1 / 0

Welcome to: Smart Protection Network

Welcome to: Smart Protection Network. Claudio Zattoni Senior System Engineer support.trendmicro.it@itwayvad.com. Agenda. 1. 2. 3. 4. Changing Malware Market. Smart Protection Networks. Trend Micro Overview. Wrap-Up. Slide #2. Trend Micro Overview. Slide #3. Vision and Mission.

nira
Download Presentation

Welcome to: Smart Protection Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome to:Smart Protection Network

    Claudio Zattoni Senior System Engineer support.trendmicro.it@itwayvad.com
  2. Agenda 1 2 3 4 Changing Malware Market Smart Protection Networks Trend Micro Overview Wrap-Up Slide #2
  3. Trend Micro Overview Slide #3
  4. Vision and Mission Our Vision A world where it is absolutely safe to exchange digital information Smart Protection Network Launched June 18th 2008 Our Mission Develop, deliver, and support the most flexible and customizable Internet security solutions to address the threats on the Web ever-changing Slide #4
  5. Trend Micro Vital Stats Headquartered: Tokyo, Japan Founded: 1988 Operations in over 50 countries 3,600+ Employees Slide #5
  6. Trend Micro Vital Stats 2007 Revenue: $848 Million Sales: Channel/Partner Consultancy: Channel/Partner Support: Channel/Partner Slide #6
  7. Segments Time to Protect Smart Protection Network Slide #7
  8. Changing Malware Market Slide #8
  9. Increasing Threat { Malware Samples 1988: 1,738 1998: 177,615 2008: 1,100,000+ Pattern Files Can’t Keep Up Malware is Multiplying Malware is becoming increasingly dangerous and harder to detect. { Malware is Sophisticated Malware Variants Multi-Vector Polymorphic Rapid Variants { Malware Actions Stealthy Targeted Crime & Espionage Increased Liability Costs Malware is Profit-Driven Slide #9
  10. Underground Economy Sample data from research on the underground digital economy in 2007 Slide #10
  11. Projected Threats The Volume Problem Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) By 2015 233,000,000 Per Year Slide #11
  12. Smart Protection Network Slide #12
  13. Next generation architecture Threat Protection Databases Threat Protection Databases Threat Protection Databases Large Pattern DB Small Pattern DB Rapidly Updating Patterns > 50,000/day Slowly Updating Patterns < 50 Per Day Small CachePlus Mobile Pattern DB Multi-Threat Correlation Today Past Full Dynamic Reputation Some Dynamic Reputation Patterns Next Generation NEXT GENERATION TODAY PAST Slide #13
  14. Hybrid Client Enterprise Network Caches Pattern File Size Reduction Hybrid Client Cloud-based complementing traditional anti-malware pattern updates Some Traditional AV benchmarking may no longer be valid. Host-Based Behavioral Anti-Malware (HIPS) is Helpful Not Always Connected Performance Cache Slide #17
  15. Smart Protection Network Cloud-Client Hybrid (Formal Statement) It powers both on-premise and hosted solutions to protect users whether they are on the network, at home, or on the go, using light weight clients to access its unique in-the-cloud network of correlated email, Web and file reputation technologies, as well as threat databases. Customers’ protection is automatically updated and strengthened as more products, services and users access the network, creating a real-time neighbourhood watch protection service for its users. Slide #18
  16. Backend investment Category Collaboration Anti-Spam Operation Anti-Malware Operation Threat Research Operation Reputation URLs End User Query Traffic Web Crawler 3rd Party Sources URL Threat Research URLs in Spam Mails Customer Feedback URL Sourcing URL Analysis Automatic Rating Systems JIT Human Validation • 3.5 billion URL requests per day 20 million+ install base 99.9999%+ uptime • 5 data center (US, EMEA, APAC) 1000 production servers URL Database Malicious EXE or URLs URLs Category Zone Builder/Dispatcher Worldwide Services Dispatch Email Security Services URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points URL Services Query Points Email Reputation Services Category & Reputation Score OEM Partners DNS & HTTP Point Products TMUFE URL Filtering Service Web Reputation Service URLs with malware AV/AS Detection Signature or Heuristics Slide #19
  17. Backend Investment Competition are way behind. $ Many cannot make the investment Most utilize non-integrated third-party products Slide #20
  18. Key Infrastructure Components Real-Time Services Web reputation technology Email reputation technology File reputation technology Behavioural analysis Correlates multiple events from many sources Customer feedback Web Crawlers Honey Pots Trend Labs Other AV companies Prioritises further analysis Feedback Loop Backend Correlation Technology “Neighbourhood Watch” TrendLabs Specialized Threat Analysis Slide #21
  19. In-the-Cloud File Reputation Product Launch in 1H 2009 Part of Smart Protection Network In-the-Cloud Thin-Client File Scanning Rapid Protection from File Modifying Malware Extends Existing File Scanning Features Strengthens Data-Centre Correlation White/ Black Listing Functionality Virtualization Support Slide #22
  20. Already Live Slide #23
  21. SmartProtection NetworkProducts Slide #24
  22. { TIS & TIS Pro 2008, 2009 WBFS Standard & Advanced OfficeScan 8.x IWSS/IWSVA 3.x C&CS Web Reputation

    Smart Protection NetworkProduct Support

    { WFBS Advanced IMSS/IMSVA Advanced SPS IMHS Standard & Advanced (includes web reputation for embedded links within email) C&CS Email Reputation { File Reputation (Whitelisting) TIS & TIS Pro 2008, 2009 WFBS Standard & Advanced Slide #25
  23. Small Business Internet Worry-Free™ Remote Manager Threats Small Business Server/Exchange Gateway Desktop & Server Services Worry-Free Standard Gateway SecurityPartner SolutionsLinksys InterScan™ Messaging Hosted Security Worry FreeAdvanced Worry-Free™SecureSite Slide #26
  24. Medium Business Threats Mail Server Gateway Desktop & Server Services InterScan™ Web Security InterScan™ Messaging Hosted Security ScanMail™ OfficeScan™ InterScan™ Messaging Security Internet Client Server Messaging Suite NeatSuite™ Trend Micro LeakProof ™ Trend Micro Message Archiver 24 x 7 Support Slide #27
  25. Enterprise Business Management Threats Trend Micro Control Manager™ Gateway Endpoint Servers Services ScanMail™ InterScan™ Web Security InterScan™ Messaging Hosted Security OfficeScan™ IM Security for OCS Solution Internet InterScan™ Messaging Security ServerProtect™ SharePoint Portal Client Server Messaging Suite NeatSuite™ Trend Micro LeakProof ™ Trend Micro Message Archiver 24 x 7 Support Slide #28
  26. Wrap-Up Slide #28
  27. Smart Protection Network - Architecture Already Proven Over Many months (ERS & WRS) Data centres scale to enterprise Embedded in many TM products Still evolving -- FRS Hugely Reduced Pattern File Size Issues Works with disconnected laptops Reduces network bandwidth Near Real-Time Protection Minutes from malware resolution to End-User protection Trend Micro “Neighbourhood Watch” monitoring/ feedback Downloaded Pattern Files are Failing Memory Network bandwidth Update lag New architecture & framework needed Massive Differentiation Investment by TM Some competitors have some small pieces Slide #30
  28. Smart Protection Network - USP Removes Pattern Monitoring/ Management Less Network Traffic Smart Protection Network (USP) Protects Customers in Near Real Time Lightweight Clients, Less Memory Slide #31
  29. Smart Protection Network - USP Less Staff Time Reduced Costs Improved Productivity Lowered Data Theft Enhanced Legal Compliance Slide #32
  30. The End
More Related