Professional Documents
Culture Documents
Infection
Exfiltration (Sendspace)
Information to C&C
http://blog.trendmicro.com/trojan-abuses-sendspace-a-closer-look/
Copyright 2012 Trend Micro Inc.
Outside-In
Security
Inside-out Security
Endpoints Datacenters
Self-Secured Workload
Local Threat Intelligence When-Timeline Aware
Who-Identity Aware
Where-Location Aware InsideOut Data
Data Protection
Security
What-Content Aware
User-defined Access Policies Encryption
Physical
Manageability
Virtual
Performance & Threats
Cloud
Visibility and Threats
Less visibility
Detects and blocks known and zero-day attacks that target vulnerabilities Provides increased visibility into, or control over, applications accessing the network Detects and blocks malware (web threats, viruses & worms, Trojans) Detects malicious and unauthorized changes to directories, files, registry keys
Reduces attack surface. Prevents DoS & detects reconnaissance scans Optimizes the identification of important security events buried in log entries
Firewall
Anti-Virus
Log Inspection
Integrity Monitoring
Key Challenge: Too many consoles, isolated policies Need: Consolidate disparate security products in 1 integrated agent & console
Deep Security 7.5 Firewall, IDS/IPS, File integrity monitoring and log inspection agent
Deep Security 8 is the server security platform that protects servers with ONE integrated agent & console
Deep Security 8 Added antivirus agent supporting both Windows and Linux environments Easy to use FIM with golden hosts & cloud-based event whitelisting
Copyright 2012 Trend Micro Inc.
Key Challenge: Consolidation limits due to performance & resource inefficiency Need: Integrate security at the hypervisor level via a virtual appliance Deep Security 7.5
Agentless antivirus Deep Security 8 Agentless file integrity monitoring Hypervisor integrity via Intel TPM/TXT Web reputation services integration for improved VDI protection
Copyright 2012 Trend Micro Inc.
Deep Security 8 will lower barriers to adoption for FIM and enable greater security with zero added footprint
Key Challenge: Data security in the cloud Need: Enable path to private, public or hybrid cloud with added data security, management APIs and multi-tenancy support Deep Security 8 with SecureCloud 1.2 Support for bare metal and virtual infrastructure without cloud API
Amazon, vCloud
Deep Security 8 with SecureCloud 2 will provide contextaware data security necessary for ALL cloud environments
Deep Security 8.0 with SecureCloud 2 Deep Security Manager integration FIPS 140-2 certification Key revocation, rotation & lifecycle mgmt
Copyright 2012 Trend Micro Inc.
Deep Security 8
Context Aware
Credit Card Payment SecureCloud 2 Patient Medical Records Sensitive Social Security Research Numbers Results Information
Raimund_Genes@trendmicro.com