Endpoint Security - Customer Presentation
Endpoint Security - Customer Presentation
Endpoint Security - Customer Presentation
Endpoint Security
May, 2021
Why Trend Micro?
3 © 2021 Trend Micro Inc.
Donated $5.9M+ to those in need and built
homes for 1,800+ families
everyone.
Educated 50,000+ small business users, 5,000+
university students, and 2.8M+ kids & families
4 © 2021 Trend Micro Inc.
Industry firsts: Always anticipating, adapting
AI-powered writing- Broadest cloud
Optimized security for IoT Reputation style DNA analysis for security platform as
AWS workloads Service email fraud a service
Optimized security Optimized security for Cloud workload Specialized IPS XDR & risk visibility across
for VMware Azure workloads protection platform with for OT endpoint, email, servers,
integrated container environments cloud, & network
protection
5 © 2021 Trend Micro Inc.
Responsible disclosure to Threat intelligence and research for Public/private partnerships
software/hardware vendors consumers, businesses & governments (e.g. law enforcement)
Common Ecosystem
Services Integration
XDR
Risk Visibility & Insight Extended Detection & Response Agent & Policy Management
Security for Users Security for the Hybrid Cloud Security for Networks
Mobile Servers Virtual Machines Cloud Workloads Containers Applications Prevention Detection
Workstations
• It was focused on file-based attacks (executables, embedded • They exploit operating system and application vulnerabilities
scripts, etc.) • They use social engineering to gain access
• Using signatures to detect malware was usually enough, • They use extortion to get employees to do their bidding
though there was a high risk of zero-days
• They use executables already on the endpoints to gain
• Many third-party testing houses to this day focus on efficacy additional control
of detecting file-based threats
• Campaigns span not just endpoints, but servers, cloud
applications, IoT, OT, email and more
Browser Exploit Prevention Predictive Machine Learning Runtime Machine Learning Web Reputation
Vulnerability Protection Application Control Behavioral Analysis Data Loss Prevention
Web Reputation Variant Protection Exploit Protection
Device Control File-Level Signature In-memory Script Analysis
Automated
Response DLP Kill & Quarantine Restore Encrypted Suspicious object/ Outbreak
Processes Files Intelligence sharing Prevention
LEGEND
Known Known Unknown Noise
Good Data Bad Data Data Cancellation
maximizes protection and performance
Intrusion Prevention (IPS) & Firewall
Early Zero-Day Protection
Exploit Prevention & File/Web Reputation
Variant Protection
Application Control
Integrity Monitoring
R
XD
Pre-execution Machine Learning
to y
etr
em
Tel
Behavioral Analysis
Runtime Machine Learning
Network Content Correlation
Safe files & Malicious files &
actions allowed Custom Sandbox Analysis actions blocked
• Risky Users
• Risky Devices
• Endpoint Vulnerabilities
3 party logs currently include:
rd
Palo Alto Forcepoint Web Security Cisco Meraki • Cloud App Usage
Fortinet Fortigate Zscaler Cisco Umbrella
• Risky Users
• Risky Devices
Gives key activity and dark web
intelligence
• Endpoint Vulnerabilities
• Risky Users
• Risky Devices
• Endpoint Vulnerabilities
• Risky Users
• Endpoint Vulnerabilities
• Endpoint Vulnerabilities
• Risky Users
The type of cloud
apps being used • Risky Devices
• Endpoint Vulnerabilities
SOC/IR TEAMS
Wants fast detection & response on
endpoints
By 2025, cloud-delivered EPP solutions
Visibility beyond the endpoint
will grow from 20% of new deals to 95%. (cross-layer)
Gartner; “Magic Quadrant for Endpoint Protection Platforms” |
20 Aug 2019 | G00352135 | Peter Firstbrook, Dionisio Zumerle, et al.
Exploit
Detection
Malware Malware
Signatures Signatures Pre-execution
Machine Learning
Sandbox
Web & URL Analysis
Web & URL
Reputation Reputation
Machine
Learning for
phishing & BEC
Inbound email
• Antispam, BEC Outbound email
• Antispam
• Sender reputation
• Email encryption
• Source verification
• DLP
• Antimalware, PML
• File password extraction
• URL rep, time-of-click
• Sandbox analysis for file
and URL
• Email continuity
45
Cybersecurity Assessment Service
Free security assessment service that scans
Microsoft® 365® inboxes and endpoints to
gauge the overall security posture
https://assessment.xdr.trendmicro.com
46 © 2021 Trend Micro Inc.
Third Party Validation
47 © 2021 Trend Micro Inc.
Carbanak & FIN7
Tradecraft and operational flows in two
simulated breaches
The Forrester Wave™: The Forrester Wave™: The Forrester Wave™: The Forrester Wave™:
Enterprise Detection and Endpoint Security Software Enterprise Email Security, Cloud Workload Security,
Response, Q1 2020 as a Service, Q2 2021 Q2 2021 Q4 2019
“The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are
trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call
on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
51 © 2021 Trend Micro Inc. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is
based on best available resources. Opinions reflect judgment at the time and are subject to change.”
Appendix
52 © 2021 Trend Micro Inc.
Apex One as a Service Data Centers
Aaron Cunningham
Vice President of IT
On Premises Partial Air Gap If external access allowed, can be managed by SaaS