Deep_Discovery_ChannelPPT_8Oct2012

上传人:二少****畔 文档编号:158361615 上传时间:2021-01-01 格式:PPTX 页数:37 大小:5.30MB
返回 下载 相关 举报
Deep_Discovery_ChannelPPT_8Oct2012_第1页
第1页 / 共37页
Deep_Discovery_ChannelPPT_8Oct2012_第2页
第2页 / 共37页
Deep_Discovery_ChannelPPT_8Oct2012_第3页
第3页 / 共37页
Deep_Discovery_ChannelPPT_8Oct2012_第4页
第4页 / 共37页
Deep_Discovery_ChannelPPT_8Oct2012_第5页
第5页 / 共37页
点击查看更多>>
资源描述

《Deep_Discovery_ChannelPPT_8Oct2012》由会员分享,可在线阅读,更多相关《Deep_Discovery_ChannelPPT_8Oct2012(37页珍藏版)》请在金锄头文库上搜索。

1、Deep Discovery and The Custom Defense| Customer Presentation,Agenda,Why you should offer customers a solution/service for to combat APTs and targeted attacks Why partner with Trend The Custom Defense Solution limited real-time insight or global correlation Applying experience to operations Building

2、ecosystem of tools across the network based on our real-world customer assistance “Custom Defense” completes the customer lifecycle Current industry stops at analysis Programmatically provides remediation Only solution delivering custom security “back into” endpoints and gateways,12,Deep Discovery P

3、resentation,1/1/2021,13,Confidential | Copyright 2012 Trend Micro Inc.,APTs &Targeted Attacks,EmpoweredEmployees,Elastic Perimeter,Copyright 2012 Trend Micro Inc.,APTs & Targeted Attacks“The New Norm” IDC,Traditional Security Protection is Insufficient,Trend Micro Custom DefenseA complete lifecycle

4、to combat the attacks that matter to you,Deep Discovery,Deep Discovery Inspector,1/1/2021,16,Confidential | Copyright 2012 Trend Micro Inc.,Advanced Threat Protection Across the Attack Sequence,Malicious Content Suspect Communication Attacker Behavior,Deep Discovery: Key Technologies,Specialized Thr

5、eat Detection Across the Attack Sequence,1/1/2021,17,Confidential | Copyright 2012 Trend Micro Inc.,Big Data Analytics-driven Global Threat Intelligence Added protection: Whitelisting Network traffic rules Mobile app reputation Vulnerability shielding,BIG DATA ANALYTICS-DRIVEN GLOBAL THREAT INTELLIG

6、ENCE2012,Whitelisting Network traffic rules Mobile app reputation Vulnerabilities/Exploits Threat Actor Research Enhanced File Reputation Enhanced Web Reputation,DAILY: Collects 1.15B threat samples Correlates 7.2 TB data Protects against 200M threats,Copyright 2012 Trend Micro Inc.,Threat Analyzer

7、Custom Sandbox Simulation & Analysis,Tracking of malicious actions & events Detection of malicious destinations and connections to C&C servers Specific detection rules for Office,PDF and Flash docs General detection rules for all executables Exportable reports & PCAP files,Fully Customizable Attack

8、Surface using standard VMware tools,Operating system, Office version, Service Packs Browsers and standard applications Custom applications,Deep Discovery How It Works,1/1/2021,20,Confidential | Copyright 2012 Trend Micro Inc.,Visibility, Analysis & Action,Threat ConnectInformation Portal,Threat prof

9、ile: What are the characteristics, origins and variants of this malware. Related IPs/Domains: What are the known C&C comms for this attack. Attack Group/Campaign: Who and what is behind this threat. Containment and remediation: What to look for, how to remediate and eradicate.,Deep Discovery,Network

10、 traffic inspection Advanced threat detection Real-time analysis & reporting,Custom scalable threat simulation Deep investigation & analysis Actionable intelligence & results,DeepDiscovery Inspector,Deep Discovery provides the visibility, insight & control you need to protect your company against AP

11、Ts and targeted attacks,Deep Discovery Advisor,Threat Analyzer In-depth threat simulation & analysis Custom sandbox execution environments Scalable to 50,000 samples/day Integration with Deep Discovery Inspector Open, automated and manual submission,Security Update Server IP/URL blacklist export Cus

12、tom security signature updates (future),Threat Intelligence Center In-depth analysis of incidents & events Risk-focused monitoring & investigation Trend Micro & open security event collection Context-relevant actionable intelligence Deep Discovery Inspector central reporting,Custom scalable threat s

13、imulation Deep investigation & analysis Actionable intelligence & results,1/1/2021,24,Confidential | Copyright 2012 Trend Micro Inc.,Deep Discovery Advisor,DeepDiscovery Inspector,Deep Discovery Advisor,Detect,Analyze,Adapt,Respond,AdvancedProtectionSolutions,SecurityUpdates,Forensics, Containment,R

14、emediation,Deep Discovery Advisor Completing the Custom Defense Lifecyle,The Custom Defense In Action Advanced Email Protection,Blocking of targeted spear phishing emails and document exploits via custom sandboxing Central analysis of detections Automated updates of malicious IP/Domains Signature fi

15、le updates,InterScan Messaging Securityor ScanMail,Anti-spam,Web Reputation,Anti-phishing,Advanced Threat Detection,Anti-malware,“Suspicious”,quarantine,feedback,1/1/2021,26,Confidential | Copyright 2012 Trend Micro Inc.,Deep Discovery AdvisorThreat Intelligence Center,Why Deep Discovery,Detection B

16、eyond MSFT & sandboxing Mobile, Mac, Custom sandboxing Beyond malware Attacker behavior, lateral movement, ,Intelligence Smart Protection Network & Researchers Threat Connect Portal,TCO Single appliance Flexible form factors Competitive pricing,1/1/2021,The Bigger Picture Custom Defense Solution Services & strategic value Trend commitment to customer success,Deep Discovery,Visibility Insight Control,Live Demonstration ofDeep DiscoveryQ & A,29,Tools At Your Disposal,30,Addi

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号