De presentatie wordt gedownload. Even geduld aub

De presentatie wordt gedownload. Even geduld aub

Classificatie 9/18/2016 Naam presentator Functie presentator Trend Micro the further is in the could Caroline Van Cleemput Channel Account manager.

Verwante presentaties


Presentatie over: "Classificatie 9/18/2016 Naam presentator Functie presentator Trend Micro the further is in the could Caroline Van Cleemput Channel Account manager."— Transcript van de presentatie:

1 Classificatie 9/18/2016 Naam presentator Functie presentator Trend Micro the further is in the could Caroline Van Cleemput Channel Account manager

2 Copyright Trend Micro Inc. Company Overview Founded Headquarters Employees Market 2008 Revenue CEO | Eva Chen United States in 1988 Tokyo, Japan 4,120 Internet Content Security US $985 Million* 10 global TrendLabs locations; 9 global R&D centers Tokyo Stock Exchange (4704) CEO | Eva Chen * For 2008, Trend Micro consolidated net sales were101,707 million Yen (or U.S. $985 million, JPY=1USD)

3 Copyright Trend Micro Inc. Web Filtering InterScan WebManager Software as a Service SecureCloud™ Web Threat Protection Web Reputation Web-based Centralized Management Trend Micro Control Manager Network Access Control Network VirusWall™ Reputation Services Gateway Virus Protection InterScan™ 2-Hour Virus Response SLA LAN Server Virus Protection ServerProtect™ Continuous Innovation Server-based Virus Protection ScanMail™ Threat Lifecycle Management Strategy Enterprise Protection Strategy (EPS) Trend Micro and Cisco Integrated Security in the Network Integrated Gateway Content Security InterScan Messaging Security Suite Botnet Identification Service Our #1 goal is to create value for our customers through continuous innovation Compliance Message Archiver & Encryption Data Leak Prevention LeakProof™ Trend Micro Smart Protection Network

4 Copyright Trend Micro Inc. TrendLabs Threat Research and Support More than 1,000 threat research, service, and support experts at 10 locations 24/7 operations Real-time alerts for new threats TrendLabs sm helps provide a worldwide platform for delivering timely threat intelligence, service, and support anytime, anywhere. Mexico New Jersey, USA Paris, FranceBavaria, Germany Cork, Ireland Tokyo, Japan Taiwan, ROC Shanghai, China TrendLabs HQ, Philippines Lake Forest, USA Protection requires more than a product… It requires service—timely and expert service.

5 Copyright Trend Micro Inc. 9/18/ Classificatie Probleem (pijnpunten) Meer bedreigingen, riskanter gedragNieuwe, slimmere aanpak Worry-Free Business Security 6.0 Samenvatting Agenda

6 Copyright Trend Micro Inc. Threat Environment Evolution to Crimeware Complexity Crimeware Spyware Spam Mass Mailers Intelligent Botnets Web Threats Information Stealing Botnet Enabled Multi-Vector Multi-Component Web Polymorphic Rapid Variants Single Instance Single Target Regional Attacks Silent, Hidden Hard to Clean Vulnerabilities Worm Outbreaks

7 Copyright Trend Micro Inc. It’s All About the Money TODAY Past 14- to 34-year- old male PC addict No permanent girlfriend Hack for notoriety Professional Cybercriminal Create and rent vast botnets of compromised PCs Create Malware Purely for PROFIT Steal personal and corporate information Ransom proprietary information Generate fraudulent ad revenue

8 Copyright Trend Micro Inc. Infectie pad Internet ARRIVAL INFECTION ROUTINEPAYLOAD , website,.. TriggerDownloading componentsInterAction with Server Web based malwareFinancial motivated

9 Copyright Trend Micro Inc. 9/18/ Classificatie Bedreigingen nemen toe in omvang en complexiteit Webbedreigingen 850 nieuwe, unieke malware-samples per uur

10 Copyright Trend Micro Inc. 9/18/ Classificatie Complexiteitsfactoren 2 miljoen 7 miljoen 13 miljoen > 20 miljoen 500, Uitdijende patroonbestanden belasten endpoints  Geheugenbelasting endpoints stijgt  Prestatievermogen endpoints wordt aangetast  Bandbreedtegebruik neemt toe  Patroonbeheer neemt toe Exponentieel groeiend aantal unieke malware-aanvallen

11 Copyright Trend Micro Inc. 9/18/ Classificatie Pijnpunten bij de beveiliging van kleine ondernemingen (minder dan 100 medewerkers) Riskant gedrag - meer dan helft medewerkers bezoekt niet-werkgerelateerde websites Complexiteit van oplossing - inzet/configuratie kost te veel tijd Aantasting prestatievermogen - prestaties voornaamste overstapreden voor klanten Effectiviteit van bescherming - ~90% antivirus, helft nog steeds geïnfecteerd

12 Copyright Trend Micro Inc. 9/18/ Classificatie Nieuwe, slimmere aanpak

13 Copyright Trend Micro Inc. 9/18/ Classificatie Smart Scan – nieuw! Smart Feedback – nieuw! Bescherming tegen webbedreigingen, reputatie Belangrijkste Smart Protection Network Nieuwe, slimmere aanpak van beveiliging

14 Copyright Trend Micro Inc. 9/18/ Classificatie reputatie*: 95% van alle spam wordt tegengehouden Bescherming tegen webbedreigingen: per dag worden 50 miljoen IP-adressen en URL's verwerkt Smart Protection Network Bescherming tegen webbedreigingen, reputatie *Advanced uitvoering Webbedreigingen en spam worden tegengehouden VOORDAT ze de onderneming bereiken

15 Copyright Trend Micro Inc. 9/18/ Classificatie Smart Protection Network Smart Scan Lokale beveiligingsserver 80% patroonbestand 20% patroonbestand Effectievere bescherming Minder aantasting van prestatievermogen

16 Copyright Trend Micro Inc. 9/18/ Classificatie Smart Protection Network Smart Feedback KLANTEN Automatisch feedback over beveiligingsgerelateerde gebeurtenissen Snellere reactie op nieuwe bedreigingen

17 Copyright Trend Micro Inc. 9/18/ Classification A compromised web site One click in a link. Fake news by . Correlation - Smart Protection Network TROJ_CHOST.E A fake video A lot can happen in a minute REPUTATION WEB REPUTATION FILE REPUTATION

18 Copyright Trend Micro Inc. 9/18/ Classificatie Trend Micro solutions Worry-Free Business Security 6.0

19 Copyright Trend Micro Inc. Oplossingen per marktsegment ConsumentKMOGrote Organisaties Client + gratis tools Trend Micro Enterprise Security Time2Protect

20 Copyright Trend Micro Inc. Trend Micro Multi-Layered Architecture for the Enterprise Reputation Anti-Spyware Antivirus Anti-Spam Anti-Phishing Inappropriate Content EXTERNAL THREATS Viruses Spyware & Adware Spam & Phishing Web Threats INTERNAL THREATS Information Leaks Compliance Vulnerabilities Threats Endpoint Gateway Services Servers Management InterScan Web Security Solutions InterScan Messaging Security Solutions ScanMail Solutions IM Security for LCS Solution ServerProtect Security Solutions SharePoint Portal Security Solution OfficeScan Client Security Solution LeakProof Data Leak Prevention Solution Trend Micro Mobile Security Solution Web and Reputation InterScan Messaging Hosted Security OfficeScan Client Security Solution Off Network Trend Micro Control Manager

21 Copyright Trend Micro Inc. 21 Trend Micro Worry Free Security for Small Business Threats Desktop & Server Gateway Services SBS Server/ Exchange Worry Free Business Security Advance Worry Free Business Security InterScan Messaging Hosted Security Internet Reputation Anti-Spyware Antivirus Anti-Spam Anti-Phishing Inappropriate Content Gateway Security ISVW 6.02 Worry-Free Remote Manager Internet

22 Copyright Trend Micro Inc. 9/18/ Classificatie Worry-Free Small Business-oplossingen

23 Copyright Trend Micro Inc. 9/18/ Classificatie WFBS 6.0 beschermt kleine ondernemingen… Meer bedreigingen tegengehouden voordatze computers bereiken Effectievere bescherming: sneller scannen,frequentere updates Speciaal voor kleine ondernemingenontworpen oplossing zonder beheer Steviger Slimmer Simpeler

24 Copyright Trend Micro Inc. 9/18/ Classificatie Lijst met belangrijkste nieuwe functies/updates in 6.0 Smart Scan - effectievere bescherming, sneller scannen, prestatievermogen pc's blijft vrijwel onaangetast URL-filtering (endpoint) - medewerkers blijven geconcentreerd, veilig door slechte URL's te blokkeren Verbeterde bewaking gedrag toepassingen Bescherming tegen bedreigingen van USB-apparaten - virussen van geïnfecteerde USB-apparaten worden tegengehouden Smart Feedback - snellere identificatie van en reactie op nieuwe bedreigingen Besturing scanprestaties - scan onderbreken als CPU-gebruik te hoog is Minder belasting door agent, kleiner downloadpakket Geïntegreerde installatie met Worry-Free Remote Manager (kanaalpartners) Configuratie-instellingen importeren/exporteren Nieuwe functies/updates Standard/ Advanced 6.0 Bescherming Voor partners Prestaties

25 Copyright Trend Micro Inc. 9/18/ Classificatie Trend Micro verslaat de concurrentie, Symantec en McAfee Symantec Trend Micro McAfee "...Worry-Free Business Security Security is op elk punt de beste oplossing…" - West Coast Labs "...Worry-Free Business Security Security is op elk punt de beste oplossing…" - West Coast Labs

26 Copyright Trend Micro Inc. 9/18/ Classificatie Belangrijkste redenen om Worry-Free te verkiezen boven de voornaamste concurrenten  Hoe houdt u webbedreigingen tegen voordat ze pc's bereiken? Met inbegrip van beveiliging tegen webbedreigingen  Hoe houdt u endpoints doorlopend bijgewerkt tegen nieuwe bedreigingen en scant u sneller, terwijl het prestatievermogen van pc's vrijwel onaangetast blijft? Met Smart Scan  Hoe biedt u meer bescherming tegenover webbedreigingen en zorgt u ervoor dat de productiviteit stijgt? Met inbegrip van URL-filtering  Hoe houdt u effectief spam tegen voordat Exchange-servers worden bereikt en beschermt u lokaal Exchange-servers? Met inbegrip van meerlaagse spambescherming  Past automatisch de beveiligingniveau aan op basis van de locatie van de computer. Lokatie bewust functionalieit

27 Copyright Trend Micro Inc. 9/18/ Classificatie Samenvatting  850 unieke aanvallen per uur (in heel 1988 slechts 1738) Malware-omgeving wordt steeds erger  Eerste prioriteit, belangrijkste investering Kleine ondernemingen niet afdoende beschermd  Smart Protection Network Nieuwe aanpak noodzakelijk  Worry-Free Business Security 6.0 Nieuwe oplossing  Niet alleen producten; Worry-Free Remote Manager Trend Micro -- de juiste keuze als beveiligingspartner

28 Copyright Trend Micro Inc. 9/18/ Classificatie Dank u wel Zijn er nog vragen?

29 Copyright Trend Micro Inc. 9/18/ Classificatie  51%* minder geheugengebruik  22% minder netwerkverkeer bij inzet client-software  6% hogere scansnelheid  6% snellere opstarttijd Waarom moet ik een upgrade uitvoeren naar 6.0?  Smart Scan - sneller scannen, frequentere updates  URL-filtering (endpoint) - medewerkers blijven geconcentreerd, veilig door slechte URL's te blokkeren  Verbeterde bewaking gedrag toepassingen  Bescherming tegen bedreigingen van USB- apparaten - virussen van geïnfecteerde USB-apparaten worden tegengehouden Effectievere bescherming Betere prestaties Belangrijke nieuwe functies met onder meer de volgende verbeteringen: * In vergelijking met versie 5.0

30 Copyright © 2009 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 30 Juniper Networks Security Portfolio Peter Vervloedt Kappa Data

31 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 31 Juniper Networks Product Portfolio  Juniper Networks' focus on technology, leadership and technical excellence has produced an award- winning portfolio of secure and dependable platforms. Juniper offers a premier line of diverse networking and security products.  Product Categories: Application Acceleration Routing Switching Security

32 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 32 Security Portfolio  Within the Security Portfolio, Juniper Networks offers best of breed solutions in the areas of: Firewall/IPSec VPN SSG Series (Secure Services Gateway) ISG Series (Integrated Security Gateway) Intrusion Detection & Prevention IDP Series SSL VPN SA Series (Secure Access) Unified Access Control IC Series (Infranet Controller)

33 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 33 Today, modern networks should aim for:  Cost efficiency Investment Maintenance & administration  Security Against external threats (outside-in) Against internal threats (inside-out)  High performance Gbps LAN, multiple Mbps WAN  Reliability & high availability

34 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 34 Public servers Private servers Local applications IP connected equipment Local computersMobile devicesGuest computers Critical data Secured Internet Access Firewall Site to Site VPN Intrusion Detection & Prevention JUNIPER SRX Series Secure Access for employees, partners,... SSL VPN JUNIPER EXSeries Authentication of users and devices Unified Access Control JUNIPER IC Series Intrusion Detection & Prevention JUNIPER IDP Series

35 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 35 Firewall VPN IDP UTM Juniper Networks’ SRX series

36 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 36 CONSOLIDATION CONVERGENCE CONNECTIVITY Three key market drivers VoIP Analog Fax WLA N AP Security Camera Power Over Ethernet Antispam Antivirus IPS Web filtering UTM  Network migration to multi-service platform— “Secure Router” instead of multiple appliances  Secure Router = –Router + Firewall + VPN + Switching –Unified Threat Management UAC Content Filtering Routing Ethernet Switching Firewall IPSec VPN 3G PSTN MPLS Internet Metro NETWORK SECURITY Voice and Data  VoIP Gateway and VoIP handsets  Power over Ethernet  Wireless Access Points  Internet  Metro Ethernet  MPLS FREE LICENSED  Wireless WAN 3G  PSTN

37 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 37 Unified Threat Management (UTM) Features Websense to block to unapproved site access Web Filtering Kaspersky Lab AV stops Viruses, file-based Trojans, Spyware, Adware, Keyloggers Kaspersky Lab AV stops viruses, file- based trojans or spread of spyware, adware, keyloggers Antivirus Symantec stops Spam / Phishing Anti-spam Juniper IDP detects/stops Worms, Trojans, DoS (L4 & L7), Scans IPS Firewall, VPN, Unified Access Control Core Security Firewall, VPN, Unified Access Control SRX Series blocks transmission of files for Data Loss Prevention Content Filtering Internal Threats External Threats INTERNET Juniper IDP detects/stops Worms, Trojans, DoS (L4 & L7), Scans

38 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 38 Using high-performance networking to reduce complexity Juniper High-Performance Network Learn and configure one OS Use fewer boxes Simplify software management OS #1 Firewall/VPN Switch Router Voice gateway UTM IPS Access Control OS #3OS #4OS #2 Legacy Network Dynamic Services Architecture Firewall/VPN Switch Router Voice gateway UTM IPS Access Control High-performance network Scalable Fast Reliable Secure Simple

39 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 39  Highly configurable Fixed, semi-modular, and modular form factors Choice of WAN, wireless, and LAN interfaces Available voice media gateway   Extensive integration Full suite of JUNOS routing and switching capabilities Unmatched security, including FW, VPN, UTM, UAC, and full IPS  Exceptional performance and availability Hardware-assisted Content Security Acceleration for ExpressAV and IPS Control & data plane separation, redundant processing and power New SRX Services Gateways Leveraging Juniper’s Dynamic Services Architecture ModelConfiguration SIP Gateway Content Security Acceleration FW/IPS Performance SRX100  FixedNo 600/50 Mbps SRX2101 mini PIM slot Optional  Optional750/80 Mbps SRX2404 mini PIM slots Optional  Optional1500/250 Mbps SRX6508 GPIM slots Optional  Standard7000/900 Mbps  Roadmap

40 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 40 The SRX Branch portfolio 2009 Large Branch/Regional Office Telecommuter/Small Office SRX 100 Small to Medium Office SRX 210 SRX 240 SRX WAN slot, 2 x Gig E, PoE + 4 WAN slots, 16 x Gig E + More LAN slots, dual processors, dual P/S NSM Centrally managed by NSM

41 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 41 Typical Deployment

42 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 42 Juniper Networks Unified Access Control (UAC) UAC AgentEX Series L2 Switch 802.1X Switches & Access Points APPLICATIONS Juniper Firewall Platforms POLICY SERVER Identity Stores IC Series 1 UAC Enforcement Points DataAppInternet NSSSG ISG Control Access to Protected Resources Dynamically Provision Policy Enforcement Authenticate User, Profile Endpoint, Determine Location Comprehensive, vendor-agnostic, standards-based access control across heterogeneous environments delivering investment protection 1 SRX

43 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 43 Network Security Manager Along with SRX, NSM Manages Juniper’s entire enterprise portfolio

44 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 44 Security Threat Response Manager  STRM supports SRX Series –Intrusion Prevention System (IPS) –220+ out-of-the box report templates –Fully customizable reporting engine: creating, branding and scheduling delivery of reports –Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA –Reports based on control frameworks: NIST, ISO and CoBIT

45 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 45 Remote Access Solutions Secure Access

46 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 46 Branch Office HQ Mobile Users Managed, TrustedRemote Network Security IP to IP controlControl Requirement Network AccessAccess Requirement IPSec VPN VPN Type Fixed Site-to-SiteType of Connection Remote/Branch Office Application Type Unmanaged, Untrusted Remote Network Security User to Application controlControl Requirement Per Application AccessAccess Requirement SSL VPN VPN Type Mobile or FixedType of Connection Employee Remote Access, Telecommuter, Mobile User, Partner Extranet and Network access Application Type Telecommuters Partners, Customers, Contractors Internet Kiosk Remote Office IPSec VPN vs. SSL VPN Managed Type of Endpoint Device Managed, Unmanaged Type of Endpoint Device Internet

47 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 47

48 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 48

49 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 49

50 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 50 End-Point Security - Host Checker - Virus Airport Kiosk Mobile User Home PC User Managed PC User Host Checker - Check devices before & during session - Ensure device compliance with corporate policy - Remediate devices when needed - Cross platform support - No Anti-Virus Installed - Personal Firewall enabled - User remediated  install anti-virus - Once installed, user granted access - AV Real-Time Protection running - Personal Firewall Enabled - Virus Definitions Up To Date - User granted full access - No anti-virus installed - No personal firewall - User granted minimal access

51 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 51

52 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 52 Public servers Private servers Local applications IP connected equipment Local computersMobile devicesGuest computers Critical data Secured Internet Access Firewall Site to Site VPN Intrusion Detection & Prevention JUNIPER SRX Series Secure Access for employees, partners,... SSL VPN JUNIPER SA Series Authentication of users and devices Unified Access Control JUNIPER IC Series Intrusion Detection & Prevention JUNIPER IDP Series Overview Next? Protect Your Endpoints...

53 Copyright © 2009Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 53 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 53


Download ppt "Classificatie 9/18/2016 Naam presentator Functie presentator Trend Micro the further is in the could Caroline Van Cleemput Channel Account manager."

Verwante presentaties


Ads door Google