Presentation Title - Insight Enterprises

Download Report

Transcript Presentation Title - Insight Enterprises

Trend Micro xSP license model
Security for Service Providers
Vincent van den Heuvel
Channel Account Manager
Tel: +31-6 18111352
[email protected]
Copyright 2009 Trend Micro Inc.
Agenda
Trend Micro Mission and Vision
Smart Protection Network
Trend Micro xSP license model
Securing Your Virtualized Datacenter
How To Start
7/18/2015
Copyright 2009 Trend Micro Inc.
2
Trend Micro
A global leader in Internet content security advancing threat
management technology to secure data against a wide range of threats
EVA CHEN
CEO and Co-Founder
VISION
A world safe
for exchanging
digital information
MISSION
1000+ Threat Experts
Innovate to
provide the best
content security
that fits into the
IT infrastructure
Classification 7/18/2015
Founded
United States
in 1988
$1 Billion Annual Revenue
Headquarters
Tokyo, Japan
Largest Security Company
Headquartered Outside US
Employees
4,350
Top 3 in Messaging, Web
and Endpoint Security
Market
Content Security
Locations
Operations in 23
Countries
Copyright 2009 Trend Micro Inc.
3
A Leader in Virtualization
and Cloud Computing
Security
Continuous Innovation
Our #1 goal is to create value for our customers through
continuous innovation
Integrated Gateway
Content Security
InterScan Messaging
Security Suite
LAN Server
Virus Protection
ServerProtect™
1996
1997
1998
1999
Gateway
Virus Protection
InterScan™
2000
2001
2002
Web Filtering
InterScan
WebManager
Trend Micro
Smart
Protection
Network
Trend Micro
and Cisco
Integrated Security
in the Network
Threat Lifecycle
Management Strategy
Enterprise Protection
Strategy (EPS)
Server-based Email
Virus Protection
ScanMail™
Data Leak
Prevention
LeakProof™
2003
2004
2005
2006
2007
Virtualization
Deep Security
2008
2-Hour Virus
Response
SLA
2009
Cloud
Security
‘Cloud 9’
Email Reputation
Services
Web-based
Centralized Management
Trend Micro Control Manager
Network Access Control
Network VirusWall™
7/18/2015
Copyright 2009 Trend Micro Inc.
4
Software as
a Service
SecureCloud™
Web Threat
Protection
Web Reputation
Threat Environment
• More profitable
• $100 billion: Estimated profits from global cybercrime
-- Chicago Tribune, 2008
• More sophisticated, malicious & stealthy
• “95% of 285 million records stolen in 2008, were the
result of highly skillful attacks”
•“Breaches go undiscovered and uncontained for
weeks or months in 75% of cases.”
-- Verizon Breach Report, 2009
• More frequent
• "Harvard and Harvard Medical School are attacked
every 7 seconds, 24 hours a day, 7 days a week.”
-- John Halamka, CIO
• More targeted
• “27% of respondents had reported targeted attacks”.
-- 2008 CSI Computer Crime & Security Survey
Copyright 2009 Trend Micro Inc.
5
Smart Protection Network
WEB
REPU0ATION
FILE
REPUTATION
EMAIL
REPUTATION
Threats
Threat Collection
Management
SaaS/Managed
Partners
• ISPs
• Routers
• Etc.
Cloud
Endpoint
Gateway
Off Network
Messaging
Classification 7/18/2015
Copyright 2009 Trend Micro Inc.
6
Memory impact is significantly reduced
– Almost no growth compared with traditional virus
scanning solutions.
Copyright 2009 Trend Micro Inc.
Smart Scan and Conventional Scan comparisons
7/18/2015
8
Copyright 2009 Trend Micro Inc.
Classification
Correlation - Smart Protection Network
WEB
REPUTATION
Fake news by email.
A compromised
web site
One
click in a link.
EMAIL
REPUTATION
FILE
REPUTATION
A fake video
7/18/2015
9
Copyright 2009 Trend Micro Inc.
Classification
NSS Labs Corporate Report Results
Source: NSS
Labs Corporate
Report,
FILE
REPUTATION
WEB
REPUTATION
Copyright 2009 Trend Micro Inc.
Trend Micro xSP License model
Classification 7/18/2015
Copyright 2009 Trend Micro Inc. 11
What is a Service Provider?
Definition: Organizations that provide services (like security
solutions) to other businesses and end users
“A Service Provider (SP) is an entity that provides services to other entities.
Usually this refers to a business that provides subscription or a Web service to
other businesses or individuals.”
– Wikipedia
Service to 3rd
party
SP Signed
Contract
SP owns license
7/18/2015
Classificati
Copyright 2009 Trend Micro Inc. 12
xSP Pricing and Licenses model
PRICING
Pricing structure for SP is designed for maximum flexibility to match
the various requirements of SPs. “year over year pricing”
License Ownership
SPs own the license, not their customer. They can lease the license to
their customers, adding to the range of options/services they give
their customers.
Bulk Purchase
Since SP owns the license, they can purchase an upfront volume of
licenses at a discounted price and have total freedom of leasing the
license out to their customers on their own price and time conditions.
This allows them to maximize the margins they can generate from
providing such services.
For more information regarding pricing, you can get in touch with
Insight your Trend Micro xSP Partner.
Copyright 2009 Trend Micro Inc.
Service Provider Partner Benefits
• Revenue
• Diversify your revenue stream
by adding sustainable security
service revenue with minimum
financial risk
• Flexibility
• Offer your customers a flexible
security service that will adapt to
current and future needs
• Retention
• With 93% retention observed
from current Trend Micro
customers, your recurring
revenue is optimized
• Aggregation
• As a Service Provider, bulk
licensing purchase ensures you
maximum margins
• Pay-as-you-grow
• Whether your customer base
grows or declines monthly, you’ll
only pay the licenses you service
7/18/2015
Copyright 2009 Trend Micro Inc. 14
Reporting Tool
7/18/2015
Copyright 2009 Trend Micro Inc. 15
Some References
7/18/2015
Copyright 2009 Trend Micro Inc. 16
Securing Your Virtualized Datacenter
Virtualization Creates,
Security Challenges
Classification 7/18/2015
Copyright 2009 Trend Micro Inc. 17
Challenge 1:
Dormant VMs are unprotected
Dormant VMs
Active VMs
AV
AppApp
AV
AppApp
AV
AppApp
AV
AppApp
AV
AppApp
OS
OS
OS
OS
OS
ESX Server
– Dormant VMs includes VM templates and backups:
• Cannot run scan agents yet still can get
infected
• Stale AV signatures
Copyright 2009 Trend Micro Inc.
Challenge 2:
Full System Scans
3:00am Scan
AV
App
Typical AV
Console
OS
ESX Server
– Resource Contention with Full System Scans
• Existing AV solutions are not VM aware
• Simultaneous full AV scans on same host causes
severe performance degradation
Copyright 2009 Trend Micro Inc.
Challenge 3:
VM Sprawl
Dormant
Active
New
App
AV
App
OS
ESX Server
– Managing VM Sprawl
• Security weaknesses replicate quickly
• Security provisioning creates bottlenecks
• Lack of visibility into, or integration with,
virtualization console increases management
complexity
7/18/2015
Copyright 2009 Trend Micro Inc. 20
Challenge 4:
Inter-VM Traffic
Dormant
App
AV
OS
Network
IDS / IPS
Active
App
AV
OS
vSwitch
App
AV
OS
AV
App
OS
vSwitch
– Inter-VM traffic
• NIDS / NIPS blind to intra-VM traffic
• First-generation security VMs require intrusive
vSwitch changes
7/18/2015
Copyright 2009 Trend Micro Inc. 21
Challenge 5:
VM Mobility
Dormant
App
AV
OS
Network
IDS / IPS
Active
AV
App
OS
vSwitch
AV
OS
vSwitch
– vMotion & vCloud:
• Reconfiguration required: cumbersome
• VMs of different sensitivities on same server
• VMs in public clouds (IaaS) are unprotected
7/18/2015
Copyright 2009 Trend Micro Inc. 22
App
60% of production VM’s
will be less secure then
their physical counterparts
Copyright 2009 Trend Micro Inc. 23
Trend Micro VMsafe integration
• Protect the VM by inspection of virtual components
• Unprecedented security for the app & data inside the VM
• Complete integration with, and awareness of,
vMotion, Storage VMotion, HA, etc.
• Trend Micro offers:
• Anti Malware
• Firewall
• IDS/IPS inspection & Virtual Patching
• Monitoring of log and system files
VA
VM1
VM2
VM3
VM4
VM5
VM6
VA
App1
App2
App3
App4
App5
App6
OS1
OS2
OS3
OS4
OS5
OS6
Hypervisor with Vmsafe API
Copyright 2009 Trend Micro Inc.
Trend Micro Deep Security
Server & Application Protection
PHYSICAL
VIRTUAL
CLOUD
Deep Packet Inspection
IDS / IPS
Web App. Application
Protection Control
Anti
Malware
Firewall
Copyright 2009 Trend Micro Inc.
Integrity
Monitoring
Log
Inspection
Deep Security Product Components
PHYSICAL
VIRTUAL
CLOUD
Deep Security
Agent
Deep Security
Virtual Appliances
Security
Profiles
IT Infrastructure
Integration
• vCenter
• SIEM
• Active Directory
• Log correlation
• Web services
Alerts
Deep Security
Manager
Security Center
Security
Updates
Reports
Copyright 2009 Trend Micro Inc.
26
Trend Micro VMsafe Anti-malware scanning
• Core Protection Scanning Virtual Machine
–
–
–
–
Anti-malware scanning for target VMs from outside
Integrates VMsafe VDDK APIs to mount VM disk files
Full scans of dormant & active VMs from scanning VM
Automatically updates realtime agent in dormant VM
Copyright 2009 Trend Micro Inc.
Deep Security Virtual appliance
Deep Security VA provides
Virtual
Appliance
-
Firewall
IDS/IPS
Virtual Patching
Application Control
Web Application protection
(Q3 Anti-Malware)
Uses VMware’s VMsafe-NET API
to intercept network traffic at
the hypervisor.
Copyright 2009 Trend Micro Inc. 28
How To Start - 6 Step Approach
Step 1
Step 2
Step 3
Bezoek de
Workshops.
Kom naar de
Stand op de
InfoMarkt en
krijg een
Voice Recorder
Bepaal de
beste
oplossing
voor u!
Step 4
Vraag bij
Insight een
offerte aan.
Step 5
Step 6
Teken het
Trend Micro
xSP
contract.
Start Selling
Trend Micro
Security for
Service
Providers!
Copyright 2009 Trend Micro Inc.
Bezoek onze stand op de InfoMarkt
Copyright 2009 Trend Micro Inc.