SlideShare a Scribd company logo
6
Most read
7
Most read
12
Most read
Trend Micro Data Protection
Product announcements September 2011
Background and upgrade notes on ScanMail™ for
Exchange 10.2, PortalProtect for SharePoint 2.1 and
InterScan™ Messaging Security 8.2
                                Copyright 2011 Trend Micro Inc.
The situation
• Data protection is a growing concern for organizations as more
  stringent privacy regulations take effect and data breaches continue.
• Despite this, many organizations struggle with complexity and cost of
  standalone data loss prevention (DLP) solutions.
• Malicious URLs are now the #1 email threat and are twice as common
  as malicious attachments.

“2011 has been the year of phishing attacks, as proven by the high-profile entry point for attacks
  at RSA, Oak Ridge National Laboratory and International Monetary Fund,” said John Maddison,
    executive GM of data center business unit for Trend Micro. “Targeted phishing emails often
  don’t resemble spam and typically contain social engineering that entice an unsuspecting user
            to click on a link to a website where malware will be silently downloaded.”




                                              Copyright 2011 Trend Micro Inc.
September 19th news overview
• Today, Trend Micro is delivering on its promise of expanding its Data
  Protection portfolio announced in February 2011 by providing additional
  DLP functionality as a module in many of our award winning security
  platforms. Today’s product announcements include:
   – ScanMail™ for Exchange 10.2
   – PortalProtect for SharePoint 2.1
   – InterScan™ Messaging Security 8.2

• Trend Micro Data Protection has a breadth of integrated data protection
  products to protect, control and encrypt.
• While other vendors may have DLP capabilities built into a single
  product, Trend Micro has integrated DLP capabilities for email servers,
  collaboration servers, virtual gateway appliances and endpoint
  protection.



                                     Copyright 2011 Trend Micro Inc.
Key New Features in ScanMail for
Microsoft Exchange 10.2
• SMEX is the only mail-server-based security product with a web
  reputation service to block email containing malicious URLs in addition
  to scanning for content and viruses.
• New Features
   – Second-generation Data Loss Prevention (DLP) Lite
       • With data validators, compliance templates, and over 40 worldwide data identifiers for custom
         templates
   – Malicious URL detection
       • Inside attachments in addition to the message body
   – New Local Smart Protection Server
       • Increases performance and reduces network latency

• Why add Data Protection at the mail server?
   – Mistakes happen such as a Richmond School District where personnel information
     was accidentally distributed to all email users at the district. The district was forced to
     shut down email for the day, explain themselves on the nightly news and possibly pay
     for identity theft protection for the affected employees: http://www.wtvr.com/news/wtvr-email-puts-
     richmond-school-emp-110410,0,5022273.story


                                                  Copyright 2011 Trend Micro Inc.
Key New Features in PortalProtect for
Microsoft SharePoint 2.1
• PortalProtect the only major security solution on the market today that
  protects SharePoint as a social collaboration tool, in addition to a file-
  sharing tool.
• New Features
   – Second-generation DLP Lite
      • With data validators, compliance templates, and 36 worldwide data identifiers for custom
        templates.
   – Local Smart Protection Server
      • Increases performance and reduces network latency
   – Support for remote BLOB storage
      • Enables use of more scalable and less expensive storage outside of SharePoint while
        maintaining security controls

• Why add Data Protection for SharePoint?
   – Administrative need visibility into what is in their SharePoint. For example at the
     Mississippi personnel records, including names, contact info, and social security
     numbers, were posted to a publically accessible SharePoint site for 1 month before a
     privacy watchdog group informed administrators of the problem:
     http://www.armytimes.com/news/2010/10/ap-mississippi-guard-information-breach-100810/

                                                   Copyright 2011 Trend Micro Inc.
Key New Features for InterScan
Messaging Security 8.2
• InterScan Messaging helps enterprise IT professionals deal with their
  growing regulatory compliance and data protection challenges.
• New Features
   – A new Data Privacy and Email Encryption module
   – A widget-based dashboard for easy administration
   – Virtual appliance support for Microsoft Hyper-V
      • In addition to VMware and a bare-metal software appliance



• Why add Data Protection at the messaging gateway?
   – Last chance to prevent privacy data from leaving the network via email
   – Eases compliance, reduces risk, protects digital assets
   – Email Encryption and DLP work together – if controlled data is detected it
     can be automatically encrypted



                                              Copyright 2011 Trend Micro Inc.
Background on Trend Micro
Data Protection



            Classification   Copyright 2011 Trend Micro Inc.
Trends Shaping Data Protection

 More Stringent           Growing penalties and notification
 Regulations              requirements
                                                                                               Data protection
                                                                                               should be a key
                                                                                               element in any
 Increasing               200 M laptops, 174 M smart phones and                                enterprise data
 Mobility                 250 M flash drives sold in 2009.                                     security strategy


                          Through 2015, mitigating data breaches
 Rising Frequency &       will cost 10 times more than installing
 Cost of Data Breach      data protection mechanisms on mobile
                          devices

                          Data storage in multi-tenant
 Cloud Computing          environments create unique privacy
                          and security challenges

     Sources: IDC, Gartner, Ponemon Institute, Santa Clara Consulting
     Group, Identity Theft Resource Center
                                  Classification 3/28/2013   Copyright 2011 Trend Micro Inc.
Trend Micro vision:
A world safe for exchanging digital information




                                                                            Cloud




                                                                  Virtual


          i

                            Physical

                            Copyright 2011 Trend Micro Inc.   9
Data Protection Customer Challenges


                                      Too
                                    complex
       Too
    expensive


     Hard to
     manage

                  Classification   Copyright 2011 Trend Micro Inc. 10
Trend Micro Data Protection
Encrypt. Control. Protect. – Endpoint to Cloud

     “Trend Micro Data Protection ensures the
     availability, integrity and confidentiality of business
     information by protecting it against
     damage, loss, and unauthorized access.
     It means keeping your data safe, wherever it
     resides, from intentional or unintentional harm”




     Encryption                       Device Control                                       DLP


                           Classification 3/28/2013   Copyright 2011 Trend Micro Inc. 11
Trend Micro Data Protection
       Product Portfolio Map
                                                                                                                                      • SNMP
                                                                                                                          SIEM        • SYSLOG
                                                                       Secure
                                                                       Cloud

                                                                                                               Threat Information &
                                                                                                               Policy Management
                                                                Data at rest
                                                                                                             Enterprise
                                                                                                              Security
                                                                                                              Manager




                   Data in motion                               Data at rest                               Data in use (endpoint)

                  Gateway & Server DLP

          •   DLP Network Monitor
          •   Interscan Messaging Security
          •   ScanMail for Exchange/Lotus Domino
          •   Threat Management Services
          •   Worry-Free Business Security Adv*       Data Discovery                      DLP                DLP & Device Control

                                                         DLP Endpoint                PortalProtect        • DLP Endpoint
                   Gateway Encryption                                                                     • OfficeScan
                                                                                                          • Worry-Free Business Security Adv*
                                                       Web Site                    File Integrity
                                                      Protection                    Monitoring
          • Email Encryption Gateway                                                                      File & Folder / Whole Disk /
          • Interscan Messaging Security
                                                   • Deep Security –                Deep Security –        Removable Media / Email
          • Hosted Email Encryption
                                                     Deep Packet                  Integrity Monitoring            Encryption
                                                     Inspection
                                                   • Vulnerability                                        • Endpoint Encryption
                                                     Management                        Backup             • Email Encryption Client
                                                     Services
                                                                                       SafeSync*


                                                                     Copyright 2011 Trend Micro Inc. 12

* SB
Trend Micro Data Protection security promise

 Develop products and services that deliver…




                                                                                              Endpoint
       Ease                                                                              to Cloud Protection
                                                                                             Made Easier
      of Use

                                               Lower
                                                TCO




                                                       Copyright 2011 Trend Micro Inc.

                            Classification 3/28/2013
For More Information:
www.trendmicro.com/dataprotection



              Classification   Copyright 2011 Trend Micro Inc.

More Related Content

PDF
Overview of Data Loss Prevention (DLP) Technology
PPTX
Data Leakage Prevention
PPTX
Data Loss Prevention from Symantec
PDF
DLP Systems: Models, Architecture and Algorithms
PPTX
Breakdown of Microsoft Purview Solutions
PPTX
Microsoft Information Protection demystified Albert Hoitingh
PDF
introduction to Azure Sentinel
PDF
DLP Data leak prevention
Overview of Data Loss Prevention (DLP) Technology
Data Leakage Prevention
Data Loss Prevention from Symantec
DLP Systems: Models, Architecture and Algorithms
Breakdown of Microsoft Purview Solutions
Microsoft Information Protection demystified Albert Hoitingh
introduction to Azure Sentinel
DLP Data leak prevention

What's hot (20)

PPTX
Microsoft Purview Overview Deck.pptx is for Microsoft Purview
PPTX
Azure security and Compliance
PPTX
Deep dive into Microsoft Purview Data Loss Prevention
PPTX
Data Loss Prevention
PDF
Microsoft 365 Security and Compliance
PDF
The Definitive Guide to Data Loss Prevention
PPTX
Microsoft Defender for Endpoint Overview.pptx
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Microsoft Defender for Endpoint
PPTX
CollabDaysBE - Microsoft Purview Information Protection demystified
PDF
Overview of Data Loss Prevention Policies in Office 365
PPTX
Microsoft Information Protection.pptx
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
DATA LOSS PREVENTION OVERVIEW
PPTX
Information Leakage & DLP
PDF
Data Loss Threats and Mitigations
PPTX
Data Loss Prevention in Office 365
PDF
Introducing Data Loss Prevention 14
PDF
Azure Security Overview
Microsoft Purview Overview Deck.pptx is for Microsoft Purview
Azure security and Compliance
Deep dive into Microsoft Purview Data Loss Prevention
Data Loss Prevention
Microsoft 365 Security and Compliance
The Definitive Guide to Data Loss Prevention
Microsoft Defender for Endpoint Overview.pptx
Technology Overview - Symantec Data Loss Prevention (DLP)
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Microsoft Defender for Endpoint
CollabDaysBE - Microsoft Purview Information Protection demystified
Overview of Data Loss Prevention Policies in Office 365
Microsoft Information Protection.pptx
Cybersecurity roadmap : Global healthcare security architecture
DATA LOSS PREVENTION OVERVIEW
Information Leakage & DLP
Data Loss Threats and Mitigations
Data Loss Prevention in Office 365
Introducing Data Loss Prevention 14
Azure Security Overview
Ad

Similar to Trend micro data protection (20)

PDF
Symantec Enterprise Mobility Vision May 2012
PDF
Symantec Enterprise Mobility - Mobile World Congress February 2012
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PPT
Trend micro - Your journey to the cloud, where are you
PPTX
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
PDF
IBM per la sicurezza del Datacenter
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PDF
Cloud Security: Perception Vs. Reality
PDF
Content is King - Symantec
PPTX
Smart, Data-Centric Security for the Post-PC Era
PDF
Solutions for PCI DSS Compliance
PPTX
Cloud_security.pptx
PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PDF
Ciphercloud Solutions Overview hsa oct2011
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PDF
Dell sonicwall connected security
PPT
IBM Security Strategy Intelligence,
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Trend micro - Your journey to the cloud, where are you
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
IBM per la sicurezza del Datacenter
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Cloud Security: Perception Vs. Reality
Content is King - Symantec
Smart, Data-Centric Security for the Post-PC Era
Solutions for PCI DSS Compliance
Cloud_security.pptx
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Ciphercloud Solutions Overview hsa oct2011
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
Dell sonicwall connected security
IBM Security Strategy Intelligence,
Sådan undgår du misbrug af kundedata og fortrolig information
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Ad

More from Andrew Wong (20)

PPT
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
PDF
Red Hat Training Briefing Hong Kong
PDF
Red Hat Training Catalog 2012
PDF
Big Data in Retail Industry
PDF
Cloud Solution Handbook for HKSMB
PPT
Oracle Social CRM Applications Strategy Overview And Roadmap
PDF
Introduction Google Script in Marketing
PDF
B2B Content Marketing Trend 2012-13
PDF
Introduction to Trend Micro Mobility Security 8
PDF
SolarWinds Network Solution Guide
PPT
Trend micro real time threat management press presentation
PPTX
Trend micro global consumer technology use & security study
PPT
Enterprise it consumerization survey
PPT
2010 corporate end user study
PPT
Trend micro smartphone consumer market research report
PPTX
Android Security Essentials Presentation
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PPT
Amazon Web Services
PPT
Introduction - The Smart Protection Network
PPT
Introduction trend micro malicious email
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
Red Hat Training Briefing Hong Kong
Red Hat Training Catalog 2012
Big Data in Retail Industry
Cloud Solution Handbook for HKSMB
Oracle Social CRM Applications Strategy Overview And Roadmap
Introduction Google Script in Marketing
B2B Content Marketing Trend 2012-13
Introduction to Trend Micro Mobility Security 8
SolarWinds Network Solution Guide
Trend micro real time threat management press presentation
Trend micro global consumer technology use & security study
Enterprise it consumerization survey
2010 corporate end user study
Trend micro smartphone consumer market research report
Android Security Essentials Presentation
Introduction to Kaspersky Endpoint Security for Businesss
Amazon Web Services
Introduction - The Smart Protection Network
Introduction trend micro malicious email

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD

Trend micro data protection

  • 1. Trend Micro Data Protection Product announcements September 2011 Background and upgrade notes on ScanMail™ for Exchange 10.2, PortalProtect for SharePoint 2.1 and InterScan™ Messaging Security 8.2 Copyright 2011 Trend Micro Inc.
  • 2. The situation • Data protection is a growing concern for organizations as more stringent privacy regulations take effect and data breaches continue. • Despite this, many organizations struggle with complexity and cost of standalone data loss prevention (DLP) solutions. • Malicious URLs are now the #1 email threat and are twice as common as malicious attachments. “2011 has been the year of phishing attacks, as proven by the high-profile entry point for attacks at RSA, Oak Ridge National Laboratory and International Monetary Fund,” said John Maddison, executive GM of data center business unit for Trend Micro. “Targeted phishing emails often don’t resemble spam and typically contain social engineering that entice an unsuspecting user to click on a link to a website where malware will be silently downloaded.” Copyright 2011 Trend Micro Inc.
  • 3. September 19th news overview • Today, Trend Micro is delivering on its promise of expanding its Data Protection portfolio announced in February 2011 by providing additional DLP functionality as a module in many of our award winning security platforms. Today’s product announcements include: – ScanMail™ for Exchange 10.2 – PortalProtect for SharePoint 2.1 – InterScan™ Messaging Security 8.2 • Trend Micro Data Protection has a breadth of integrated data protection products to protect, control and encrypt. • While other vendors may have DLP capabilities built into a single product, Trend Micro has integrated DLP capabilities for email servers, collaboration servers, virtual gateway appliances and endpoint protection. Copyright 2011 Trend Micro Inc.
  • 4. Key New Features in ScanMail for Microsoft Exchange 10.2 • SMEX is the only mail-server-based security product with a web reputation service to block email containing malicious URLs in addition to scanning for content and viruses. • New Features – Second-generation Data Loss Prevention (DLP) Lite • With data validators, compliance templates, and over 40 worldwide data identifiers for custom templates – Malicious URL detection • Inside attachments in addition to the message body – New Local Smart Protection Server • Increases performance and reduces network latency • Why add Data Protection at the mail server? – Mistakes happen such as a Richmond School District where personnel information was accidentally distributed to all email users at the district. The district was forced to shut down email for the day, explain themselves on the nightly news and possibly pay for identity theft protection for the affected employees: http://www.wtvr.com/news/wtvr-email-puts- richmond-school-emp-110410,0,5022273.story Copyright 2011 Trend Micro Inc.
  • 5. Key New Features in PortalProtect for Microsoft SharePoint 2.1 • PortalProtect the only major security solution on the market today that protects SharePoint as a social collaboration tool, in addition to a file- sharing tool. • New Features – Second-generation DLP Lite • With data validators, compliance templates, and 36 worldwide data identifiers for custom templates. – Local Smart Protection Server • Increases performance and reduces network latency – Support for remote BLOB storage • Enables use of more scalable and less expensive storage outside of SharePoint while maintaining security controls • Why add Data Protection for SharePoint? – Administrative need visibility into what is in their SharePoint. For example at the Mississippi personnel records, including names, contact info, and social security numbers, were posted to a publically accessible SharePoint site for 1 month before a privacy watchdog group informed administrators of the problem: http://www.armytimes.com/news/2010/10/ap-mississippi-guard-information-breach-100810/ Copyright 2011 Trend Micro Inc.
  • 6. Key New Features for InterScan Messaging Security 8.2 • InterScan Messaging helps enterprise IT professionals deal with their growing regulatory compliance and data protection challenges. • New Features – A new Data Privacy and Email Encryption module – A widget-based dashboard for easy administration – Virtual appliance support for Microsoft Hyper-V • In addition to VMware and a bare-metal software appliance • Why add Data Protection at the messaging gateway? – Last chance to prevent privacy data from leaving the network via email – Eases compliance, reduces risk, protects digital assets – Email Encryption and DLP work together – if controlled data is detected it can be automatically encrypted Copyright 2011 Trend Micro Inc.
  • 7. Background on Trend Micro Data Protection Classification Copyright 2011 Trend Micro Inc.
  • 8. Trends Shaping Data Protection More Stringent Growing penalties and notification Regulations requirements Data protection should be a key element in any Increasing 200 M laptops, 174 M smart phones and enterprise data Mobility 250 M flash drives sold in 2009. security strategy Through 2015, mitigating data breaches Rising Frequency & will cost 10 times more than installing Cost of Data Breach data protection mechanisms on mobile devices Data storage in multi-tenant Cloud Computing environments create unique privacy and security challenges Sources: IDC, Gartner, Ponemon Institute, Santa Clara Consulting Group, Identity Theft Resource Center Classification 3/28/2013 Copyright 2011 Trend Micro Inc.
  • 9. Trend Micro vision: A world safe for exchanging digital information Cloud Virtual i Physical Copyright 2011 Trend Micro Inc. 9
  • 10. Data Protection Customer Challenges Too complex Too expensive Hard to manage Classification Copyright 2011 Trend Micro Inc. 10
  • 11. Trend Micro Data Protection Encrypt. Control. Protect. – Endpoint to Cloud “Trend Micro Data Protection ensures the availability, integrity and confidentiality of business information by protecting it against damage, loss, and unauthorized access. It means keeping your data safe, wherever it resides, from intentional or unintentional harm” Encryption Device Control DLP Classification 3/28/2013 Copyright 2011 Trend Micro Inc. 11
  • 12. Trend Micro Data Protection Product Portfolio Map • SNMP SIEM • SYSLOG Secure Cloud Threat Information & Policy Management Data at rest Enterprise Security Manager Data in motion Data at rest Data in use (endpoint) Gateway & Server DLP • DLP Network Monitor • Interscan Messaging Security • ScanMail for Exchange/Lotus Domino • Threat Management Services • Worry-Free Business Security Adv* Data Discovery DLP DLP & Device Control DLP Endpoint PortalProtect • DLP Endpoint Gateway Encryption • OfficeScan • Worry-Free Business Security Adv* Web Site File Integrity Protection Monitoring • Email Encryption Gateway File & Folder / Whole Disk / • Interscan Messaging Security • Deep Security – Deep Security – Removable Media / Email • Hosted Email Encryption Deep Packet Integrity Monitoring Encryption Inspection • Vulnerability • Endpoint Encryption Management Backup • Email Encryption Client Services SafeSync* Copyright 2011 Trend Micro Inc. 12 * SB
  • 13. Trend Micro Data Protection security promise Develop products and services that deliver… Endpoint Ease to Cloud Protection Made Easier of Use Lower TCO Copyright 2011 Trend Micro Inc. Classification 3/28/2013
  • 14. For More Information: www.trendmicro.com/dataprotection Classification Copyright 2011 Trend Micro Inc.