Contenu connexe Similaire à Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro (20) Plus de Prime Infoserv (20) Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro2. © 2020 Trend Micro Inc.3
DIGITAL
TRANSFORMATION
McKinsey, 2019 IBM, 2019Forbes, 2018Sources: Statista, 2019
MANUFACTURING: Automation, robotics & AI
improve efficiencies & operations in unsafe working
environments: can reduce planned outages by 50%!
HEALTHCARE: Digitally-enabled tools for
diagnosis, treatment & management:
prevents up to 95% of adverse drug events!
FINANCIAL SERVICES: Mobile, blockchain & big data
AI drive customer engagement at a lower cost:
mobile payments will break $1T in 2019!
RETAIL: Omni-channel, IoT, augmented reality &
hyper-personalization drive customer experience
& revenue: in 5 years, 25% of malls will be gone!
3. © 2020 Trend Micro Inc.4
DIGITAL
TRANSFORMATION
Cloud,
Big data, AI, IoT,
Automation…
4. © 2020 Trend Micro Inc.5
Top 2 risk issues are organizational
misalignment and overall complexity
Lack of visibility and connectivity across
environments introduces significant risk
73% of organizations had at least one
data breach in 2019, 21% had 7 or more
DIGITAL
TRANSFORMATION
Cyber Risk Index
5. © 2020 Trend Micro Inc.6
Eva Chen, CEO & Co-founder
Trend Micro
• Cybersecurity focused for 30+ years
• Profitable since going public in 1998,
with over $1.5B in sales (FY2019)
• 500,000+ commercial customers
• 6700+ people passionate about
security across 65+ countries
A world safe for exchanging digital information
6. © 2020 Trend Micro Inc.7
Trend Micro instantly stops and gives us visibility on zero-
day attacks without us having to intervene, enabling our
small team to deal with protecting a complex environment
while delivering the right information for board-level
reporting and education.Pete Statia, InfoSec
“
“
7. © 2020 Trend Micro Inc.8
Extended network
and operational
technologies
Services moving to
the cloud, users
more mobile
Branch Office
Multi-cloud migration and
new cloud-native applications
8. © 2020 Trend Micro Inc.9
Data Center
Workloads
Cloud migration1
Workloads Workloads
Hybrid & multi-cloud
Evolving security processes
Windows relevance
Performance
Central visibility
IT & CLOUD OPS TEAMS
By 2021, over 75% of midsize & large organizations
will have adopted multi-cloud or hybrid IT strategy.
Gartner ; “5 Approaches to Cloud Applications Integration” | Smarter with Gartner | 14 May 2019
9. © 2020 Trend Micro Inc.10
Data Center
Workloads
Cloud migration1
Workloads Workloads
Ransomware
On-premises security controls, like IPS and
anti-malware, are often not optimized for
the scale and automation requirements of
the cloud, leaving security gaps
Unpatched OS
Unpatched OS
C&C communications
10. © 2020 Trend Micro Inc.11
Developers
Commit
Code
Repository
Push
Build
Automation
Build
Container Registry
Data Center
Workloads WorkloadsWorkloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Security causing delays
Automation in CI/CD pipeline
Too many tools
Heavy use of Linux
DEVOPS TEAMS
By 2022, 90% of software development
projects will claim to be following DevOps
practices, up from 40% in 2019.
Gartner; “Integrating Security Into the DevSecOps Toolchain” | 15 November 2019 |
G00377293 | Mark Horvath, Neil MacDonald
Cloud-native applications2
11. © 2020 Trend Micro Inc.12
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud-native applications2
Customer
Open to
malicious file
upload
Container image
vulnerabilities
Code
vulnerabilities
SQL injection3rd party app
vulnerability
Code re-use, DevOps and new
compute models like containers
and serverless expand your
attack surface
Developers Code
Repository
Build
Automation
12. © 2020 Trend Micro Inc.13
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Rapid growth in new cloud services
Learning curve for configuration
Many teams using cloud services
Lack of visibility
Proving compliance
CLOUD CENTERS OF EXCELLENCE
Through 2023, at least 99% of cloud
security failures will be the customer’s fault.
Gartner; ”Innovation Insight for Cloud Security Posture Management” | 25 January 2019 |
G00377795 | Neil MacDonald
Developers Code
Repository
Build
Automation
13. © 2020 Trend Micro Inc.14
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Cloud operational excellence3
Cross-account
access to repository
Open to
Internet
Keys not rotated
frequently enough
Misconfigured cloud
formation templates
Explosion of new cloud services
creates a steep learning curve
resulting in misconfiguration
and vulnerabilities
Developers Code
Repository
Build
Automation
14. © 2020 Trend Micro Inc.15
Commit PushBuild
Container Registry
Data Center
Workloads File Storage
Container
Services
Serverless
Orchestration
Machine
Learning
EncryptionMonitoring
Container
security
File storage
security
Network
securityConformity
Workload
security
Application
security
Need optimized security
across the environment
to mitigate risk
Developers Code
Repository
Build
Automation
15. © 2020 Trend Micro Inc.17
• Flexible to secure your entire hybrid,
multi-cloud environment
• Automated so you can deliver
scalable security-as-code
• All-in-one solution minimizes
complexity with the right security
tools for all your cloud use cases
16. © 2020 Trend Micro Inc.18
Trend Micro has been named a
leader with highest score in
current offering and strategy
categories in The Forrester
Wave™: Cloud Workload
Security, Q4 2019
Source: The Forrester Wave™: Cloud Workload Security, Q4 2019
by Andras Cser with Merritt Maxim, Matthew Flug, and Peggy Dostie
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on
a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is
based on best available resources. Opinions reflect judgment at the time and are subject to change.
17. © 2020 Trend Micro Inc.19
8 of 8
Core Controls*
2019 Market Guide for
Cloud Workload Protection Platforms
Trend Micro’s assessment shows
that we deliver the most cloud
security controls and criteria. *
21 of 25
Additional Criteria*
*Based on Trend Micro’s assessment of Gartner 2019 Market Guide for Cloud Workload Protection Platforms;
8 April 2019 | G00356240 | Neil MacDonald.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally,and is used herein with permission.All rights reserved. Gartner does not endorse any vendor, product or service depictedin its
research publications,and does not advise technology users to select only those vendors with the highest ratings or other designation.Gartner research publicationsconsist of the opinionsof Gartner’s research organization and shouldnot be
construed as statements of fact. Gartner disclaimsall warranties, express or implied,with respect to this research, including anywarranties of merchantabilityor fitness for a particularpurpose.
18. © 2020 Trend Micro Inc.20
Source: IDC, Worldwide Software Defined Compute Workload
Security Market Shares, 2018 (DOC #US45638919, November 2019)
#1 market share
for Hybrid Cloud Workload
Security with 35.5%
19. © 2020 Trend Micro Inc.21
Mario Mendoza
Security Architecture
With Trend Micro’s SaaS-based cloud solution, PCI
compliance has moved from hours of work to a click of a
button. We not only get complete protection, but also time
savings for our team.
“ “
21. © 2020 Trend Micro Inc.23
Wants fast detection & response on
endpoints
Visibility beyond the endpoint
(cross-layer)
SOC/IR TEAMS
Wants effective ransomware
protection
Less time re-imaging
IT OPS TEAMS (Endpoint & Email)
By 2025, cloud-delivered EPP solutions
will grow from 20% of new deals to 95%.
Gartner; “Magic Quadrant for Endpoint Protection Platforms” |
20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al.
By 2021, Gartner expects 70% of public & private
companies to be using cloud email services.
Gartner; “Market Guide for Email Security” | 6 June 2019 | G00400856 | Neil Wynne, Peter Firstbrook
22. © 2020 Trend Micro Inc.24
S
Vulnerable
operating systems
Non-malware fraud (e.g. business email compromise,
credential compromise) focuses here, and 94% of
malware attacks arrive via email*.
*Verizon Data Breach Investigation Report, May 2019
Today’s attacks are stealthy
and often file-less, evading
outdated defenses.
It’s challenging to patch all
endpoints in a timely
fashion. New OS exploits
can spread quickly.
Attack starts with
spear-phishing
Employee tricked into
revealing credentials /
install malware
Lateral movement via
unpatched
vulnerabilities
Users vulnerable to
social engineering
Outdated
defenses
23. © 2020 Trend Micro Inc.25
Detection of malware,
phishing & fraud
(Office 365 / G Suite)
Modern Endpoint Protection
(advanced detection
techniques + built-in EDR)
Email security must not only
detect malware, but also the
latest social engineering attacks
with advanced features like
writing style analysis
Virtual patching blocks exploits
of unpatched operating system
vulnerabilities, buying time
ahead of patches
Modern endpoint security requires
pre-execution and runtime detection,
with ability to catch file-less threats
e.g. malicious PowerShell
24. © 2020 Trend Micro Inc.27
• Prevent the broadest range of
threats with the right technique, at
the right time
• Detect more, faster with integrated
detection and response across
endpoints and email
• Complete visibility for holistic
investigation and response
25. © 2020 Trend Micro Inc.28
Gartner Magic Quadrant for
Endpoint Protection Platforms
August 2019
This graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document is
available upon request from http://www.gartner.com/reprints/trend-micro---
canada?id=1-1OEJAQ6E&ct=190819&st=sb
Gartner does not endorse any vendor, product or service depicted in its research
publications, and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner's research organization and should not be construed as statements of
fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
26. © 2020 Trend Micro Inc.29
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
THE FORRESTER WAVETM
Endpoint Security Suites
Q3 2019
www.trendmicro.com/en_ca/business/products/user
-protection.html?modal=rb-forrester-wave-endpoint-
see-how-07a253
27. © 2020 Trend Micro Inc.30
https://resources.trendmicro.com/Forrester-Wave-Email.html
THE FORRESTER WAVETM
Enterprise Email Security
Q2 2019
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's
call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and
comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave. Information is based on best available resources. Opinions reflect judgment at the time and
are subject to change.
28. © 2020 Trend Micro Inc.31
Leon Backbier
ICT Manager
Trend Micro gives us an easy-to-deploy solution
for security and GDPR compliance, including
integrated management, visibility, and security that
has no performance impact on the endpoint.
“ “
30. © 2020 Trend Micro Inc.33
Branch Office
Wants visibility and security
for the converging OT
environment, & expanding
cloud deployments.
NETWORK SECURITY TEAMS
Wants visibility to
network activity to
help detection &
response
SOC/IR TEAMS
By 2023, 30% of industrial enterprises will have
full, on-premises deployments of IIoT platforms,
up from 15% in 2019
Gartner 2019: Magic Quadrant for Industrial IoT Platforms, Eric Goodness, Scot Kim, et al. 25 June 2019.
By 2021, 50% of all workloads will be run outside
the enterprise data center, either in cloud & data
center infrastructures or at the network edge.
Uptime Institute Annual Data Center Survey, 2019.
31. © 2020 Trend Micro Inc.34
Branch Office
Cloud deployments aren’t
protected by existing
network security
Unpatched OS & app
vulnerabilities in cloud
deployments
OT environments have wide variety
of device types and patching levels.
IT network security doesn’t fit OT.
Endpoint security & EDR
can’t see unprotected
endpoints / IT devices Unprotected contractor
endpoints
Vulnerable IT
and OT Devices
OS vulnerability
exploit
Compromised hosts
communicating with C&C
Outbound
C&C Traffic
OT exploit from
infected workloads
Contractor laptop as
initial attack vector
32. © 2020 Trend Micro Inc.35
Branch Office
Cloud IPS
IDS/IPS
Network Analytics
Specialized IDS/IPS
for OTVirtually patching against
exploits protects
unpatched endpoints
The network is the first
line of defense against
threats, and the only
defense for many devices
33. © 2020 Trend Micro Inc.37
• Wire-speed, network-layer protection
against against the broadest range of
threats
• Flexible network security that
seamlessly extends to the cloud and
OT environments
• Insightful to detect previously
unknown threats in your environment
and share that threat intelligence
with other security layers
34. © 2020 Trend Micro Inc.38
“Recommended”
Breach Detection System 5
5 Years in a Row and 98.7%
Detection Rate
“Recommended”
Data Center
Intrusion Prevention System
NSS Labs 2018 Breach Detection Systems Test Report NSS Labs 2018 Data Center IPS Test Report
RECOMMENDED RECOMMENDED
35. © 2020 Trend Micro Inc.39
Claudia Anania
CIO
With visibility and protection across multiple
environments, we’ve been able to increase our speed
for incident response by 90%, while reducing our
effort for compliance reporting by 90%.
“ “
37. © 2020 Trend Micro Inc.41
Branch Office
User behavior
Endpoint
Vulnerabilities
Social engineering
risk
Code from 3rd party
repositories
Network
vulnerabilities
Application
Vulnerabilities
Old operating
systems
Vulnerable OT
devices
MisconfigurationsRisks & vulnerabilities
across multiple
environments
38. © 2020 Trend Micro Inc.42
Branch Office
Wants fast detection &
response across
entire environment
SOC/IR TEAMS
88% of organizations will increase spending on
detection and response in the next 18 months to
address cross-layer visibility gaps.
ESG 2019: Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud
39. © 2020 Trend Micro Inc.43
Branch Office
Today, the SOC gets
siloed insight into
endpoints (EDR)…
…and limited visibility to
threats affecting cloud
workloads
…a separate siloed
view into network
events…
SOC / IR
Analyst
40. © 2020 Trend Micro Inc.44
SOC / IR
Analyst
Branch Office
Generating incomplete,
noisy SIEM alerts without
any context
41. © 2020 Trend Micro Inc.45
Spread to cloud
via compromised
credentials
Branch Office
SOC / IR
Analyst
Threat arrived via
email to another
endpoint
Additional apps
impacted
Spread from cloud to
OT infrastructure
There was more to the
story! It’s important to
see the whole picture.
42. © 2020 Trend Micro Inc.46
Branch Office
SOC / IR
Analyst
XDR breaks down the
silos and tells a story
instead of noise
XDR
43. © 2020 Trend Micro Inc.48
Branch Office
VISIBILITY, DETECTION
& RESPONSE (XDR)
44. © 2020 Trend Micro Inc.49
THE FORRESTER WAVETM
Enterprise Detection
and Response (EDR)
Q1 2020
https://resources.trendmicro.com/Forrester-Wave-EDR.html
The Forrester WaveTM is copyrighted by Forrester Research, Inc. Forrester and
Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a
graphical representation of Forrester's call on a market and is plotted using a
detailed spreadsheet with exposed scores, weightings, and comments. Forrester
does not endorse any vendor, product, or service depicted in the Forrester Wave.
Information is based on best available resources. Opinions reflect judgment at the
time and are subject to change.
45. © 2020 Trend Micro Inc.50 Quotes need to be finalized
Trend Micro enabled me to reduce my breach risk across
ClubCorp AND save almost 30% off my cyber insurance
premiums based on the protection & visibility I now have.
Ed Martinez, CISO
“ “
46. © 2020 Trend Micro Inc.51
Why Trend Micro?
People, Research, Technology
47. © 2020 Trend Micro Inc.52
Every Trender is passionate about
making the world a safer and a
better place for everyone.
Donated $4.5M+ to those in
need, and built homes for
1800+ families
Educated 20,000+ small businesses,
1000+ university students, and
2.5M+ kids and families
Trained 300+ new cybersecurity
experts, and enhanced a culture of
diversity and inclusion
500,000+ commercial customers
and millions of consumers
protected
48. © 2020 Trend Micro Inc.53
Threats Vulnerabilities
& Exploits
Cybercriminal
Undergrounds
IoT OT / IIoTAI & ML Future Threat
Landscape
Targeted
Attacks
Trend Micro Core
Technology & Products
Responsible disclosure to
software/hardware vendors
Public/private partnerships
(e.g. law enforcement)
Threat intelligence and research for
consumers, businesses & governments
49. © 2020 Trend Micro Inc.54
Zero Day Initiative
• 3500+ independent
vulnerability researchers
• Discovered over half the
vulnerabilities in 2018
Source: IHS Markit, 2018 Public Vulnerability Market
Market Leader in Vulnerability Disclosure
52.3%
13.5%
12.4%
7.2%
5.3%
4.4%
1.8% 1.3%
0.8%
0.7%
0.4%
0.1%
Trend Micro
Cisco
Google
Check Point
Palo Alto
Secunia
Fortinet
iDefense
McAfee
Kaspersky Lab
CERT/CC
SecureAuth
50. © 2020 Trend Micro Inc.55
The Trusted Source For Law Enforcement
51. © 2020 Trend Micro Inc.56
VISIBILITY, DETECTION
& RESPONSE (XDR)
Technology Advantage:
Singular focus, years of expertise,
but we always anticipate and adapt
52. © 2020 Trend Micro Inc.57
Investigation & Response (XDR)
Custom Sandbox Analysis
Intrusion Prevention (IPS) & Firewall
Early Zero-Day Protection
Exploit Prevention & File/Web Reputation
Variant Protection
Application Control
Integrity Monitoring
Pre-execution Machine Learning
Behavioral Analysis
Runtime Machine Learning
Network Content Correlation
SMART
XGen
TM
Security Strategy Maximizes Protection
LEGEND
Known
Good Data
Known
Bad Data
Unknown
Data
Noise
Cancellation
Malicious files &
actions blocked
Safe files &
actions allowed
53. © 2020 Trend Micro Inc.58
OPTIMIZED
Minimizes IT impact
and operational
challenges
VISIBILITY, DETECTION
& RESPONSE (XDR)
54. © 2020 Trend Micro Inc.59
VISIBILITY, DETECTION
& RESPONSE (XDR)
CONNECTED
Speeds time to protect,
detect and respond
55. © 2020 Trend Micro Inc.60
Enable rapid response
through shared threat
intelligence and delivery of
real-time security updates
Detect advanced malware,
suspicious behavior and
communications invisible to
standard defenses
Assess potential
vulnerabilities and
proactively protect
endpoints, servers and
applications
PROTECT
DETECT
RESPOND
Gain holistic visibility, and
rapidly investigate and
respond to threats across
the environment
VISIBILITY, DETECTION
& RESPONSE (XDR)
Enabling Resilience with a Connected Threat Defense
56. © 2020 Trend Micro Inc.61
• Enable automated threat correlation and alerting on
high priority issues by processing massive amounts of
data in the cloud
• Continuous development and delivery of new
capabilities to solve your needs faster
• Simplify the purchase process with innovative, flexible
pricing aligned to the cloud
• Deliver security via SaaS, lowering operational impacts
and enabling you to focus on business-critical projects
Our Strategy: Cloud Excellence
57. © 2020 Trend Micro Inc.62
Trend Micro’s connected solutions enabled us to go from four
consoles to one with complete visibility, reducing our
operational workload while protecting us with ZERO breaches
since we deployed.Adrian Foo, IT Manager
“ “
58. © 2020 Trend Micro Inc.63
In this era of digital
transformation, we enable
organizations to be RESILIENT,
freeing them to go further
and do more.
59. Trend Micro deployment shifts over time—from
on-premises to SaaS-based solutions. Created
with real data by artist Stefanie Posavec.
61. © 2020 Trend Micro Inc.66
9 of Top 10 Telecom
8 of Top 10 Petroleum
8 of Top 10 Healthcare
8 of Top 10 Automotive
7 of Top 10 Banking
62. © 2020 Trend Micro Inc.67
• 250M+ sensors globally
& threat telemetry from
500,000 commercial
customers
• Hundreds of researchers
across 15 global threat
centers
Global Threat Research
63. © 2020 Trend Micro Inc.68
Working with Industry Partners
64. © 2020 Trend Micro Inc.69
1990 2000 2010 2012 2014 2016 2018 2019
Gateway
scanning of
SMTP, HTTP, FTP
LAN security
for Microsoft
& Novell
Specialized
security
datacenter
servers
Optimized
security for
VMware
Optimized security
for Microsoft Azure
workloads
IoT Reputation
Service
Cloud workload
protection platform
with integrated
container security
XDR with endpoint,
email, servers, &
network combinedAI-based writing-style DNA
analysis for email fraud
Broadest cloud
security platform
as a serviceOptimized
security for
AWS workloads
2020
Specialized
IPS for OT
Continuous Industry Firsts
65. © 2020 Trend Micro Inc.70
FREE! Phishing Awareness Service
Send users a realistic
phishing campaign
Raise user awareness
with training
Analyze the results
https://phishinsight.trendmicro.com
66. © 2020 Trend Micro Inc.71
FREE Cyber Risk Awareness Tool
http://www.trendmicro.com/cyberrisk
Assess your organization’s cyber preparedness,
experience, and future outlook
67. © 2020 Trend Micro Inc.72
Free security assessment service that scans
O365 inboxes and endpoints to gauge the
overall security posture
A simple way for a security professional to:
• Check their O365 inboxes for undiscovered
email threats
• Check key endpoints for undiscovered
threats
• Review a final report in PDF form to share
with stakeholders outlining any threats
existing in their environments
Cybersecurity Assessment Service
https://assessment.xdr.trendmicro.com