Presentation is loading. Please wait.

Presentation is loading. Please wait.

Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer

Similar presentations


Presentation on theme: "Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer"— Presentation transcript:

1 Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer support.trendmicro.it@itwayvad.com

2 Agenda Trend Micro Overview 1 Changing Malware Market 2 Smart Protection Networks 3 Wrap-Up 4 Slide #2

3 Slide #3 Trend Micro Overview

4 Vision and Mission A world where it is absolutely safe to exchange digital information Our Vision Develop, deliver, and support the most flexible and customizable Internet security solutions to address the threats on the Web Our Mission ever-changing Smart Protection Network Launched June 18 th 2008 Slide #4

5 Trend Micro Vital Stats Founded: 1988 Operations in over 50 countries Headquartered: Tokyo, Japan Slide #5 3,600+ Employees

6 Trend Micro Vital Stats 2007 Revenue: $848 Million Sales: Channel/Partner Consultancy: Channel/Partner Support: Channel/Partner Slide #6

7 Segments Time to Protect Slide #7 Smart Protection Network

8 Slide #8 Changing Malware Market

9 Increasing Threat Malware is becoming increasingly dangerous and harder to detect. Slide #9 Malware is Multiplying Malware Samples 1988: 1,738 1998: 177,615 2008: 1,100,000+ Pattern Files Can’t Keep Up { Malware is Sophisticated Malware Variants Multi-Vector Polymorphic Rapid Variants { Malware is Profit-Driven Malware Actions Stealthy Targeted Crime & Espionage Increased Liability Costs {

10 Underground Economy AssetGoing-rate Pay-out for each unique adware installation$0.02-0.30 Malware package, basic version$1,000 – $2,000 Malware package with add-on servicesStarting at $20 Exploit kit rental (1 hour)$0.99 to $1 Exploit kit rental (2.5 hours)$1.60 to $2 Exploit kit rental (5 hours)$4, may vary Undetected copy of info-sealing Trojan$80, may vary Distributed Denial of Service attack$100 per day 10,000 compromised PCs$1,000 Stolen bank account credentialsStarting at $50 1 million freshly-harvested emails (unver)$8 and up Sample data from research on the underground digital economy in 2007 Slide #10

11 Projected Threats The Volume Problem Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) By 2015 233,000,000 Per Year Slide #11

12 Slide #12 Smart Protection Network

13 Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat Correlation Slide #13

14 Next generation architecture Competition are way behind. Slide #14

15 Press Launch Enterprise Strategy Group (ESG) Trend Micro Marries Security with Cloud Computing Date: July 2008 Author: Jon Oltsik, Senior Analyst and Charlotte Dunlap, Senior Analyst Last week in New York City, Trend Micro announced its Trend Micro Smart Protection Network, a new type of security model that marries a lightweight desktop agent to Trend’s vast network- based resources in the cloud. The new SaaS model is spot on and a view of things to come for threat management. If Trend Micro can 1. educate the market, 2. convert customers, and 3. execute with sales and marketing, the Trend Micro Smart Protection Network could enhance Trend’s market position, revenue, and valuation. Slide #15

16 Press Launch Slide #16

17 Hybrid Client Hybrid Client Cloud-based complementing traditional anti-malware pattern updates Enterprise Network Caches Pattern File Size Reduction Not Always Connected Performance Cache Host-Based Behavioral Anti-Malware (HIPS) is Helpful Some Traditional AV benchmarking may no longer be valid. Slide #17

18 Smart Protection Network It powers both on-premise and hosted solutions to protect users whether they are on the network, at home, or on the go, using light weight clients to access its unique in-the- cloud network of correlated email, Web and file reputation technologies, as well as threat databases. Customers’ protection is automatically updated and strengthened as more products, services and users access the network, creating a real-time neighbourhood watch protection service for its users. Cloud-Client Hybrid (Formal Statement) Slide #18

19 Backend investment 3.5 billion URL requests per day 20 million+ install base 99.9999%+ uptime 5 data center (US, EMEA, APAC) 1000 production servers Category Collaboration Anti-Spam Operation Anti-Spam Operation Anti-Malware Operation Anti-Malware Operation Threat Research Operation Threat Research Operation Email Security Services Email Reputation Services Email Reputation Services OEM Partners URL Sourcing End User Query Traffic End User Query Traffic Web Crawler Web Crawler Customer Feedback Customer Feedback URLs in Spam Mails URLs in Spam Mails URL Threat Research URL Threat Research 3rd Party Sources 3rd Party Sources URLs Malicious EXE or URLs URLs with malware URLs DNS & HTTP URL Analysis Automatic Rating Systems Zone Builder/Dispatcher URL Database JIT Human Validation Category Reputation Worldwide Services Dispatch Category & Reputation Score URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points TMUFE AV/AS Detection Signature or Heuristics Web Reputation Service URL Filtering Service Point Products Slide #19

20 Backend Investment Competition are way behind. Many cannot make the investment $ Most utilize non-integrated third-party products Slide #20

21 Key Infrastructure Components Specialized Threat Analysis Web reputation technology Email reputation technology File reputation technology Behavioural analysis “Neighbourhood Watch” Correlates multiple events from many sources Customer feedback Web Crawlers Honey Pots Trend Labs Other AV companies Prioritises further analysis Real-Time Services Feedback Loop Backend Correlation Technology TrendLabs Slide #21

22 In-the-Cloud File Reputation Product Launch in 1H 2009 Part of Smart Protection Network Rapid Protection from File Modifying Malware Extends Existing File Scanning Features White/ Black Listing Functionality Virtualization Support Strengthens Data-Centre Correlation In-the-Cloud Thin-Client File Scanning Slide #22

23 Already Live Slide #23

24 Slide #24 Smart Protection Network Products

25 Smart Protection Network Product Support Slide #25 Web Reputation TIS & TIS Pro 2008, 2009 WBFS Standard & Advanced OfficeScan 8.x IWSS/IWSVA 3.x C&CS { Email Reputation WFBS Advanced IMSS/IMSVA Advanced SPS IMHS Standard & Advanced (includes web reputation for embedded links within email) C&CS { File Reputation (Whitelisting) File Reputation (Whitelisting) TIS & TIS Pro 2008, 2009 WFBS Standard & Advanced {

26 Threats Services InterScan™ Messaging Hosted Security Internet Worry-Free™ SecureSite Desktop & ServerGateway Small Business Server/Exchange Worry Free Advanced Worry-Free Standard Gateway Security Partner Solutions Linksys Worry-Free™ Remote Manager Small Business Slide #26

27 Threats Medium Business 24 x 7 Support Trend Micro Message Archiver Trend Micro LeakProof ™ Desktop & ServerGateway Mail Server ScanMail™ OfficeScan™ InterScan™ Web Security InterScan™ Messaging Security NeatSuite™ Client Server Messaging Suite Services InterScan™ Messaging Hosted Security Internet Slide #27

28 Enterprise Business Threats Services InterScan™ Messaging Hosted Security Internet 24 x 7 Support Trend Micro Message Archiver Trend Micro LeakProof ™ Endpoint Gateway Servers Management InterScan™ Web Security InterScan™ Messaging Security ScanMail™ IM Security for OCS Solution ServerProtect™ SharePoint Portal Trend Micro Control Manager™ NeatSuite™ Client Server Messaging Suite OfficeScan™ Slide #28

29 Wrap-Up

30 Already Proven Over Many months (ERS & WRS) Data centres scale to enterprise Embedded in many TM products Still evolving -- FRS Smart Protection Network - Architecture Slide #30

31 Smart Protection Network - USP Smart Protection Network (USP) Less Network Traffic Lightweight Clients, Less Memory Removes Pattern Monitoring/ Management Protects Customers in Near Real Time Slide #31

32 Smart Protection Network - USP Less Staff TimeReduced CostsImproved ProductivityLowered Data TheftEnhanced Legal Compliance Slide #32

33 33 The End


Download ppt "Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer"

Similar presentations


Ads by Google