complete user protection -...
TRANSCRIPT
![Page 1: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/1.jpg)
Complete User Protection
![Page 2: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/2.jpg)
IT Work LoadConsumerization
Copyright 2014 Trend Micro Inc. 2
![Page 3: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/3.jpg)
Then...
Employees
File/Folder &Removable Media
Email &Messaging
WebAccess
Employees
IT Admin
Copyright 2014 Trend Micro Inc. 3
![Page 4: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/4.jpg)
Now!
Email &Messaging
WebAccess
File/Folder &Removable Media
Employees
Device Hopping Cloud Sync& Sharing Collaboration
SocialNetworking
IT Admin
Employees
Copyright 2014 Trend Micro Inc. 4
![Page 5: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/5.jpg)
IT Workload Increasing
Many more environmentsMany more environments
More complex complianceMore complex compliance
IT Admin
Copyright 2014 Trend Micro Inc. 5
Many more environments
![Page 6: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/6.jpg)
A Gradual Transition to the Cloud
“25% of Office customersnow have Office 365.
Microsoft, April 2013
“25% of Office customersnow have Office 365.
Microsoft, April 2013
Copyright 2014 Trend Micro Inc. 6
“25% of Office customersnow have Office 365.
Microsoft, April 2013
![Page 7: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/7.jpg)
Attackers
![Page 8: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/8.jpg)
Attackers
![Page 9: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/9.jpg)
IncreasedOpportunityfor Threatsand DataLoss
IncreasedOpportunityfor Threatsand DataLoss
![Page 10: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/10.jpg)
Evolving Threat LandscapeSo
phist
icat
ion
Copyright 2013 Trend Micro Inc. 10
Time
VulnerabilityExploits
TraditionalMalware
AdvancedMalware
Employee DataLeaks
TargetedAttacks
Soph
istic
atio
n
![Page 11: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/11.jpg)
Customers need a range of capabilities…
Email Security Mobile Security Advanced Threat Protection
Copyright 2014 Trend Micro Inc. 11
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
![Page 12: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/12.jpg)
…but don’t want lots of consoles!
Email Security Mobile Security Advanced Threat Protection!#$%*?!
No interconnectedthreat response
Reduced timeliness
Higher cost
Higher workload
Copyright 2014 Trend Micro Inc. 12
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
IT Admin
![Page 13: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/13.jpg)
Suite vendors help improve this…
Email Security Mobile Security Advanced Threat Protection
Copyright 2014 Trend Micro Inc. 13
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
![Page 14: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/14.jpg)
Trend Micro’sComplete User Protection solution
14Copyright 2014 Trend Micro Inc.
![Page 15: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/15.jpg)
Employees
Email &Messaging
WebAccess
Device HoppingCollaboration
Cloud Sync& Sharing
SocialNetworking
File/Folder &Removable Media
Complete User Protection
Anti-Malware Encryption ApplicationControl
DeviceManagement
Data LossPrevention
ContentFiltering
Employees
IT Admin
Security
Copyright 2014 Trend Micro Inc. 15
![Page 16: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/16.jpg)
Device Control BehaviorMonitoring
VulnerabilityProtection
Sandboxing
FileReputation
WebReputation Web Gateway
Forensics
Network
827M inMarch 2014
827M inMarch 2014 284M in
March 2014284M in
March 2014
Copyright 2014 Trend Micro Inc.
DLP
EncryptionUnpacking
MemoryInspection
Command &Control Blocking
EmailReputation
Email Gatewayor Server
SharePointServer
ApplicationWhitelisting
![Page 17: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/17.jpg)
How does Trend Micro stand out?
Copyright 2014 Trend Micro Inc. 17
SmarterProtection
More FlexibleManagement & Licensing
![Page 18: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/18.jpg)
It’s not about traditional AV anymore
Copyright 2014 Trend Micro Inc. 18
![Page 19: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/19.jpg)
Evolving Threat LandscapeSo
phist
icat
ion
Copyright 2013 Trend Micro Inc. 19
Time
VulnerabilityExploits
TraditionalMalware
AdvancedMalware
Employee DataLeaks
TargetedAttacks
Soph
istic
atio
n
![Page 20: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/20.jpg)
SANDBOXINGSANDBOXING
Trend Delivers BetterProtection
APPLICATION CONTROLAPPLICATION CONTROL
BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCK
SANDBOXINGSANDBOXING
WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION
DEVICE POLICYDEVICE POLICY
New!New!
New!New!
SIG-BASEDSIG-BASED
Copyright 2014 Trend Micro Inc. 20
Employee DataLeaks
Traditionalmalware
Vulnerabilityexploits
AdvancedMalware
TargetedAttacks
APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP
ENCRYPTIONENCRYPTIONNew!New!
![Page 21: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/21.jpg)
Protection On-Premise and in the Cloud
✔ ✔ ✔
Endpoint Protection Messaging Security Secure Web Gateway
Copyright 2014 Trend Micro Inc. 21
✔ ✔ ✔
✔ ✔ ✔New!New!
![Page 22: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/22.jpg)
COLLECTS VIA GLOBAL SENSORNET• Honeypots, customers, threat researchers, community…• Over 300M nodes; 8.6B threat events daily• URLs, vulnerabilities, files, domains, network traffic, threat actors,
mobile apps, IP addresses, exploit kits
BIG DATA ANALYTICS• Identifies using data mining, machine
learning, modeling and correlation• 100 TB data; 500K unique threats
identified daily
Copyright 2013 Trend Micro Inc.
BIG DATA ANALYTICS• Identifies using data mining, machine
learning, modeling and correlation• 100 TB data; 500K unique threats
identified daily
GLOBAL THREAT INTELLIGENCE• 250M threats blocked daily• Email reputation, file reputation, web reputation,
network traffic rules, mobile app reputation, knownvulnerabilities/exploits, threat actor research, C&C…
![Page 23: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/23.jpg)
Copyright 2014 Trend Micro Inc. 23
SmarterProtection
More FlexibleManagement
![Page 24: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/24.jpg)
IT doesn’t want lots of consoles
Email Security Mobile Security Advanced Threat Protection!#$%*?!
Copyright 2014 Trend Micro Inc. 24
Secure Web Gateway
SharePoint Security
Endpoint Protection
Encryption
Application Control
DLP
IT Admin
![Page 25: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/25.jpg)
Simple, Flexible ManagementUser centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise
User centricvisibilityMore productcoverageDeeperManagementCovering Cloud &on-premise
Copyright 2014 Trend Micro Inc. 25
![Page 26: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/26.jpg)
Simple, Flexible LicensingSmart Protection suites
• All cloud and on-premisecapabilities at no extra cost:easy transition
• Subscription license
• Competitively priced
• One-step activation
• 24/7 support included
Smart ProtectionFor Endpoints Complete
Smart Protection suites
• All cloud and on-premisecapabilities at no extra cost:easy transition
• Subscription license
• Competitively priced
• One-step activation
• 24/7 support included
Everything Endpoint
Messaging, Web, Portals
![Page 27: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/27.jpg)
Comprehensive Protection Included
APPLICATION CONTROLAPPLICATION CONTROL
BEHAVIOR MONITORINGBEHAVIOR MONITORINGCOMMAND&CONTROL BLOCKCOMMAND&CONTROL BLOCKSANDBOXING INTEGRATIONSANDBOXING INTEGRATION
WEB REPWEB REPVULNERABILITY PROTECTIONVULNERABILITY PROTECTION
BROWSER EXPLOIT PROTECTIONBROWSER EXPLOIT PROTECTIONENCRYPTIONENCRYPTION
DEVICE POLICYDEVICE POLICY
Trend MicroSmart Protection Suites
Copyright 2014 Trend Micro Inc. 27
Employee DataLeaks
Traditionalmalware
Vulnerabilityexploits
AdvancedMalware
TargetedAttacks
APPLICATION CONTROLAPPLICATION CONTROLSIG-BASEDSIG-BASEDDLPDLP
ENCRYPTIONENCRYPTION
![Page 28: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/28.jpg)
Smart Protection for Endpoints Smart Protection Complete
Central Management ✔ ✔
24/7 Support ✔ ✔
On-premise, cloud or hybrid ✔ ✔
Data Loss Prevention ✔ ✔
Anti-malware ✔ ✔
Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔
Copyright 2014 Trend Micro Inc. 28
Endpoint
Vulnerability Protection, Virtual DesktopIntegration, Mac, Server ✔ ✔
Application Control ✔ ✔
Endpoint Encryption ✔ ✔
Mobile Device Mgmt ✔ ✔
Messaging andCollaboration
Messaging Gateway & Mail Server Security ✔
Microsoft Sharepoint and Lync IM Security ✔
Web Secure Web Gateway✔
![Page 29: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/29.jpg)
Part of Your Smart Protection StrategySmart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mix
Copyright 2013 Trend Micro Inc.
Smart• Best protection on endpoints and gateways• Detects real-world threats more often & faster• The only integrated protection against targeted attacksSimple• Unified dashboard with centralized policy control• Modular, lightweight and efficient• Integrated DLP for easiest configuration• Flexible deployment: on-premise, as a service, or a mixSecurity that fits• Better value vs. point solutions• Fits the workload needs for IT security
![Page 30: Complete User Protection - PCWorld.bgidg.bg/idgevents/idgevents/2014/1030123527-14.10-14.30...Simple, Flexible Management User centric visibility More product](https://reader033.vdocuments.us/reader033/viewer/2022042318/5f07f2537e708231d41f8e69/html5/thumbnails/30.jpg)
Thank you!