slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor PowerPoint Presentation
Download Presentation
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor

Loading in 2 Seconds...

play fullscreen
1 / 16

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor - PowerPoint PPT Presentation


  • 105 Views
  • Uploaded on

Trend Micro Deployment Kelvin Hwang IT Services University of Windsor. Agenda Definition of Malware Malware Characteristics Malware Evolution Google’s Study Challenges in Educational Environment Solution - Web Reputation Service Test & Results Overall Experience

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Trend Micro Deployment Kelvin Hwang IT Services University of Windsor' - zahina


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

Trend Micro Deployment

Kelvin Hwang

IT Services

University of Windsor

slide2

Agenda

  • Definition of Malware
  • Malware Characteristics
  • Malware Evolution
  • Google’s Study
  • Challenges in Educational Environment
  • Solution - Web Reputation Service
  • Test & Results
  • Overall Experience
  • Enough Protection?
  • Questions ?
slide3

Definition of Malware

A malicious software that is designed to specifically damage or disrupt a system, such as:

    • Virus
    • Worm
    • Trojan Horse
    • Bot
slide5

Malware Evolution

  • Diskettes
  • Network shares
  • Email(e.g. LoveLetteremail worm)
  • Peer to Peer networks (P2P)
  • The World Wide Web

Reasons:

    • Malicious file size is getting bigger
    • End users have more knowledge
    • Use of Mobile code
slide6

Google’s Study

The Ghost In The Browser – Analysis of Web-based Malware (NielsProvos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and NagendraModadugu Google, Inc.)

Google closely analyzed 4.5 million web pages over the course of a year (March 2006 – March 2007) and found that approximately 10 %, or 450,000, had the capability of installing malware withoutusers' knowledge.

slide7

Challenges in Educational Environment

  • Academic Freedom.Campus community is sensitive to:
    • Blocking
    • Filtering
    • Logging
  • Local Administrator Rights
slide8

Solution - Web Reputation Service

  • Prevention is always better than treatment
  • Web Reputation works in real time to prevent both users and applications from accessing malicious or infiltrated websites
  • Credit check for Web sites (Check before visit)
  • Based on threats not categories
slide9

Solution - Web Reputation Service (Continue)

Web site “reputation” score is assigned based on:

  • Threat Types

1. "a Web threat"

2. "very likely to be a Web threat"

3. "likely to be a Web threat"

slide10

Solution - Web Reputation Service (Continue)

  • Security Levels
    • High: Blocks URLs that are unrated, a Web threat, very likely to be a Web threat, or likely to be a Web threat
    • Medium: Blocks URLs that are unrated, a Web threat, or very likely to be a Web threat
slide11

Solution - Web Reputation Service (Continue)

    • 3. Medium-low: Blocks URLs that are a
      • Web threat or very likely to be a Web
      • threat
    • 4. Low: Blocks only URLs that are a Web
  • threat
slide12

Test & Results

  • Monday – Friday, 9AM – 3PM October 2007
  • 15,000 URLs Blocked
  • 41% reduction in the number of infected machines
  • 81% reduction in the number of detected malware.
  • One unblock request
slide13

Overall Experience

  • Trend Micro deployment in 2002 (quarantined malware 300 - 400 daily)
  • Add new protection without extra equipment:
    • Intrusion Defense Firewall Plugin
    • Trend Micro Security for Mac Plugin
    • Mobil Security Plugin
    • Virtual Desktop Support Plugin
slide14

Overall Experience (Continue)

  • Web Threat Protection (30,000URLs blocked monthly)
  • Device Control to handle autorunvirus
  • Helpdesk virus related calls:
    • 2001 – 12 %(Before Trend Micro)
    • 2009 – 0.4 %(Productivity increased)
  • Campus departments begin to use IT Services anti-virus solution
slide15

Enough Protection?

  • User Education
    • OS & application updates
    • Use anti-virus application & firewall
    • Use different web browser
    • Surfing carefully (Be careful with
    • popup, plug-ins, warnings, links.…)
    • Disable autorun
  • Security compliance monitoring