driving success in 2013 - trendmicro.co.jp › cloud-content › jp › pdfs › ... · driving...
Post on 29-Jun-2020
3 Views
Preview:
TRANSCRIPT
Eva Chen
CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats
A world safe for
exchanging
digital information
Consistent Vision for 25 Years
Customer Challenges in the Cloud Era
Consumerization Cloud &
Virtualization
Employees IT
Cyber Threats
Organizations Need a Smart Protection Strategy
Copyright 2013 Trend Micro Inc.
Perimeter
security
Elastic perimeter,
sophisticated threats
Then… Now…
Smart layered protection
against theft and loss
Complete IT
control
Consumerization of IT
with many points to secure
Simple yet flexible
to manage and deploy
Static
environment
Dynamic and complex
with cloud and mobile
Security that fits an evolving ecosystem
Consumerization Cloud &
Virtualization
Employees IT
Cyber Threats
Smart Solutions
Copyright 2013 Trend Micro Inc.
CUSTOM
DEFENSE
CLOUD &
DATA CENTER
SECURITY
COMPLETE END USER
PROTECTION
Consumerization: Risky New Environment!
Copyright 2013 Trend Micro Inc.
1: Trend Micro: “Spear Phishing Email: Most Favored APT Attack Bait”, Nov 2012
2: Trend Micro Threat Predictions for 2013
3: Global survey of 1300 enterprise customers; “Shadow IT in the Enterprise”, Nasuni, Sept 2012
91% targeted attacks begin with spear-phishing1
1 million malicious Android apps by end of 20132
1 in 5 use Dropbox at work, typically against rules3
Email & Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync & Sharing
Social Networking
File/Folder & Removable Media
Employees
IT Admin
Security
Copyright 2013 Trend Micro Inc.
Email & Messaging
Web Access
Device Hopping
Collaboration
Cloud Sync & Sharing
Social Networking
File/Folder & Removable Media
Employees
Complete End User Protection
Anti-Malware Encryption Application
Control Device
Management Data Loss Prevention
Content Filtering
IT Admin
Security
COMPLETE
END USER
PROTECTION
Protecting Full Range of User Activities
Cloud and Virtualization: New Challenges!
Copyright 2013 Trend Micro Inc.
Source: Forrester study
By 2016, 71% of server workloads will be virtualized*;
Organizations can cut costs by 74% by storing data in the cloud*
Data Center
Physical Virtual Private Cloud Public Cloud
• Server and VM integrity
• Appropriate policy enforcement
• Data protection, especially in the cloud
• Performance and manageability Data Center Ops
Security
Single Security Platform across Environment
Copyright 2013 Trend Micro Inc.
Data Center
Physical Virtual Private Cloud Public Cloud
Cloud and Data Center Security
Anti-Malware Integrity
Monitoring Encryption
Log
Inspection Firewall
Intrusion
Prevention
Data Center Ops
Security
CLOUD &
DATA CENTER
SECURITY
Cyber Threats: More Social, Sophisticated, Stealthy!
Copyright 2013 Trend Micro Inc.
1.8 successful attacks per week
$8.9M average cost of per year
Sources: 2012 Ponemon Study on costs of Cybercrime
Network Admin
Security
Full Lifecycle of Defense against APTs
Copyright 2013 Trend Micro Inc.
Custom Defense
Network-wide
Detection
Specialized
Tools
Threat
Services
Automated
Security Updates
Advanced
Threat Analysis
Custom
Sandboxes
Detect malware,
communications &
behavior invisible to
standard defenses
Analyze the risk
and characteristics
of the attack and
attacker
Adapt security
automatically (IP
black lists, custom
signatures…)
Respond using
the insight needed
to respond to your
specific attackers
CUSTOM DEFENSE
Network Admin
Security
Source: IDC, 2012; Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011
Trend Micro
27%
CATEGORY BY 2016 2011-2016 CAGR
Anti-malware $403M -11.4%
Security Suites $2,760M 12.7%
Server Security $1,018M 10.5%
Market Growth in Suites and Server Security
Trend Micro already
enjoys a big market
lead in Server Security!
2013 GTM Structure: “Solomo”
Each BU has Sales, Ops,
Marketing, Channel, and
Technical leaders
Leveraging Proven Success: “Japan Offices”
New York Tokyo
Singapore
London
Increasing Strategic Focus: Winning in the US
Global Ops
Dallas,
TX
Excellence in Execution: Regional Sales Plays
Finding YOUR
Best Sales Plays
by Segment
in 2013
New & Emerging
Mature
Existing Customer New Customer
Capture
New Demand
Grow the
Opportunity
Displace the
Competition
Protect and
Expand the Base
In Summary
• Driven by a consistent vision for 25 years
• Enabling a Smart Protection Strategy for today’s landscape
• Innovating to meet toughest challenges our customers face: Consumerization, Cloud and Cyber Threats
• Executing a GTM strategy to ensure global success
2/13/2013 Copyright 2013 Trend Micro Inc.
top related