Professional Documents
Culture Documents
Trend Micro Vision One Solution Overview
Trend Micro Vision One Solution Overview
Vision One TM
Lori Smith
Global Product Marketing
See more. Respond Faster
2
See more. Respond Faster
• Vision One provides deep, and
purpose-built XDR capabilities.
• Differentiates from other “XDR”
vendors by offering more value.
• Technology foundation to
expand a fully integrated threat
Trend Micro Vision One defense platform for the SOC.
3
Everyone Wants to Understand the Threats
Customer 1 Customer 2 Customer 3
4
…limited visibility to
…and little visibility threats affecting cloud
into email traffic and workloads
mailboxes
Branch Office
Branch Office
Security
Analyst
Branch Office
XDR
Branch Office
Source: The XDR Payoff: Better Security Posture, ESG Research, Sep 2020
9
10
Each XDR Piece Adds Value, with One or Many
Endpoint – most attacks involve Email - 94% of malware
users devices • Who else received this email or
• Find threats hidden amongst a similar threat?
endpoint telemetry • API integration for inside view
• What happened within the • Are there compromised
endpoint? How did it accounts sending internal
propagate? phishing emails?
Cloud/Workloads/Containers
Network - sees EDR blind spots -critical to business operations
(unmanaged; legacy, IoT, IIoT)
• Correlates data from more
• How is the attacker moving security controls than typical
across the organization? EDR to solutions tell a more
• How is a threat communicating? complete story.
• What happened within the
workload?
11
How is it different than other approaches?
Trend Micro Vendor-to-Vendor SOAR / SIEM
Vision One partnership
Sharing of IOCs between layers Yes Yes Yes
for sweeping
Corelated detection of low Yes No partial
confidence events across layers
Deep understanding of all data Yes No No
generated by layers
Integrated investigations in one Yes No partial
console
Integrated response actions Yes No Yes
across layers
Added Risk Visibility across the Yes No No
environment
12
Trend Micro Managed XDR
Expert Threat Identification & 24x7 Monitoring &
Hunting Detection
Uncovering complex targeted Continuous alert monitoring,
threats using cutting-edge correlation and prioritization using
techniques with enrichment by automation and analytics. Proactive
threats experts leveraging deep sweeping of endpoint, server,
threat intelligence network, and email.
✅
Wants to supplement in-house activities (augment detection, added
threat expertise/intelligence, proactive threat hunting)
✅
Have or concerned with having an incident; want 24/7 alert monitoring
14
What it Means for the Customer
Events generated by Trend Micro products (which are not
actionable but needed for compliance / visibility when
investigating)
one
17