Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect.

Similar presentations


Presentation on theme: "Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect."— Presentation transcript:

1 Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect

2 Copyright 2010 Trend Micro Inc. Datacenter Architecture Public Cloud Private Cloud Browser Client Infrastructure as a Service DatabaseFiles Platform as a Service Development, Administration, Management tools Runtime & Data Management Engine Security & User Management Services Software as a Service WebAnalyticsFinanceMedical High Performance Computing Network + Storage APP Web Server Application APIs – AJAX File System – BigTable Browser Local Storage Cloud – Nouvel Eco système

3 Copyright 2010 Trend Micro Inc. Des menaces croissantes More than 100 companies targeted by Google hackers January 2010 Mariposa data-stealing botnet uncovered in more than 50% of Fortune 1000 March 2010 56% of tested enterprises have active data-stealing malware Trend Micro Research 89% of enterprise security breaches not reported RSA Survey 3

4 Copyright 2010 Trend Micro Inc. Operation Aurora (12 janvier 2010) Une faille « poste de travail » qui a affecté le plus important « Nuage »

5 Copyright 2010 Trend Micro Inc. La proposition Trend Micro Sécurité depuis le Cloud Sécurité pour le Cloud Sécurité dans le Cloud 1 2 3 Smart Protection Network SecureCloud Deep Security

6 Copyright 2010 Trend Micro Inc. La Sécurité depuis le Cloud Stopper les menaces avant quelles ne gagnent le Système dInformation File Reputation Threat Correlation, Feedback Loops, Analysis Email Reputation Web Reputation EMAIL THREATS FILE THREATS WEBSITE THREATS Trend Micro Enterprise Security 6 Powered by the Smart Protection Network

7 Copyright 2010 Trend Micro Inc. Smart Protection Network contre les Botnets Incident Trigger Email Reputation Web Reputation File Reputation Monitor Many clients processes are dropping similar filenames in a short time Many clients access or modify the same system file in a short time Many clients accessed similar/same registry keys in a short time Community Intelligence Smart Protection Network Correlate to figure out where the threat come from & where it would connect to Correlate to figure out where the threat come from & where it would connect to FileScore FromConnect to Crypt.NS.GenX129.24.11.3/aexjiire/Euwl.tsst.com:88/e34jg/ Dropper.GenXNdj.sexadult.com/ssr/ee112.42.5.112:80/ Nqe.exeVwww.xyz.comwww.abc.com Conflicker_DXqd.wqwwor.com/omnadasm0.info:80/bugsy Conflicker_DXFdjhg.wopqfe.com7f7fewf.cn:80/sina/ Correlation Customer Feedback Log Immediate Protection

8 Copyright 2010 Trend Micro Inc. Pourquoi sommes-nous différents ? Pourquoi notre solution est-elle efficace contre les vraies menaces ? ERS 295 Go / jour WRS 1305 Go / jour FRS 334 Go / jour 2005 20062008

9 Copyright 2010 Trend Micro Inc. Sécurité du Cloud Protection dun Cloud public SecureCloud permet la protection de services hébergés dans un « nuage » publique

10 Copyright 2010 Trend Micro Inc. Sécurité dans le Cloud 10 IDS / IPS Web Application Protection Application Control Firewall Deep Packet Inspection Integrity Monitoring Log Inspection Anti-Virus Deep Security permet la protection de systèmes dans un Cloud grâce à 5 modules

11 Copyright 2010 Trend Micro Inc. Scada et protection depuis le Cloud 11 « Virtual Patching » pour protéger les systèmes dun réseau Scada Stuxnet

12 Copyright 2010 Trend Micro Inc. Merci à tous


Download ppt "Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect."

Similar presentations


Ads by Google