Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Copyright 2010 Trend Micro Inc. Cloud – Risques ou Opportunités Luis Delabarre – Solutions Architect.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Worry-Free Business Security 6.0 Filip Demianiuk – Technical Manager Central Eastern Europe Monday, April 13, 2015.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
The Next I.T. Tsunami Paul A. Strassmann. Copyright © 2005, Paul A. Strassmann - IP4IT - 11/15/05 2 Perspective Months  Weeks.
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
CCC/WNUG Exchange Update May 5, 2005 Nate Wilken Web and Messaging Applications Information Technology Arizona State University.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Welcome to: Smart Protection Network Claudio Zattoni Senior System Engineer
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
2013 Trend Micro 25th Anniversary Threat Connect : a visualized cyber-threats entity reporting system backed with Hadoop ecosystem Scott Miao, Trend Micro.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Web Authoring Rico Yu. Ch.11 Web Posting and Web Hosting Web Host Types of Web Host Web Posting.
Internet Big Data Solutions. Problem : Web Search Limitations Limited data sources Search engines often cater to only the most popular and less obscure.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Security Testing Case Study 360logica Software Testing Services.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
The Changing World of Endpoint Protection
Frankfurt (Germany), 6-9 June Lars Garpetun – Sweden – Session 6 – 0415 EXPERIENCES FROM OPERATIONS AFTER A FULL- SCALE SMART METERING ROLLOUT REGARDING.
Data Mining By Dave Maung.
Online Advertising Distribution System 1. Why Digital Marketing? 2.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
CITA 310 Section 3 Additional Topics. Common IPv4 Classes ClassFirst numberSubnet maskNumber of networks Number of addresses Class A0 – ,777,216.
The Changing Face of the Contact Centre 18 th September 2013.
CERN IT Department CH-1211 Genève 23 Switzerland t CERN IT Monitoring and Data Analytics Pedro Andrade (IT-GT) Openlab Workshop on Data Analytics.
Assure Analytics data analytics and visualisation Robert Ghanea-Hercock, Alex Healing, Ben Azvine, Karl Smith.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
How to Make Cyber Threat Intelligence Actionable
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
IoT Security Part 2, The Malware
Trend Micro Consumer 2010 Easy. Fast. Smart.
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Organizations Are Embracing New Opportunities
Journey to Microsoft Secure Cloud
TYPES OF SERVER. TYPES OF SERVER What is a server.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Exchange Online Advanced Threat Protection
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Internet Worm propagation
AKAMAI INTELLIGENT PLATFORM™
Global Enterprise Search
Specializations 11/20/2018 Confidential | Copyright 2014 Trend Micro Inc.
Secure once, run anywhere Simplify your security with Sophos
New Web Security Bundles For 1500 Users and Below
Ron Carovano Manager, Business Development F5 Networks
Introduction to Symantec Security Service
Presentation transcript:

Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security

Copyright 2012 Trend Micro Inc.

Overwhelmed by Volume of New Threats 2 Source: AV-Test.org

Copyright 2012 Trend Micro Inc. File Web 2

Copyright 2012 Trend Micro Inc. Smart Protection Network File Web / URL Domain IP File Reputation Service Reputation Service Customer Smart Protection Community Intelligence (Feedback loop) Web Reputation Service Sourcing Processing & Analysis Validate & Create Solution Quality Assurance Solution Distribution Solution Adoption SPN Correlation

Copyright 2012 Trend Micro Inc. 2

Correlation A compromised web site One click in a link. Fake news by . TROJ_CHOST.E A fake video A lot can happen in a minute REPUTATION WEB REPUTATION FILE REPUTATION

Copyright 2012 Trend Micro Inc. Backend Operations Data Feeds CorrelationCorrelation SystemsSystems Monitor & Trigger

Copyright 2012 Trend Micro Inc. Big Data!

Copyright 2012 Trend Micro Inc. ER S Spam Samples Feedback Data Query Logs Storage Clusters VM Clusters Reputation Data New Threat Discovery Reputation

Copyright 2012 Trend Micro Inc. SPN Infrastructure Reputation Servers Reputation Data Query Logs Feedback Data Costumers Honeypot Spam Samples Pattern Query 50M /day 200M /day 1TB /day Reputation

Copyright 2012 Trend Micro Inc. Daily Service Capacity Solution DeliveryData AnalyticsData Sourcing 50M Spam samples 180,000 Suspicious IPs 806TB Raw data 8,050 Signatures 668,000 Cloud entries 130,000 New IP listing 1B IP address reputation 278GB Sampling pool 200M User’s feedback 1TB Mail traffic logs Reputation

Copyright 2012 Trend Micro Inc. Web Reputation

Copyright 2012 Trend Micro Inc. Web Reputation Statistics Data Sourcing ■ 42 Sources (16-19 in Regularity) ■ 11,000 Unique Feedbacks ■ 8~10 Billion URL Queries Data Analyses ■ 1 Billion URLs Analyzed ■ 7.2 TB raw and condensed data for correlations and mining Solution Delivery ■ 52,580,000 static patterns ■ 20,000 new patterns ■ 15~20 million infections blocked

Copyright 2012 Trend Micro Inc. File Reputation

Copyright 2012 Trend Micro Inc.

+ GRID and MARS Goodware Ressource and Information Database Mobile Application Reputation Service

Copyright 2012 Trend Micro Inc. GRID

Copyright 2012 Trend Micro Inc.

How and when to retire Data?

Copyright 2012 Trend Micro Inc.