Escolar Documentos
Profissional Documentos
Cultura Documentos
Trend Micro
Lder global em tecnologia de segurana de contedo na Internet para
proteger dados contra um amplo espectro de ameaas.
EVA CHEN
CEO e Co-fundadora
VISO
Um mundo seguro
para a troca de
informao digital
MISSO
1000+ especialistas
Inovar para
oferecer a melhor
segurana de
contedo que
melhor se adapta
ao cliente.
Classification 6/21/2010
Fundao
EUA em 1988
Matriz
Tkio, Japo
Funcionrios
4.350
Mercado
Segurana de
contedo
Presena
Em 23 pases
Slide 2
s2
Still need to validate this statement using an external source. Working with IDC but nothing has materialized yet. May need to pull from final.
sandim, 12/28/2009
Cenrio de ameaas
Parceiros PPE
Alianas
Estrutura TI do cliente
Classification 6/21/2010
Servidores Virtualizados
Servidores Fsicos
Servidores em DCs de
Terceiros
Servidores virtuais e em
movimento
Servidores sob ataques
4
Copyright 2009 Trend Micro Inc.
IT Production
Business Production
ITaaS
IT
IT / LOB
CIO
Cost Efficiency
Quality of Service
Sponsorship
Business
Value
Key
Capabilities
CAPEX
OPEX
Cost Savings
Credibility
Provisioning
CAPEX
OPEX
Availability
Responsivenes
s
Speed
Stability
SLAs
Business Agility
CAPEX
OPEX
Availability
Responsivenes
s
Compliance
Time-to-market
Streamlined
Processes
IT-as-a-Service
Quality of Life
Proactive
Selective
Confidence
Reactive
Business Production
ITaaS
Data destruction
12
Multi-tenancy
11
Diminished perimeter
10
Resource Contention
Instant-on gaps
Inter-VM attacks
2
1
Brechas Instantneas
Ativa
3:00am Scan
Typical AV
Console
Os servidores e
servios
virtualizados no
estariam sujeitos
aos mesmos riscos
dos servidores
fsicos?
Classification 6/21/2010
Aplicaes Corporativas
Sistemas no mais
suportados
1
2,723
Aplicaes Corporativas
78
73
23
Abertas e acessveis
Web 2.0 adiciona complexidade
Muitas aplicaes legado no podem
ser corrigidas (desenvolvedores no
disponveis)
Seguranas de permetro tradicionais
no protegem adequadamente
16
Sistemas no mais
suportados
January
2009
10.1
3
October
2010
July
2010
FSICO
NUVEM
Firewall
Integrity
Monitoring
Log
Inspection
Malware
Protection
IDS / IPS
Blinda vulnerabilidades de
aplicaes Web
Reduz a superficie de
ataques. Previne DoS &
outras aes maliciosas
Optimiza a identificao
de eventos de segurana
importantes
Firewall
Integrity
Monitoring
Log
Inspection
Anti-Virus
Deep Security
Agent
Deep Security
Virtual Appliance
Security
Profiles
Alerts
Deep Security
Manager
Security Center
Security
Updates
Reports
20
Mltiplos administradores
Mltiplos delegados
Relatrios detalhados
Rastreamento recomendado
Dashboard customizado
Automao atravs de tarefas agendadas
Atualizaes de Software e segurana
Integrao (vCenter, SIEM, Active Directory)
Infraestrutura escalvel (mltiplos ns)
21
Security Center:
Time dedicado de experts em segurana
Time dedicado de experts em segurana
Rastreamento de Vulnerabilidades Globais
100+ fontes de informao(public, private, govt):
SANS, CERT, Bugtraq, VulnWatch, PacketStorm, e
Securiteam
Membro do programa Microsoft Active Protections
6/21/2010
Internal
Security Center
Regras para blindar sistemas contra novas
vulnerabilidadesules descobertas. Desenvolvidas e
entregues automaticamente.
Public
Private
Underground
Monitor
Automated Monitoring
SANS
VulnWatch
CERT
PacketStorm
Vendor Advisories Securiteam
Bugtraq
Application Traige
Triage
Coverage
Analysis
Develop
Filter
Development
Deliver
Quality
Assurance
Filter Types
Exploit / Attack
Vulnerability
Smart / Anomaly / Traffic
Response
Coordinate
Information
and
Response
Automated
Within Hours
24
Windows (2000, XP, 2003, Vista, 2008, 7), Sun Solaris (8, 9, 10), Red Hat EL (4, 5), SuSE
Linux (10,11)
Database servers
Mail servers
Microsoft Exchange Server, Merak, IBM Lotus Domino, Mdaemon, Ipswitch, IMail,,
MailEnable Professional,
FTP servers
Backup servers
Symantec, Veritas
DHCP servers
ISC DHCPD
Desktop applications
Microsoft (Office, Visual Studio, Visual Basic, Access, Visio, Publisher, Excel Viewer,
Windows Media Player), Kodak Image Viewer, Adobe Acrobat Reader, Apple Quicktime,
RealNetworks RealPlayer
Mail clients
Outlook Express, MS Outlook, Windows Vista Mail, IBM Lotus Notes, Ipswitch IMail Client
Web browsers
Anti-virus
Other applications
Samba, IBM Websphere, IBM Lotus Domino Web Access, X.Org, X Font Server prior,
Rsync, OpenSSL, Novell Client
25
Applications
& Services
Deep Security Agent
Integrity Monitoring
& Log Inspection
User-mode
Funcionalidades
Deep Packet Inspection (DPI) &
Firewall operate at network layer
Bi-directional control
Supports detection & prevention
modes
TCP/IP
DPI & Firewall
engine
Kernel-mode
26
Deep Security
Agent
Deep Security
Virtual Appliance
Security
Profiles
Alerts
Deep Security
Manager
Security Center
Security
Updates
Reports
27
Deep Security
Virtual Appliance
App
App
OS
OS
OS
VMsafe APIs
ESX Server
29
Copyright 2009 Trend Micro Inc.
Novos Desafios:
VMs dormentes
Conteno de Recursos
Disceminao de VMs
Trfego entre VMs
vMotion
Abordagem Coordenada
Abordagem de Segurana Coordenada
O agent desaparece (removido / revertido de uma
imagem prvia)
Virtual Appliance detecta automaticamente
VMware
vCenter
Deep Security
Virtual Appliance*
VMware vSphere 4
Platformas protegidas
Windows 2000
Windows 2003 (32 & 64 bit)
Windows XP
Vista (32 & 64 bit)
Windows Server 2008 (32 & 64 bit)
Windows 7
HyperV (Guest VM)
8, 9, 10 on SPARC
10 on x86 (64 bit)
Red Hat 4, 5 (32 & 64 bit)
SuSE 10, 11
VMware ESX Server (guest OS)
VMware Server (host & guest OS)
XenServer (Guest VM)
HP-UX 11i (11.23 & 11.31)
AIX 5.3, 6.1
Integrity Monitoring
& Log Inspection modules
32
The End
Classification 6/21/2010