SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Trend Micro Data Protection
Product announcements September 2011
Background and upgrade notes on ScanMail™ for
Exchange 10.2, PortalProtect for SharePoint 2.1 and
InterScan™ Messaging Security 8.2
                                Copyright 2011 Trend Micro Inc.
The situation
• Data protection is a growing concern for organizations as more
  stringent privacy regulations take effect and data breaches continue.
• Despite this, many organizations struggle with complexity and cost of
  standalone data loss prevention (DLP) solutions.
• Malicious URLs are now the #1 email threat and are twice as common
  as malicious attachments.

“2011 has been the year of phishing attacks, as proven by the high-profile entry point for attacks
  at RSA, Oak Ridge National Laboratory and International Monetary Fund,” said John Maddison,
    executive GM of data center business unit for Trend Micro. “Targeted phishing emails often
  don’t resemble spam and typically contain social engineering that entice an unsuspecting user
            to click on a link to a website where malware will be silently downloaded.”




                                              Copyright 2011 Trend Micro Inc.
September 19th news overview
• Today, Trend Micro is delivering on its promise of expanding its Data
  Protection portfolio announced in February 2011 by providing additional
  DLP functionality as a module in many of our award winning security
  platforms. Today’s product announcements include:
   – ScanMail™ for Exchange 10.2
   – PortalProtect for SharePoint 2.1
   – InterScan™ Messaging Security 8.2

• Trend Micro Data Protection has a breadth of integrated data protection
  products to protect, control and encrypt.
• While other vendors may have DLP capabilities built into a single
  product, Trend Micro has integrated DLP capabilities for email servers,
  collaboration servers, virtual gateway appliances and endpoint
  protection.



                                     Copyright 2011 Trend Micro Inc.
Key New Features in ScanMail for
Microsoft Exchange 10.2
• SMEX is the only mail-server-based security product with a web
  reputation service to block email containing malicious URLs in addition
  to scanning for content and viruses.
• New Features
   – Second-generation Data Loss Prevention (DLP) Lite
       • With data validators, compliance templates, and over 40 worldwide data identifiers for custom
         templates
   – Malicious URL detection
       • Inside attachments in addition to the message body
   – New Local Smart Protection Server
       • Increases performance and reduces network latency

• Why add Data Protection at the mail server?
   – Mistakes happen such as a Richmond School District where personnel information
     was accidentally distributed to all email users at the district. The district was forced to
     shut down email for the day, explain themselves on the nightly news and possibly pay
     for identity theft protection for the affected employees: http://www.wtvr.com/news/wtvr-email-puts-
     richmond-school-emp-110410,0,5022273.story


                                                  Copyright 2011 Trend Micro Inc.
Key New Features in PortalProtect for
Microsoft SharePoint 2.1
• PortalProtect the only major security solution on the market today that
  protects SharePoint as a social collaboration tool, in addition to a file-
  sharing tool.
• New Features
   – Second-generation DLP Lite
      • With data validators, compliance templates, and 36 worldwide data identifiers for custom
        templates.
   – Local Smart Protection Server
      • Increases performance and reduces network latency
   – Support for remote BLOB storage
      • Enables use of more scalable and less expensive storage outside of SharePoint while
        maintaining security controls

• Why add Data Protection for SharePoint?
   – Administrative need visibility into what is in their SharePoint. For example at the
     Mississippi personnel records, including names, contact info, and social security
     numbers, were posted to a publically accessible SharePoint site for 1 month before a
     privacy watchdog group informed administrators of the problem:
     http://www.armytimes.com/news/2010/10/ap-mississippi-guard-information-breach-100810/

                                                   Copyright 2011 Trend Micro Inc.
Key New Features for InterScan
Messaging Security 8.2
• InterScan Messaging helps enterprise IT professionals deal with their
  growing regulatory compliance and data protection challenges.
• New Features
   – A new Data Privacy and Email Encryption module
   – A widget-based dashboard for easy administration
   – Virtual appliance support for Microsoft Hyper-V
      • In addition to VMware and a bare-metal software appliance



• Why add Data Protection at the messaging gateway?
   – Last chance to prevent privacy data from leaving the network via email
   – Eases compliance, reduces risk, protects digital assets
   – Email Encryption and DLP work together – if controlled data is detected it
     can be automatically encrypted



                                              Copyright 2011 Trend Micro Inc.
Background on Trend Micro
Data Protection



            Classification   Copyright 2011 Trend Micro Inc.
Trends Shaping Data Protection

 More Stringent           Growing penalties and notification
 Regulations              requirements
                                                                                               Data protection
                                                                                               should be a key
                                                                                               element in any
 Increasing               200 M laptops, 174 M smart phones and                                enterprise data
 Mobility                 250 M flash drives sold in 2009.                                     security strategy


                          Through 2015, mitigating data breaches
 Rising Frequency &       will cost 10 times more than installing
 Cost of Data Breach      data protection mechanisms on mobile
                          devices

                          Data storage in multi-tenant
 Cloud Computing          environments create unique privacy
                          and security challenges

     Sources: IDC, Gartner, Ponemon Institute, Santa Clara Consulting
     Group, Identity Theft Resource Center
                                  Classification 3/28/2013   Copyright 2011 Trend Micro Inc.
Trend Micro vision:
A world safe for exchanging digital information




                                                                            Cloud




                                                                  Virtual


          i

                            Physical

                            Copyright 2011 Trend Micro Inc.   9
Data Protection Customer Challenges


                                      Too
                                    complex
       Too
    expensive


     Hard to
     manage

                  Classification   Copyright 2011 Trend Micro Inc. 10
Trend Micro Data Protection
Encrypt. Control. Protect. – Endpoint to Cloud

     “Trend Micro Data Protection ensures the
     availability, integrity and confidentiality of business
     information by protecting it against
     damage, loss, and unauthorized access.
     It means keeping your data safe, wherever it
     resides, from intentional or unintentional harm”




     Encryption                       Device Control                                       DLP


                           Classification 3/28/2013   Copyright 2011 Trend Micro Inc. 11
Trend Micro Data Protection
       Product Portfolio Map
                                                                                                                                      • SNMP
                                                                                                                          SIEM        • SYSLOG
                                                                       Secure
                                                                       Cloud

                                                                                                               Threat Information &
                                                                                                               Policy Management
                                                                Data at rest
                                                                                                             Enterprise
                                                                                                              Security
                                                                                                              Manager




                   Data in motion                               Data at rest                               Data in use (endpoint)

                  Gateway & Server DLP

          •   DLP Network Monitor
          •   Interscan Messaging Security
          •   ScanMail for Exchange/Lotus Domino
          •   Threat Management Services
          •   Worry-Free Business Security Adv*       Data Discovery                      DLP                DLP & Device Control

                                                         DLP Endpoint                PortalProtect        • DLP Endpoint
                   Gateway Encryption                                                                     • OfficeScan
                                                                                                          • Worry-Free Business Security Adv*
                                                       Web Site                    File Integrity
                                                      Protection                    Monitoring
          • Email Encryption Gateway                                                                      File & Folder / Whole Disk /
          • Interscan Messaging Security
                                                   • Deep Security –                Deep Security –        Removable Media / Email
          • Hosted Email Encryption
                                                     Deep Packet                  Integrity Monitoring            Encryption
                                                     Inspection
                                                   • Vulnerability                                        • Endpoint Encryption
                                                     Management                        Backup             • Email Encryption Client
                                                     Services
                                                                                       SafeSync*


                                                                     Copyright 2011 Trend Micro Inc. 12

* SB
Trend Micro Data Protection security promise

 Develop products and services that deliver…




                                                                                              Endpoint
       Ease                                                                              to Cloud Protection
                                                                                             Made Easier
      of Use

                                               Lower
                                                TCO




                                                       Copyright 2011 Trend Micro Inc.

                            Classification 3/28/2013
For More Information:
www.trendmicro.com/dataprotection



              Classification   Copyright 2011 Trend Micro Inc.

Weitere ähnliche Inhalte

Was ist angesagt?

GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
George Delikouras
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
guestb099f64c
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
Ravindran Vasu
 

Was ist angesagt? (20)

GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
 
Be Aware Webinar Symantec-MaxĂ­mice su prevenciĂłn hacia la fuga de la informaciĂłn
Be Aware Webinar Symantec-MaxĂ­mice su prevenciĂłn hacia la fuga de la informaciĂłnBe Aware Webinar Symantec-MaxĂ­mice su prevenciĂłn hacia la fuga de la informaciĂłn
Be Aware Webinar Symantec-MaxĂ­mice su prevenciĂłn hacia la fuga de la informaciĂłn
 

Ähnlich wie Trend micro data protection

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
Trend Micro
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 

Ähnlich wie Trend micro data protection (20)

Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
SĂĽdan undgĂĽr du misbrug af kundedata og fortrolig information
SĂĽdan undgĂĽr du misbrug af kundedata og fortrolig informationSĂĽdan undgĂĽr du misbrug af kundedata og fortrolig information
SĂĽdan undgĂĽr du misbrug af kundedata og fortrolig information
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 

Mehr von Andrew Wong

Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
Andrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
Andrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
Andrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
Andrew Wong
 

Mehr von Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7Trend Micro - Worry-Free Business Security 7
Trend Micro - Worry-Free Business Security 7
 
Introdution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUESTIntrodution - Fujitsu PRIMEQUEST
Introdution - Fujitsu PRIMEQUEST
 

KĂźrzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂźrzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Trend micro data protection

  • 1. Trend Micro Data Protection Product announcements September 2011 Background and upgrade notes on ScanMail™ for Exchange 10.2, PortalProtect for SharePoint 2.1 and InterScan™ Messaging Security 8.2 Copyright 2011 Trend Micro Inc.
  • 2. The situation • Data protection is a growing concern for organizations as more stringent privacy regulations take effect and data breaches continue. • Despite this, many organizations struggle with complexity and cost of standalone data loss prevention (DLP) solutions. • Malicious URLs are now the #1 email threat and are twice as common as malicious attachments. “2011 has been the year of phishing attacks, as proven by the high-profile entry point for attacks at RSA, Oak Ridge National Laboratory and International Monetary Fund,” said John Maddison, executive GM of data center business unit for Trend Micro. “Targeted phishing emails often don’t resemble spam and typically contain social engineering that entice an unsuspecting user to click on a link to a website where malware will be silently downloaded.” Copyright 2011 Trend Micro Inc.
  • 3. September 19th news overview • Today, Trend Micro is delivering on its promise of expanding its Data Protection portfolio announced in February 2011 by providing additional DLP functionality as a module in many of our award winning security platforms. Today’s product announcements include: – ScanMail™ for Exchange 10.2 – PortalProtect for SharePoint 2.1 – InterScan™ Messaging Security 8.2 • Trend Micro Data Protection has a breadth of integrated data protection products to protect, control and encrypt. • While other vendors may have DLP capabilities built into a single product, Trend Micro has integrated DLP capabilities for email servers, collaboration servers, virtual gateway appliances and endpoint protection. Copyright 2011 Trend Micro Inc.
  • 4. Key New Features in ScanMail for Microsoft Exchange 10.2 • SMEX is the only mail-server-based security product with a web reputation service to block email containing malicious URLs in addition to scanning for content and viruses. • New Features – Second-generation Data Loss Prevention (DLP) Lite • With data validators, compliance templates, and over 40 worldwide data identifiers for custom templates – Malicious URL detection • Inside attachments in addition to the message body – New Local Smart Protection Server • Increases performance and reduces network latency • Why add Data Protection at the mail server? – Mistakes happen such as a Richmond School District where personnel information was accidentally distributed to all email users at the district. The district was forced to shut down email for the day, explain themselves on the nightly news and possibly pay for identity theft protection for the affected employees: http://www.wtvr.com/news/wtvr-email-puts- richmond-school-emp-110410,0,5022273.story Copyright 2011 Trend Micro Inc.
  • 5. Key New Features in PortalProtect for Microsoft SharePoint 2.1 • PortalProtect the only major security solution on the market today that protects SharePoint as a social collaboration tool, in addition to a file- sharing tool. • New Features – Second-generation DLP Lite • With data validators, compliance templates, and 36 worldwide data identifiers for custom templates. – Local Smart Protection Server • Increases performance and reduces network latency – Support for remote BLOB storage • Enables use of more scalable and less expensive storage outside of SharePoint while maintaining security controls • Why add Data Protection for SharePoint? – Administrative need visibility into what is in their SharePoint. For example at the Mississippi personnel records, including names, contact info, and social security numbers, were posted to a publically accessible SharePoint site for 1 month before a privacy watchdog group informed administrators of the problem: http://www.armytimes.com/news/2010/10/ap-mississippi-guard-information-breach-100810/ Copyright 2011 Trend Micro Inc.
  • 6. Key New Features for InterScan Messaging Security 8.2 • InterScan Messaging helps enterprise IT professionals deal with their growing regulatory compliance and data protection challenges. • New Features – A new Data Privacy and Email Encryption module – A widget-based dashboard for easy administration – Virtual appliance support for Microsoft Hyper-V • In addition to VMware and a bare-metal software appliance • Why add Data Protection at the messaging gateway? – Last chance to prevent privacy data from leaving the network via email – Eases compliance, reduces risk, protects digital assets – Email Encryption and DLP work together – if controlled data is detected it can be automatically encrypted Copyright 2011 Trend Micro Inc.
  • 7. Background on Trend Micro Data Protection Classification Copyright 2011 Trend Micro Inc.
  • 8. Trends Shaping Data Protection More Stringent Growing penalties and notification Regulations requirements Data protection should be a key element in any Increasing 200 M laptops, 174 M smart phones and enterprise data Mobility 250 M flash drives sold in 2009. security strategy Through 2015, mitigating data breaches Rising Frequency & will cost 10 times more than installing Cost of Data Breach data protection mechanisms on mobile devices Data storage in multi-tenant Cloud Computing environments create unique privacy and security challenges Sources: IDC, Gartner, Ponemon Institute, Santa Clara Consulting Group, Identity Theft Resource Center Classification 3/28/2013 Copyright 2011 Trend Micro Inc.
  • 9. Trend Micro vision: A world safe for exchanging digital information Cloud Virtual i Physical Copyright 2011 Trend Micro Inc. 9
  • 10. Data Protection Customer Challenges Too complex Too expensive Hard to manage Classification Copyright 2011 Trend Micro Inc. 10
  • 11. Trend Micro Data Protection Encrypt. Control. Protect. – Endpoint to Cloud “Trend Micro Data Protection ensures the availability, integrity and confidentiality of business information by protecting it against damage, loss, and unauthorized access. It means keeping your data safe, wherever it resides, from intentional or unintentional harm” Encryption Device Control DLP Classification 3/28/2013 Copyright 2011 Trend Micro Inc. 11
  • 12. Trend Micro Data Protection Product Portfolio Map • SNMP SIEM • SYSLOG Secure Cloud Threat Information & Policy Management Data at rest Enterprise Security Manager Data in motion Data at rest Data in use (endpoint) Gateway & Server DLP • DLP Network Monitor • Interscan Messaging Security • ScanMail for Exchange/Lotus Domino • Threat Management Services • Worry-Free Business Security Adv* Data Discovery DLP DLP & Device Control DLP Endpoint PortalProtect • DLP Endpoint Gateway Encryption • OfficeScan • Worry-Free Business Security Adv* Web Site File Integrity Protection Monitoring • Email Encryption Gateway File & Folder / Whole Disk / • Interscan Messaging Security • Deep Security – Deep Security – Removable Media / Email • Hosted Email Encryption Deep Packet Integrity Monitoring Encryption Inspection • Vulnerability • Endpoint Encryption Management Backup • Email Encryption Client Services SafeSync* Copyright 2011 Trend Micro Inc. 12 * SB
  • 13. Trend Micro Data Protection security promise Develop products and services that deliver… Endpoint Ease to Cloud Protection Made Easier of Use Lower TCO Copyright 2011 Trend Micro Inc. Classification 3/28/2013
  • 14. For More Information: www.trendmicro.com/dataprotection Classification Copyright 2011 Trend Micro Inc.