Worry-Free Security Solutions Client Server Messaging Security SMB 3.5 Customer Presentation [Name and title] [Date]

Slides:



Advertisements
Similar presentations
Microsoft Forefront Client Security
Advertisements

Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Secure | Resolutions Over 1 million computers are currently protected by Secure Resolutions’ technology.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Trend Micro Worry-Free Remote Manager Partner Training.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
LittleOrange Internet Security an Endpoint Security Appliance.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Maintaining and Updating Windows Server 2008
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Norman Endpoint Protection Advanced security made easy.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Chapter Nine Maintaining a Computer Part III: Malware.
 Norton Antivirus, developed and distributed by Symantec Corporation, provides malware prevention and removal during a subscription period. It uses signatures.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
eScan Total Security Suite with Cloud Security
[Name / Title] [Date] Effective Threat Protection Strategies.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Classification 10/3/2015 Worry-Free Business Security 5.0.
How to Sell AVG! Host: Jeffrey Zinnert, Channel Sales Manager.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Microsoft Management Seminar Series SMS 2003 Change Management.
Bill Jensen Bashar Kachachi Session Code: SIA309.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Kaspersky Small Office Security INTRODUCING New for 2014!
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Maintaining and Updating Windows Server 2008 Lesson 8.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
BUILD SECURE PRODUCTS AND SERVICES
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Trend Micro Consumer 2010 Easy. Fast. Smart.
Customized Solutions to your needs
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Cloud Security for Endpoints
Presentation transcript:

Worry-Free Security Solutions Client Server Messaging Security SMB 3.5 Customer Presentation [Name and title] [Date]

Copyright Trend Micro Inc. 2 Agenda Threat landscape Costs to businesses New Worry-Free Security Solution Release (Client Server Messaging Security for SMB 3.5) Competitive Advantages Customer Benefits

Copyright Trend Micro Inc. 3 How Large is the Malware Industry? The FBI claims financial loss from spyware and other computer-related crimes have cost U.S. businesses $62 Billion in ,150 unique phishing variations counted in August 2006 by the Anti-Phishing Working Group Costs of goods and services in cybercrime forums: $1000 – $5000: Trojan program, which could steal online account information $ 500: Credit Card Number with PIN $80-$300: Change of billing data, including account number, billing adress, Social Security number, home adress and birth date $150: Driver‘s licence $150: Birth certificate $100: Social Security Card $7 - $25: Credit card number with security code and expiration date. $7: Paypal account log-on and password

Copyright Trend Micro Inc. 4 Malware, Spyware, Vulnerabilities Prevalent 15 infections/computer

Copyright Trend Micro Inc. 5 FBI Survey: Threats Cost Real Money Average loss = US$33,868 62% = Installed additional security software

Copyright Trend Micro Inc. 6 Spyware Revenue Source “Spyware vendors are becoming increasingly sophisticated in their efforts to make money from users’ PCs.” -Ben Edelman, spyware researcher

Copyright Trend Micro Inc. 7 Spyware Industry Outlook Spyware/Adware co.’s profitable and growing –Over 90 % of Spyware is funded by Online Advertising Over next 3 years we expect: –Spyware Co. revenue will keep growing –Spyware business model is maturing, but Delivery methods get trickier –Digital infrastructure will create more vulnerabilities than it closes E.g. Vista has 50M lines of code. 40% more than XP –Security industry will not develop “magic pills” that eliminate the need for spyware research & timely updates

Copyright Trend Micro Inc. 8 Spyware Evolution: Where the Action Is Innovation in evading anti-spyware solutions Fairly stable money-making spyware operations

Copyright Trend Micro Inc. 9 Spyware Infection / Vulnerabilities on the Rise 30% 88%

Copyright Trend Micro Inc. 10 In the News: Spyware Theft

Copyright Trend Micro Inc. 11 Worry-Free Security Solutions for SMB spyware, and emerging threats (rootkits, bots) One solution, one deployment, one update and one management system protects PCs and servers against traditional threats (viruses, spam), spyware, and emerging threats (rootkits, bots) Quickly understand threat level and protection status with single Web-based Security Dashboard including detailed spyware infection information. Automatically prevents, contains, and cleans up outbreaks—continuously and without IT intervention: extends real-time protection against spyware other emerging threats Automatic Threat Protection All-in-one Integrated Defense Zero Administration

Copyright Trend Micro Inc. 12 Worry-Free Security Network Diagram Anti-Spyware (New!) Anti-Spam Antivirus Anti-Phishing Content Filtering Threat Protection All-in-one solution protects data and digital assets

Copyright Trend Micro Inc. 13 CSM SMB 3.5 Resolves Customer Pains Installing/deploying > 1 security solution to stop latest threats Managing 2 or more threat-specific security consoles Going desk-to-desk to configure various tools/products Doing random checks to monitor overall security status

Copyright Trend Micro Inc. 14 Overall Worry-Free CSM SMB 3.5 Messaging Worry-Free™Reliability All-in-one solution protects data and digital assets –Eliminate direct/indirect costs of non-integrated suites or threat-specific products/tools Automatically stops rapidly-spreading threats –Keep computers operating and preventing interruption of business activity Prevents productivity drain from threats/solutions –Single solution to deploy/monitor prevents threats (spyware and spam) from harming employee productivity

Copyright Trend Micro Inc. 15 CSM SMB 3.5 New Features and Benefits Key FeaturesBenefits Integrated spywarePrevent PC and network slowdown/instability Eliminate cost/effort needed for additional point products/tools Avoid spyware-related information leakage, identity theft, and privacy concerns Detects and removes emerging threats like rootkits Server-side spam quarantine* Minimize spam impact on employee productivity by filtering spam on the server, (won’t even see spam). Client update source Provides quicker updates by allowing a branch office client to become an update source Doesn’t require installation on server or additional server software

Copyright Trend Micro Inc. 16 At-a-Glance Differences: CSM for SMB 3.5, 3.0, and 2.0 versions Features Client Server Messaging Security SMB v3.5 Client Server Messaging Security SMB v3.0 Client/Server/Mes saging Suite SMB V 2.0 Spyware detection and removal- New! - Spyware referential cleaning- New! -- Rootkit detection and removal- New! -- Spyware exclusion list- New! -- Bot protection- New! Server-side spam quarantine,- New! - End-User spam quarantine - Vulnerability Assessment (install, scheduled, outbreak) - Generic clean functionality- New! -- Security Dashboard - Client update source- New! - Auto-deploy Exchange protection - Outbreak Virus Defense -

Copyright Trend Micro Inc. 17 Trend Micro Worry-Free Security Solutions Trend Micro™ Client Server Security for SMB v.3.5 (CS) Trend Micro™ Client Server Messaging Security for SMB v.3.5 (CSM) Protection PointsCSCSM PCs Servers Mail Servers- FeaturesCSCSM Antivirus Anti-spyware- New! Anti-rootkits- New! Anti-bots- New! Personal Firewall Vulnerability Assessment Anti-Spam- Anti-Phishing- Content Filtering-

Copyright Trend Micro Inc. 18 CSM 3.5 Beta Customer Feedback “I believe the total integrated environment is much easier to setup and manage and now including the Anti Spyware makes it a complete solution.” “The new version is better than the old versions. I can not compare with the other brands. Trend Micro is the one.” “CSM is invaluable to our business. I rate it one of the top products we use” “Integration of A/V and Anti-Spyware into 1 dashboard was great!” “Excellent Product. I have been very impressed with the spam detection built into this product. It seems to be more effective than our barracuda appliance.” “Better than the previous versions. By the way, since 4 years, I've never used other products than Trend Micro.”

Copyright Trend Micro Inc. 19 Benefits Delivered Increases protection from viruses, spyware, spam, and other threats Simplifies support with a single all-in-one solution Provides an intuitive console for easy monitoring of all systems Automates deployment and updates for minimized administration Solution Trend Micro™Client Server Messaging Security, Release 3.5 CSM for SMB 3.5 Case Study Glenwood Development Company, L.L.C. “Trend Micro™ Client Server Messaging Security for SMB just keeps getting better with every new release. The things I’ve liked from the beginning—the all- in-one protection, the ease of deployment and updates—are even better today.” -- Ken Shufelt, Director of Property Development and IT Manager Business Objectives Protect vital resources ( , business data, desktop and server systems) Ensure productive environment (no viruses, spyware, or malware slowing performance or bringing systems down) Minimize deployment and support time Avoid clean-ups of unwanted content

Copyright Trend Micro Inc. 20 Competitive Landscape Completeness of solution Ease of implementation and use AntiSpyware/Defender Integrated All-In-One One solution, one install, one update, one console to manage Point Solutions Administrative nightmare, increased cost/overhead Suites Multiple components, increased complexity and management effort

Copyright Trend Micro Inc. 21 Competitive Positioning SMB products by Symantec and McAfee : –Provide: Inconsistent, unpredictable installation/upgrade experience –Require: More effort configuring/managing –Missing: Any type of proactive defense against rapidly-spreading threats –Unable: to check for Microsoft vulnerabilities from central location * Symantec, McAfee

Copyright Trend Micro Inc. 22 Competitive Comparison - Deployment Key Feature Trend Micro Client Server Messaging Security for SMB 3.5 Symantec Client Security 3.1 with Groupware McAfee Active VirusDefense for SMB Installation and Deployment Number of product components to install 19 [1] [1] 7 [2] [2] Number of steps to install server 1910 Number of installation actions Integrated component installation YesNo Settings replicationYesNo [1 There are six (6) required components for Symantec Client Security 3.1 with Groupware Protection (Symantec Client Security Server, Symantec System Center, Symantec Client Security clients, Symantec Client Firewall Administrator, Symantec Mail Security Server, Symantec Mail Security console) and three other addition components ( Symantec Central Quarantine Server, Symantec Quarantine console, Liveupdate administrator) [2] Composed of six (6) required components (Pilot Protection, ePO Agent, VirusScan Enterprise 8.0i, Anti-spyware Enterprise, Desktop Firewall, GroupShield) and one (1) optional component (Alert Manager).

Copyright Trend Micro Inc. 23 Competitive Comparison – Outbreak Defense Key Feature Trend Micro Client Server Messaging for SMB 3.5 Symantec Client Security 3.1 with Groupware McAfee Active Virus Defense for SMB Assess Automatically identifies and reports systems that are vulnerable to exploit by a new threat -- Prevent Automatic threat protection without an updated virus signature file -- Automatic deployment of outbreak preventive policy -- Automatic configuration of protected systems to prevent propagation, infection and attack -- Protect Increases update interval to every 5 minutes during outbreak -- Automatically initiates company wide virus scan, upon receipt and deployment of outbreak-specific signature file -- Clean-Up Automatically cleans system and removes all traces of infection - [1] [1] - [2] [2] No need to download a separate cleaning tool -- No need to manually execute cleaning tool on every PC and server -- [1] Symantec still uses traditional virus removal tool to cleanup infection on each client computer. The tool needs to be run locally on each infected machine with no centralized logging or reporting. [2] Some hard to remove viruses cannot be cleaned using on-demand or scheduled scan from McAfee VirusScan. In this case, it may require the use of a stinger tool which needs to be downloaded manually from McAfee web site, upload the install file and NAP to Protection Pilot, and create an on- demand stinger scan. There’s no centralized logging or reporting with the stringer tool.

Copyright Trend Micro Inc. 24 Competitive Comparison – Threats Key Feature Trend Micro Client Server Messaging for SMB 3.5 Symantec Client Security 3.1 with Groupware McAfee Active Virus Defense for SMB Network-based antivirus -- Anti-spyware- NEW! Spyware deep referential cleaning- New! -- Anti-rootkit- NEW! - Anti-bot- NEW! ?- Anti-spam/content filtering (requires extra license) Anti-phishing - (requires extra license) Vulnerability Assessment -- Automatic Outbreak Prevention -- Intrusion Detection / Prevention System [1] Integrated Damage Cleanup -- [1] Client/Server Security Agent’s client firewall includes a rule-based Intrusion Detection System (IDS) that detects common attacks on the client such as “Ping of Death”, “Syn Flood”, “Teardrop”, etc. Rules can be updated when the Common Firewall Driver is updated via ActiveUpdate. [3]Client/Server Security agent status is reported in real-time to the Trend Micro Security Server.

Copyright Trend Micro Inc. 25 West Coast Labs key proof points Based on West Coast Labs report Worry-Free Security solutions enable resellers* to: -Perform 100% less installation actions -Deal with half the number of management consoles. -Find vulnerable computers 6x faster and with 8x fewer actions. -Spend 12x less time to protect against unknown/zero day threats. * Compared to Symantec Client Security w/ Groupware 3.0 and McAfee Active AV Defense 8.0i. WCL review:

Copyright Trend Micro Inc. 26 Business Buyer vs. Technical Buyer profile Business Buyer (owner, partner, president, CEO) Technical Buyer (part-time IT) Main concernRunning the business.Keeping IT up and running to support business (satisfy “customer”). Security NeedsCost-effective, reliable solution that: Protect data/assets Keep computers/network up and running Provide productive environment for employees Same, but translate to an all-in-one solution that: Easy to implement/use and maintain Reliable and performs well (no impact on resources) IT security skillsNo time/interest for IT security. “How much does it cost, what’s the benefit?” No specialized security skills, general IT knowledge. Often in role because most skilled compared to co- workers. IT involvementAvoid getting involved with IT unless problem and no one else more qualified will try and figure it out. Monitors and maintains systems. Fixes things when they break. Buying processSigns check/makes final decision.Does research and provides recommendation for IT solutions. Vendor requestsVendor? Don’t know, don’t care. In absence of trusted recommendation will choose well- known brand. “Cheap” expertise (up and running quickly- intuitive UI, useful documentation) Tighter communication (upgrades/updates, threats) Fast and effective support- talk to expert within reasonable amount of time.

Copyright Trend Micro Inc. 27 Business Buyer benefits Cost-effective, all-in-one solution protects data and assets –No- buying/renewing extra threat-specific products/tools Automatically prevent threats from crashing PCs/networks –No- suffering interruption of business activity due to inaccessible PCs/networks Stop productivity drain –No- threats or solutions slowing down PCs/networks or harming employee productivity

Copyright Trend Micro Inc. 28 Technical Buyer benefits 1.All-in-one, easy to implement/use solution Single solution to deploy and single console to configure Avoid- additional effort installing/maintaining multiple products/components 2.Automatically prevent threats from interrupting business activity The only SMB solution that automatically stops rapidly-spreading threats before a pattern file/signature has been released Avoid- reactively manually fixing “broken” (infected) computers and dealing with user frustration 3.Easily confirm security status for your network Security dashboard provides at-a-glance protection status Avoid- viewing multiple consoles/products to confirm network is safe

Copyright Trend Micro Inc. 29 Customer Call to Action Contact your trusted advisor/reseller Download evaluation version: View Flash Demo: Visit SMB landing page: Renew online: Buy online*: * Option may not be available in all regions.