Trend Micro Introduces Custom Defense Against APTs and Targeted Attacks

Trend Micro Introduces Custom Defense Against APTs and Targeted Attacks 
Customized Unique Solution Delivers Adaptive Protection and Enables Government 
and Business to Fight Back Against Sophisticated Attacks 
OTTAWA, Oct. 9, 2012 /CNW/ - Trend Micro Incorporated (TYO: 4704; TSE: 4704), 
is introducing "Custom Defense" - the industry's first advanced threat 
protection solution that enables businesses and government agencies not only 
to detect and analyze advanced persistent threats (APTs) and targeted attacks, 
but also to rapidly adapt their protection and respond to these attacks. 
Custom Defense integrates software, global threat intelligence, and 
specialized tools and services to deliver a customized and comprehensive 
solution for businesses and government. 
Today's most damaging attacks are those targeted specifically at an 
organization - its people, systems, and data. Stealthier and more 
sophisticated then ever, cybercriminals use clever social engineering 
techniques like spear phishing to quietly penetrate select organizations, 
deploying customized malware that can live undetected for months within an 
organization. Cybercriminals can remotely and covertly steal an organization's 
valuable information - from credit card data to the more lucrative 
intellectual property or government secrets - potentially destroying an 
organization's competitive advantage, or in the case of government even 
putting national security at risk. 
While many organizations feel that they have been targeted, 67 percent admit 
that their current security activities are insufficient to stop a targeted 
attack.(1) Not surprisingly, 55 percent are not even aware of intrusions(2), 
and fewer know the extent of the attack or who exactly is behind it. While 
necessary to thwart the majority of today's attacks, standard defenses have 
proven insufficient to handle APTs and targeted attacks; a custom attack 
requires a custom defense. This comprehensive solution also delivers custom 
insight about the specific threat and cybercriminals involved, giving 
organizations the vital information they need to fight back against their 
attackers. 
The Custom Defense - Key Components 
As part of this announcement, Trend Micro is revealing enhancements 
(www.trendmicro.com/apt) to critical software components, its threat 
intelligence, as well as the availability of specialized tools and services - 
all of which are necessary for providing a complete custom defense. 
Deep Discovery 
Trend Micro Deep Discovery uniquely detects and identifies evasive threats in 
real-time, and provides the in-depth analysis and relevant actionable 
intelligence found at the heart of the Custom Defense solution. It has been 
enhanced to meet the growing demands of large enterprises and governments: 


    --  Open: Delivers highly scalable, customer-defined sandboxing
        analysis that can be leveraged by other products
    --  Automated: Automatically shares IP/Domain blacklists with Trend
        Micro and third party products
    --  Scalable: Supports incremental capacity ranges up to 50,000
        samples/day
    --  Lower TCO: Offers multiple form factors with the ability to
        start simply with a single device to monitor all network
        traffic types
    --  Infrastructure fit: Breadth of attack detection goes beyond
        Microsoft-targeting malware and identifies lateral movement,
        cross-port activity and privilege escalation

Messaging Security

As part of the Custom Defense solution and for better protection across the 
network, Trend Micro is the first to integrate advanced threat detection 
capabilities into its mail gateway and server security products. Trend 
Micro™ ScanMail™Suite for Microsoft® Exchange™, Trend Micro™ 
ScanMail™ Suite for IBM® Lotus® Domino™, and Trend Micro™ InterScan™ 
Messaging Security have been integrated with Deep Discovery to send suspicious 
files for sandbox analysis and detection of previously unknown malware. In 
addition, these products feature a new exploit detection engine that 
identifies email attachments that contain exploits for vulnerabilities in 
major Adobe, Microsoft Office and other programs and blocks or quarantines 
them, furthering the level of protection provided.

Other Trend Micro Enterprise Security Products

All Trend Micro protection products will integrate more tightly with the 
adaptive updates of Deep Discovery. Additional product integrations are 
planned and will be announced at a later date.

Smart Protection Network and Threat Connect

The Trend Micro Smart Protection Network cloud security infrastructure rapidly 
and accurately identifies new threats, delivering global threat intelligence 
to secure data wherever it resides. It looks in more places for threat data, 
and uses big data analytics to deliver actionable threat intelligence across 
mobile, physical, virtual and cloud environments.

The Threat Connect information portal is accessible via Deep Discovery. It has 
been enhanced to provide the full breadth of relevant Trend Micro threat 
intelligence about specific threats - aiding in the rapid assessment, 
containment and remediation of an attack.

Attack Response Tools and Services

For more then two decades, Trend Micro has been helping its customers 
effectively identify and remediate targeted cyber-attacks with tools and 
services that enable Trend Micro support engineers to discover and analyze 
advanced threats in mail stores and network traffic, as well as for searching 
log files for traces of attack activity. Proven effective for incident 
response and forensics, these tools are now being made available to the Trend 
Micro partner ecosystem, including, value-added resellers and service 
providers.

Supporting Quote 
"Our research indicates that the majority of enterprise security professionals 
believe that it is 'highly likely' or 'somewhat likely' that their 
organization has been the target of an APT. Risks can no longer be ignored or 
addressed with token changes to the status quo; instead, response must be 
immediate and adaptive. An effective approach is with network-based security 
monitoring designed to detect and analyze attack activity in real-time. Trend 
Micro is one of few vendors whose solutions fit this description; with the 
Custom Defense, it is enhancing its capabilities in attack detection and 
intelligence."

Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group

Sources:

  1. The Human Factor in Data Protection, Ponemon Institute,


 January 2012
  2. Trend Micro research, 2012LM 
About Trend Micro 
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security 
leader, creates a world safe for exchanging digital information with its 
Internet content security and threat management solutions for businesses and 
consumers.A pioneer in server security with over 20 years' experience, we 
deliver top-ranked client, server and cloud-based security that fits 
customers' and partners' needs, stops new threats faster, and protects data in 
physical, virtualized and cloud environments. Powered by the industry-leading 
Trend Micro Smart Protection Network cloud computing security infrastructure, 
Trend Micro's products and services stop threats where they emerge - from the 
Internet. They are supported by 1,000+ threat intelligence experts around the 
globe. 
Claire M. Tallarico 416 616 9940 
SOURCE: Trend Micro Canada 
To view this news release in HTML formatting, please use the following URL: 
http://www.newswire.ca/en/releases/archive/October2012/09/c5185.html 
CO: Trend Micro Canada
ST: Ontario
NI: INTERNET NP  
-0- Oct/09/2012 15:26 GMT
 
 
Press spacebar to pause and continue. Press esc to stop.