Upload
agora-group
View
740
Download
2
Embed Size (px)
DESCRIPTION
Citation preview
Copyright 2011 Trend Micro Inc.
Mihai Butu, Territory Sales Manager SEEUR
Ondrej Kovac, Technical Sales Engineer EMEA
Trend MicroSecuring Your Virtual World
Copyright 2011 Trend Micro Inc.
Security That Fits
Trend Micro innovation enables benefits of next-generation IT platforms
1st LANServerSecurity
1st GatewaySecurity
1st ThreatManagementSolution(Network)
1st in NetbooksSecurity
1st IntegratedVirtualizationSecurity
1st CloudComputingSecurity
Founded in United States in 1988; Headquarters in Tokyo, Japan
Employees: 4,846;
Locations: 29 Offices Worldwide
> $1 Billion Annual Revenue > $1.7 Billion Total Assets
#1 in Virtualization & Corporate Server Security
Top 3 in Messaging, Web and Endpoint Security
A Leader in Cloud Security
Copyright 2011 Trend Micro Inc.
Security That Fits
#1Real-world OnlineTesting
Blocking Billions of Threats Daily
3.5 NEW Threats Every
Second
Blocking Billions of
Threats Daily
3.5 NEW Threats Every
Second
The Smart Protection Network infrastructure stops threats in the cloud, before they reach you
102,736,240
4,085,177,256
4,040,017,176 39,408,960 5,751,120
#1Real-world
OnlineTesting
Note: If multiple products from one vendor were evaluated, then vendor’s vest performance is listed.
*1 : http://www.trendmicro.co.jp/protection*2 : http://www.nsslabs.com/research/endpoint-security/anti-malware/q3-2009-endpoint-protection-group-test-report-socially-engineered-malware.html*3 : http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf*4 : http://www.nsslabs.com/research/endpoint-security/anti-malware/consumer-anti-malware-products:-group-test-report-q3-2010.html
Ran
kin
g
1
2
3
4
5
6
7
8
9
10
11
ESETSymantec KasperskyMcAfeeTrend Micro
ConsumerproductsSep 2010*4
CorporateproductsJun 2010*1
CorporateproductsJun 2010*1
ConsumerproductsJul 2010*3
CorporateproductsOct 2010*2
SMBproductsOct 2010*2
ConsumerproductsDec 2010*3
Trend Micro’s real-world protection validated by third-party test labs
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 20100
2,000,000
4,000,000
6,000,000
8,000,000
10,000,000
12,000,000
14,000,000
16,000,000
18,000,000
20,000,000
New unique samples added to AV-Test's malware repository (2000-2010)
Dec
Nov
Oct
Sep
Aug
Jul
Jun
May
Apr
Mar
Feb
Jan
Copyright 2011 Trend Micro Inc.
- #1 in server security, #1 in virtualization security
- First and only agentless security suite built for virtualization
- First company to offer security for the cloud
- 2011 VMware Technology Alliance Partner of the Year
Trend Micro – Leader in Datacenter Security
Copyright 2011 Trend Micro Inc.
Platform-specific Security Risks
Visibility & Threats
• Less visibility
• More external risks
Performance & Threats
• Security degrades performance
• New VM-based threats
Manageability
• Glut of security products
• Less security
• Higher TCO
Virtual CloudPhysical
Reduce Complexity Increase Efficiency
Integrated SecuritySingle Management Console
Deliver Agility
Copyright 2011 Trend Micro Inc.
Resource Contention1
Security Inhibitors to Virtualization
Inter-VM Attacks / Blind Spots3
Instant-on Gaps2
Management Complexity4
3:00am Scan
Copyright 2011 Trend Micro Inc.
Virtual CloudPhysical
Trend Micro Deep Security A server security platform for:
Deep Packet Inspection
IDS / IPSWeb App.Protection
ApplicationControl
Firewall IntegrityMonitoring
Anti-malware
LogInspection
Copyright 2011 Trend Micro Inc.
vShieldEndpoint
Antivirus
Agentless2
Security Virtual Machine
vSphere
Agentless
VMsafeAPIs
IDS / IPS
Web Application Protection
Application Control
Firewall
1
Security agent on individual VMs
Log Inspection4
Agent-based
Integrates with vCenter
Integrates with vCenter
Trend Micro Deep Security
Integrity Monitoring vShieldEndpoint
3Agentless
Deep Security 8Agentless Security for VMware
Integrity Monitoring
3
Copyright 2011 Trend Micro Inc.
Deep Security 8 Agent-based Anti-malware
• New Agent-based form factor extends protection to physical operating systems – Windows and Linux
• Agent-based AV also protects Hyper-V & Xen-based virtual servers, and virtual desktops in local mode
• Web reputation services through integration with Smart Protection Network protects systems/users from access to malicious websites
WEB REPUTATIONSERVICES
Anti-malware
Deep PacketInspection
IntegrityMonitoring
Firewall
LogInspection
Hyper-V & Xen-based Virtual Servers
VDI Local Mode
Copyright 2011 Trend Micro Inc.
Deep Security ArchitectureDeep SecurityManager
Reports
Deep Security Agent
Deep Security Virtual Appliance
Modules:• DPI & FW• Anti-malware • Integrity Monitoring• Log Inspection
Modules:• DPI & FW• Anti-malware• Integrity Monitoring
2
1
3Deep Security Agent
5
Cloud Integration
4
Modules:• Data Protection
SecureCloud
Threat Intelligence Manager
Single PaneScalable Redundant
Copyright 2011 Trend Micro Inc.
Increasing data security
Servers authentication
before being granted access
to sensitive data
Data is secured using strong
encryption
Protecting data at Rest and in
Motion
Combination of host-based
security, encrypted data,
and strong server
authentication
Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloudHow It Works
Enterprise Key
Enterprise Datacenter or SaaS Offering Cloud Service Provider
Trend Micro SecureCloud Console
Shared Storage
VMCorporate
AppVM VM VM
Hypervisor
My Data
Copyright 2011 Trend Micro Inc.
Trend Micro SecureCloudHow It Works
Trend Micro SaaS Solution
Key Management Deployment Options
Encryption Support
Or
Data Center Software Application
VM VM VM VM
VM VM VM VM
SecureCloudConsole
Private Clouds
PublicClouds
vSphere Virtual
Machines
VM VM VM VM
Copyright 2011 Trend Micro Inc.
VM VM VM VMVM VM VM VMVM VM VM VM
Data Center Private Cloud Public Cloud
VMware vCloud
vCloud Director
VMware vSphere
Trend Micro SecureCloudFitting Into a VMware Ecosystem
Encryption throughout your cloud journey—data protection for virtual & cloud environments
Trend Micro SecureCloud
Copyright 2011 Trend Micro Inc.
Deep Security 8: Key benefits
Prevents Data Breaches & Business Disruptions
Enables Compliance
Supports Operational Cost Reductions
Provides layered defense against sophisticated attacks
Shields against known and unknown vulnerabilities
Monitors system and hypervisor integrity
Web reputation prevents malicious website access
Supports more PCI DSS 2.0, NIST, HIPAA & other regulations
Detailed reports document prevented attacks & compliance status
Prioritize secure coding efforts
Manage unscheduled patching
Cloud-based event whitelisting &Trusted events simplify FIM mgmt
Agentless architecture accelerates realize virtualization savings
Integration to enterprise platforms & apps lowers costs