eva ir presentation_final_e_final_web
DESCRIPTION
TRANSCRIPT
![Page 1: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/1.jpg)
Next Generation Trend Micro Eva Chen
CEO and Co-Founder
![Page 2: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/2.jpg)
A computing category that did not exist six years ago has come to overtake one that has been around for 38 years!
Source: Asymco.com July 2013
iOS &
Android
PC
Copyright 2014 Trend Micro Inc.
![Page 3: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/3.jpg)
Consumerization Cloud & Virtualization
Cyber Threats
IT Employees
Confidential © 2014 Trend Micro Inc. 3
Attackers
![Page 4: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/4.jpg)
25% growth in active seats for SaaS
endpoint security Over 90% YoY revenue growth
85% customer growth
New offerings to secure Web Apps, AWS, SAP
All of Trend Micro Aligned to these Solutions
4 Copyright 2014 Trend Micro Inc.
![Page 5: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/5.jpg)
Trend Micro 31%
1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013
#1 Corporate Server Security Market Share1
Copyright 2014 Trend Micro Inc.
![Page 6: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/6.jpg)
Validated by Industry Experts
Copyright 2014 Trend Micro Inc. 6
(for Deep Discovery)
1. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, Figure 2, doc #242618, August 2013 2. Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013 3. Experton Group, Cloud Vendor Benchmark, May 2013 4. Network Computing Magazine announced Trend Micro Deep Discovery won best new product of the year in its 2013 awards, March 2013 5. Trend Micro™ Enterprise Security for Endpoints Receives Best Buy Award and Five Stars From SC Magazine
![Page 7: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/7.jpg)
So What’s Next for Trend Micro? What will it take to compete in 2014 and beyond?
7
![Page 8: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/8.jpg)
Evolving Threat Landscape
Copyright 2014 Trend Micro Inc. 8
Time
Vulnerability Exploits
Traditional Malware
Advanced Malware
Employee Data Leaks
Targeted Attacks
Sop
his
tica
tio
n
![Page 9: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/9.jpg)
9 Confidential | Copyright 2014 Trend Micro Inc.
110 ∧
![Page 10: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/10.jpg)
Why Targeted Attacks are So Tricky!
Poison Ivy
Multiple Ports
EvilGrab MW
Multiple Protocols
IXESHE MW
Evolve/Morph over Time
Customized for each environment!
Copyright 2014 Trend Micro Inc.
![Page 11: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/11.jpg)
Next Generation
Threat Defense
Current
Policy Enforcement
Application Control Identity Federation
Port Control(firewall) Access control(VPN)
Signature Matching AV Signature matching IPS Vulnerability Scan
IT Security Industry Overall Landscape
Sandbox
Copyright 2014 Trend Micro Inc.
![Page 12: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/12.jpg)
Two Very Different Approaches
• Action is “Block” or “Pass”; no grey area
• Risk management approach, balance between high detection and false alert
• Focused on network traffic and rule enforcement
• Focused on understanding hacker behavior and evolving techniques
• Set and Forget • Dynamic updates and change
Threat Defense Policy Enforcement
Copyright 2014 Trend Micro Inc.
![Page 13: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/13.jpg)
Analyze risk and
nature of attack and
attacker, and assess
impact of threats
retrospectively
Update protection automatically,
prioritize areas for remediation and adapt protection
Detect advanced
malware, behavior
and communications
invisible to standard
defenses
Assess potential vulnerabilities and proactively protect endpoints, servers and applications
To Enable New Generation Protection Process!
Copyright 2014 Trend Micro Inc. 13
MONITOR & CONTROL
PREVENT
DETECT
RESPOND
ANALYZE
![Page 14: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/14.jpg)
Trend Micro Smart Protection Platform
Copyright 2014 Trend Micro Inc. 14
MONITOR & CONTROL
PREVENT
DETECT
RESPOND
ANALYZE
![Page 15: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/15.jpg)
Network
Copyright 2014 Trend Micro Inc. 15
Servers End Users
Range of threat defense capabilities, including ‘next-gen’ approaches
Applies across endpoints, servers and network
On-premise and in cloud
Connected to cloud-based global threat intelligence
Trend Micro Smart Protection Platform
![Page 16: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/16.jpg)
Consumer 3Cs
“Corporatization”
Cyber Threats
Cloud
Attackers
Family Applications
•Unprotected mobile devices •Unprotected home devices •Lost devices (theft/backup) •No visibility/management •Hard to Fix
•Consumer Fraud •Kids Safety • Identity Theft
•Unprotected network traffic •Data leakage •Privacy concerns
Copyright 2014 Trend Micro Inc.
![Page 17: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/17.jpg)
Next Generation Consumer Protection Providing value Target device Protection target
Detect & Clean
Windows PC
Device, Data
In the past…
Now… Protect PC & Mobile
Individual
Future… Enjoy All home devices
Family
Copyright 2014 Trend Micro Inc.
![Page 18: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/18.jpg)
3G/4G
Internet of Everything Protected at Home
Copyright 2014 Trend Micro Inc.
Base image source:: http://community.plus.net/blog/2012/02/23/smart-internet-will-help-manage-your-home-and-life-by-2027/
![Page 19: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/19.jpg)
Enabling a Smart Protection Strategy for Customers
Simple yet flexible to manage and deploy
Centralized Automated Lightweight Flexible
Security that fits an evolving ecosystem
Open Optimized Focused Innovative
…and more
Interconnected Real-time Transparent
Layered security
Smart protection for information
Copyright 2014 Trend Micro Inc.
![Page 20: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/20.jpg)
Zscaler Symantec
FireEye
Trend Micro
Threat Defense
End Users
Network
Servers/Data Center
Breadth of Environment Physical Cloud Virtual
Next Generation Threat Defense Range of Techniques, Across Layers and Environments
McAfee Kaspersky Symantec
Sophos
Copyright 2014 Trend Micro Inc.
![Page 21: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/21.jpg)
Threat Defense
End Users
Network
Servers/Data Center
Breadth of Environment Physical Cloud Virtual
Next Generation Threat Defense Range of Techniques, Across Layers and Environments
Copyright 2014 Trend Micro Inc.
Q1 2014
Q2 2014
Trend Micro
![Page 22: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/22.jpg)
Consistent Vision…
Copyright 2014 Trend Micro Inc. 22
A world safe for exchanging digital information
![Page 23: Eva ir presentation_final_e_final_web](https://reader035.vdocuments.us/reader035/viewer/2022070303/54b70f9e4a79594a478b4833/html5/thumbnails/23.jpg)
Thank You
23 Copyright 2013 Trend Micro Inc.