETAIL: Omni-channel, IoT, augmented reality & hyper-personalization drive customer experience & revenue: in 5 years, 25% of malls will be gone!
  • 3. © 2020 Trend Micro Inc.4 DIGITAL TRANSFORMATION Cloud, Big data, AI, IoT, Automation…
  • 4. © 2020 Trend Micro Inc.5 Top 2 risk issues are organizational misalignment and overall complexity Lack of visibility and connectivity across environments introduces significant risk 73% of organizations had at least one data breach in 2019, 21% had 7 or more DIGITAL TRANSFORMATION Cyber Risk Index
  • 5. © 2020 Trend Micro Inc.6 Eva Chen, CEO & Co-founder Trend Micro • Cybersecurity focused for 30+ years • Profitable since going public in 1998, with over $1.5B in sales (FY2019) • 500,000+ commercial customers • 6700+ people passionate about security across 65+ countries A world safe for exchanging digital information
  • 6. © 2020 Trend Micro Inc.7 Trend Micro instantly stops and gives us visibility on zero- day attacks without us having to intervene, enabling our small team to deal with protecting a complex environment while delivering the right information for board-level reporting and education.Pete Statia, InfoSec “ “
  • 7. © 2020 Trend Micro Inc.8 Extended network and operational technologies Services moving to the cloud, users more mobile Branch Office Multi-cloud migration and new cloud-native applications
  • 8. © 2020 Trend Micro Inc.9 Data Center Workloads Cloud migration1 Workloads Workloads Hybrid & multi-cloud Evolving security processes Windows relevance Performance Central visibility IT & CLOUD OPS TEAMS By 2021, over 75% of midsize & large organizations will have adopted multi-cloud or hybrid IT strategy. Gartner ; “5 Approaches to Cloud Applications Integration” | Smarter with Gartner | 14 May 2019
  • 9. © 2020 Trend Micro Inc.10 Data Center Workloads Cloud migration1 Workloads Workloads Ransomware On-premises security controls, like IPS and anti-malware, are often not optimized for the scale and automation requirements of the cloud, leaving security gaps Unpatched OS Unpatched OS C&C communications
  • 10. © 2020 Trend Micro Inc.11 Developers Commit Code Repository Push Build Automation Build Container Registry Data Center Workloads WorkloadsWorkloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Security causing delays Automation in CI/CD pipeline Too many tools Heavy use of Linux DEVOPS TEAMS By 2022, 90% of software development projects will claim to be following DevOps practices, up from 40% in 2019. Gartner; “Integrating Security Into the DevSecOps Toolchain” | 15 November 2019 | G00377293 | Mark Horvath, Neil MacDonald Cloud-native applications2
  • 11. © 2020 Trend Micro Inc.12 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud-native applications2 Customer Open to malicious file upload Container image vulnerabilities Code vulnerabilities SQL injection3rd party app vulnerability Code re-use, DevOps and new compute models like containers and serverless expand your attack surface Developers Code Repository Build Automation
  • 12. © 2020 Trend Micro Inc.13 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Rapid growth in new cloud services Learning curve for configuration Many teams using cloud services Lack of visibility Proving compliance CLOUD CENTERS OF EXCELLENCE Through 2023, at least 99% of cloud security failures will be the customer’s fault. Gartner; ”Innovation Insight for Cloud Security Posture Management” | 25 January 2019 | G00377795 | Neil MacDonald Developers Code Repository Build Automation
  • 13. © 2020 Trend Micro Inc.14 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Cloud operational excellence3 Cross-account access to repository Open to Internet Keys not rotated frequently enough Misconfigured cloud formation templates Explosion of new cloud services creates a steep learning curve resulting in misconfiguration and vulnerabilities Developers Code Repository Build Automation
  • 14. © 2020 Trend Micro Inc.15 Commit PushBuild Container Registry Data Center Workloads File Storage Container Services Serverless Orchestration Machine Learning EncryptionMonitoring Container security File storage security Network securityConformity Workload security Application security Need optimized security across the environment to mitigate risk Developers Code Repository Build Automation
  • 15. © 2020 Trend Micro Inc.17 • Flexible to secure your entire hybrid, multi-cloud environment • Automated so you can deliver scalable security-as-code • All-in-one solution minimizes complexity with the right security tools for all your cloud use cases
  • 16. © 2020 Trend Micro Inc.18 Trend Micro has been named a leader with highest score in current offering and strategy categories in The Forrester Wave™: Cloud Workload Security, Q4 2019 Source: The Forrester Wave™: Cloud Workload Security, Q4 2019 by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 17. © 2020 Trend Micro Inc.19 8 of 8 Core Controls* 2019 Market Guide for Cloud Workload Protection Platforms Trend Micro’s assessment shows that we deliver the most cloud security controls and criteria. * 21 of 25 Additional Criteria* *Based on Trend Micro’s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms; 8 April 2019 | G00356240 | Neil MacDonald. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartner’s research organization and shouldnot be construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
  • 18. © 2020 Trend Micro Inc.20 Source: IDC, Worldwide Software Defined Compute Workload Security Market Shares, 2018 (DOC #US45638919, November 2019) #1 market share for Hybrid Cloud Workload Security with 35.5%
  • 19. © 2020 Trend Micro Inc.21 Mario Mendoza Security Architecture With Trend Micro’s SaaS-based cloud solution, PCI compliance has moved from hours of work to a click of a button. We not only get complete protection, but also time savings for our team. “ “
  • 20. © 2020 Trend Micro Inc.22 Branch Office
  • 21. © 2020 Trend Micro Inc.23 Wants fast detection & response on endpoints Visibility beyond the endpoint (cross-layer) SOC/IR TEAMS Wants effective ransomware protection Less time re-imaging IT OPS TEAMS (Endpoint & Email) By 2025, cloud-delivered EPP solutions will grow from 20% of new deals to 95%. Gartner; “Magic Quadrant for Endpoint Protection Platforms” | 20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al. By 2021, Gartner expects 70% of public & private companies to be using cloud email services. Gartner; “Market Guide for Email Security” | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
  • 22. © 2020 Trend Micro Inc.24 S Vulnerable operating systems Non-malware fraud (e.g. business email compromise, credential compromise) focuses here, and 94% of malware attacks arrive via email*. *Verizon Data Breach Investigation Report, May 2019 Today’s attacks are stealthy and often file-less, evading outdated defenses. It’s challenging to patch all endpoints in a timely fashion. New OS exploits can spread quickly. Attack starts with spear-phishing Employee tricked into revealing credentials / install malware Lateral movement via unpatched vulnerabilities Users vulnerable to social engineering Outdated defenses
  • 23. © 2020 Trend Micro Inc.25 Detection of malware, phishing & fraud (Office 365 / G Suite) Modern Endpoint Protection (advanced detection techniques + built-in EDR) Email security must not only detect malware, but also the latest social engineering attacks with advanced features like writing style analysis Virtual patching blocks exploits of unpatched operating system vulnerabilities, buying time ahead of patches Modern endpoint security requires pre-execution and runtime detection, with ability to catch file-less threats e.g. malicious PowerShell
  • 24. © 2020 Trend Micro Inc.27 • Prevent the broadest range of threats with the right technique, at the right time • Detect more, faster with integrated detection and response across endpoints and email • Complete visibility for holistic investigation and response
  • 25. © 2020 Trend Micro Inc.28 Gartner Magic Quadrant for Endpoint Protection Platforms August 2019 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/reprints/trend-micro--- canada?id=1-1OEJAQ6E&ct=190819&st=sb Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 26. © 2020 Trend Micro Inc.29 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. THE FORRESTER WAVETM Endpoint Security Suites Q3 2019 www.trendmicro.com/en_ca/business/products/user -protection.html?modal=rb-forrester-wave-endpoint- see-how-07a253
  • 27. © 2020 Trend Micro Inc.30 https://resources.trendmicro.com/Forrester-Wave-Email.html THE FORRESTER WAVETM Enterprise Email Security Q2 2019 The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 28. © 2020 Trend Micro Inc.31 Leon Backbier ICT Manager Trend Micro gives us an easy-to-deploy solution for security and GDPR compliance, including integrated management, visibility, and security that has no performance impact on the endpoint. “ “
  • 29. © 2020 Trend Micro Inc.32 Branch Office
  • 30. © 2020 Trend Micro Inc.33 Branch Office Wants visibility and security for the converging OT environment, & expanding cloud deployments. NETWORK SECURITY TEAMS Wants visibility to network activity to help detection & response SOC/IR TEAMS By 2023, 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms, up from 15% in 2019 Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019. By 2021, 50% of all workloads will be run outside the enterprise data center, either in cloud & data center infrastructures or at the network edge. Uptime Institute Annual Data Center Survey, 2019.
  • 31. © 2020 Trend Micro Inc.34 Branch Office Cloud deployments aren’t protected by existing network security Unpatched OS & app vulnerabilities in cloud deployments OT environments have wide variety of device types and patching levels. IT network security doesn’t fit OT. Endpoint security & EDR can’t see unprotected endpoints / IT devices Unprotected contractor endpoints Vulnerable IT and OT Devices OS vulnerability exploit Compromised hosts communicating with C&C Outbound C&C Traffic OT exploit from infected workloads Contractor laptop as initial attack vector
  • 32. © 2020 Trend Micro Inc.35 Branch Office Cloud IPS IDS/IPS Network Analytics Specialized IDS/IPS for OTVirtually patching against exploits protects unpatched endpoints The network is the first line of defense against threats, and the only defense for many devices
  • 33. © 2020 Trend Micro Inc.37 • Wire-speed, network-layer protection against against the broadest range of threats • Flexible network security that seamlessly extends to the cloud and OT environments • Insightful to detect previously unknown threats in your environment and share that threat intelligence with other security layers
  • 34. © 2020 Trend Micro Inc.38 “Recommended” Breach Detection System 5 5 Years in a Row and 98.7% Detection Rate “Recommended” Data Center Intrusion Prevention System NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report RECOMMENDED RECOMMENDED
  • 35. © 2020 Trend Micro Inc.39 Claudia Anania CIO With visibility and protection across multiple environments, we’ve been able to increase our speed for incident response by 90%, while reducing our effort for compliance reporting by 90%. “ “
  • 36. © 2020 Trend Micro Inc.40 Branch Office
  • 37. © 2020 Trend Micro Inc.41 Branch Office User behavior Endpoint Vulnerabilities Social engineering risk Code from 3rd party repositories Network vulnerabilities Application Vulnerabilities Old operating systems Vulnerable OT devices MisconfigurationsRisks & vulnerabilities across multiple environments
  • 38. © 2020 Trend Micro Inc.42 Branch Office Wants fast detection & response across entire environment SOC/IR TEAMS 88% of organizations will increase spending on detection and response in the next 18 months to address cross-layer visibility gaps. ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
  • 39. © 2020 Trend Micro Inc.43 Branch Office Today, the SOC gets siloed insight into endpoints (EDR)… …and limited visibility to threats affecting cloud workloads …a separate siloed view into network events… SOC / IR Analyst
  • 40. © 2020 Trend Micro Inc.44 SOC / IR Analyst Branch Office Generating incomplete, noisy SIEM alerts without any context
  • 41. © 2020 Trend Micro Inc.45 Spread to cloud via compromised credentials Branch Office SOC / IR Analyst Threat arrived via email to another endpoint Additional apps impacted Spread from cloud to OT infrastructure There was more to the story! It’s important to see the whole picture.
  • 42. © 2020 Trend Micro Inc.46 Branch Office SOC / IR Analyst XDR breaks down the silos and tells a story instead of noise XDR
  • 43. © 2020 Trend Micro Inc.48 Branch Office VISIBILITY, DETECTION & RESPONSE (XDR)
  • 44. © 2020 Trend Micro Inc.49 THE FORRESTER WAVETM Enterprise Detection and Response (EDR) Q1 2020 https://resources.trendmicro.com/Forrester-Wave-EDR.html The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 45. © 2020 Trend Micro Inc.50 Quotes need to be finalized Trend Micro enabled me to reduce my breach risk across ClubCorp AND save almost 30% off my cyber insurance premiums based on the protection & visibility I now have. Ed Martinez, CISO “ “
  • 46. © 2020 Trend Micro Inc.51 Why Trend Micro? People, Research, Technology
  • 47. © 2020 Trend Micro Inc.52 Every Trender is passionate about making the world a safer and a better place for everyone. Donated $4.5M+ to those in need, and built homes for 1800+ families Educated 20,000+ small businesses, 1000+ university students, and 2.5M+ kids and families Trained 300+ new cybersecurity experts, and enhanced a culture of diversity and inclusion 500,000+ commercial customers and millions of consumers protected
  • 48. © 2020 Trend Micro Inc.53 Threats Vulnerabilities & Exploits Cybercriminal Undergrounds IoT OT / IIoTAI & ML Future Threat Landscape Targeted Attacks Trend Micro Core Technology & Products Responsible disclosure to software/hardware vendors Public/private partnerships (e.g. law enforcement) Threat intelligence and research for consumers, businesses & governments
  • 49. © 2020 Trend Micro Inc.54 Zero Day Initiative • 3500+ independent vulnerability researchers • Discovered over half the vulnerabilities in 2018 Source: IHS Markit, 2018 Public Vulnerability Market Market Leader in Vulnerability Disclosure 52.3% 13.5% 12.4% 7.2% 5.3% 4.4% 1.8% 1.3% 0.8% 0.7% 0.4% 0.1% Trend Micro Cisco Google Check Point Palo Alto Secunia Fortinet iDefense McAfee Kaspersky Lab CERT/CC SecureAuth
  • 50. © 2020 Trend Micro Inc.55 The Trusted Source For Law Enforcement
  • 51. © 2020 Trend Micro Inc.56 VISIBILITY, DETECTION & RESPONSE (XDR) Technology Advantage: Singular focus, years of expertise, but we always anticipate and adapt
  • 52. © 2020 Trend Micro Inc.57 Investigation & Response (XDR) Custom Sandbox Analysis Intrusion Prevention (IPS) & Firewall Early Zero-Day Protection Exploit Prevention & File/Web Reputation Variant Protection Application Control Integrity Monitoring Pre-execution Machine Learning Behavioral Analysis Runtime Machine Learning Network Content Correlation SMART XGen TM Security Strategy Maximizes Protection LEGEND Known Good Data Known Bad Data Unknown Data Noise Cancellation Malicious files & actions blocked Safe files & actions allowed
  • 53. © 2020 Trend Micro Inc.58 OPTIMIZED Minimizes IT impact and operational challenges VISIBILITY, DETECTION & RESPONSE (XDR)
  • 54. © 2020 Trend Micro Inc.59 VISIBILITY, DETECTION & RESPONSE (XDR) CONNECTED Speeds time to protect, detect and respond
  • 55. © 2020 Trend Micro Inc.60 Enable rapid response through shared threat intelligence and delivery of real-time security updates Detect advanced malware, suspicious behavior and communications invisible to standard defenses Assess potential vulnerabilities and proactively protect endpoints, servers and applications PROTECT DETECT RESPOND Gain holistic visibility, and rapidly investigate and respond to threats across the environment VISIBILITY, DETECTION & RESPONSE (XDR) Enabling Resilience with a Connected Threat Defense
  • 56. © 2020 Trend Micro Inc.61 • Enable automated threat correlation and alerting on high priority issues by processing massive amounts of data in the cloud • Continuous development and delivery of new capabilities to solve your needs faster • Simplify the purchase process with innovative, flexible pricing aligned to the cloud • Deliver security via SaaS, lowering operational impacts and enabling you to focus on business-critical projects Our Strategy: Cloud Excellence
  • 57. © 2020 Trend Micro Inc.62 Trend Micro’s connected solutions enabled us to go from four consoles to one with complete visibility, reducing our operational workload while protecting us with ZERO breaches since we deployed.Adrian Foo, IT Manager “ “
  • 58. © 2020 Trend Micro Inc.63 In this era of digital transformation, we enable organizations to be RESILIENT, freeing them to go further and do more.
  • 59. Trend Micro deployment shifts over time—from on-premises to SaaS-based solutions. Created with real data by artist Stefanie Posavec.
  • 60. © 2020 Trend Micro Inc.65 Extras
  • 61. © 2020 Trend Micro Inc.66 9 of Top 10 Telecom 8 of Top 10 Petroleum 8 of Top 10 Healthcare 8 of Top 10 Automotive 7 of Top 10 Banking
  • 62. © 2020 Trend Micro Inc.67 • 250M+ sensors globally & threat telemetry from 500,000 commercial customers • Hundreds of researchers across 15 global threat centers Global Threat Research
  • 63. © 2020 Trend Micro Inc.68 Working with Industry Partners
  • 64. © 2020 Trend Micro Inc.69 1990 2000 2010 2012 2014 2016 2018 2019 Gateway scanning of SMTP, HTTP, FTP LAN security for Microsoft & Novell Specialized security datacenter servers Optimized security for VMware Optimized security for Microsoft Azure workloads IoT Reputation Service Cloud workload protection platform with integrated container security XDR with endpoint, email, servers, & network combinedAI-based writing-style DNA analysis for email fraud Broadest cloud security platform as a serviceOptimized security for AWS workloads 2020 Specialized IPS for OT Continuous Industry Firsts
  • 65. © 2020 Trend Micro Inc.70 FREE! Phishing Awareness Service Send users a realistic phishing campaign Raise user awareness with training Analyze the results https://phishinsight.trendmicro.com
  • 66. © 2020 Trend Micro Inc.71 FREE Cyber Risk Awareness Tool http://www.trendmicro.com/cyberrisk Assess your organization’s cyber preparedness, experience, and future outlook
  • 67. © 2020 Trend Micro Inc.72 Free security assessment service that scans O365 inboxes and endpoints to gauge the overall security posture A simple way for a security professional to: • Check their O365 inboxes for undiscovered email threats • Check key endpoints for undiscovered threats • Review a final report in PDF form to share with stakeholders outlining any threats existing in their environments Cybersecurity Assessment Service https://assessment.xdr.trendmicro.com