Trend Micro Introduces Custom Defense Against APTs and Targeted Attacks
Trend Micro Introduces Custom Defense Against APTs and Targeted Attacks
Customized Unique Solution Delivers Adaptive Protection and Enables Government and Business to Fight Back Against Sophisticated Attacks
OTTAWA, Oct. 9, 2012 /CNW/ - Trend Micro Incorporated (TYO: 4704; TSE: 4704), is introducing "Custom Defense" - the industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Custom Defense integrates software, global threat intelligence, and specialized tools and services to deliver a customized and comprehensive solution for businesses and government.
Today's most damaging attacks are those targeted specifically at an organization - its people, systems, and data. Stealthier and more sophisticated then ever, cybercriminals use clever social engineering techniques like spear phishing to quietly penetrate select organizations, deploying customized malware that can live undetected for months within an organization. Cybercriminals can remotely and covertly steal an organization's valuable information - from credit card data to the more lucrative intellectual property or government secrets - potentially destroying an organization's competitive advantage, or in the case of government even putting national security at risk.
While many organizations feel that they have been targeted, 67 percent admit that their current security activities are insufficient to stop a targeted attack.(1) Not surprisingly, 55 percent are not even aware of intrusions(2), and fewer know the extent of the attack or who exactly is behind it. While necessary to thwart the majority of today's attacks, standard defenses have proven insufficient to handle APTs and targeted attacks; a custom attack requires a custom defense. This comprehensive solution also delivers custom insight about the specific threat and cybercriminals involved, giving organizations the vital information they need to fight back against their attackers.
The Custom Defense - Key Components
As part of this announcement, Trend Micro is revealing enhancements (www.trendmicro.com/apt) to critical software components, its threat intelligence, as well as the availability of specialized tools and services - all of which are necessary for providing a complete custom defense.
Trend Micro Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and relevant actionable intelligence found at the heart of the Custom Defense solution. It has been enhanced to meet the growing demands of large enterprises and governments:
-- Open: Delivers highly scalable, customer-defined sandboxing analysis that can be leveraged by other products -- Automated: Automatically shares IP/Domain blacklists with Trend Micro and third party products -- Scalable: Supports incremental capacity ranges up to 50,000 samples/day -- Lower TCO: Offers multiple form factors with the ability to start simply with a single device to monitor all network traffic types -- Infrastructure fit: Breadth of attack detection goes beyond Microsoft-targeting malware and identifies lateral movement, cross-port activity and privilege escalation Messaging Security As part of the Custom Defense solution and for better protection across the network, Trend Micro is the first to integrate advanced threat detection capabilities into its mail gateway and server security products. Trend Micro™ ScanMail™Suite for Microsoft® Exchange™, Trend Micro™ ScanMail™ Suite for IBM® Lotus® Domino™, and Trend Micro™ InterScan™ Messaging Security have been integrated with Deep Discovery to send suspicious files for sandbox analysis and detection of previously unknown malware. In addition, these products feature a new exploit detection engine that identifies email attachments that contain exploits for vulnerabilities in major Adobe, Microsoft Office and other programs and blocks or quarantines them, furthering the level of protection provided. Other Trend Micro Enterprise Security Products All Trend Micro protection products will integrate more tightly with the adaptive updates of Deep Discovery. Additional product integrations are planned and will be announced at a later date. Smart Protection Network and Threat Connect The Trend Micro Smart Protection Network cloud security infrastructure rapidly and accurately identifies new threats, delivering global threat intelligence to secure data wherever it resides. It looks in more places for threat data, and uses big data analytics to deliver actionable threat intelligence across mobile, physical, virtual and cloud environments. The Threat Connect information portal is accessible via Deep Discovery. It has been enhanced to provide the full breadth of relevant Trend Micro threat intelligence about specific threats - aiding in the rapid assessment, containment and remediation of an attack. Attack Response Tools and Services For more then two decades, Trend Micro has been helping its customers effectively identify and remediate targeted cyber-attacks with tools and services that enable Trend Micro support engineers to discover and analyze advanced threats in mail stores and network traffic, as well as for searching log files for traces of attack activity. Proven effective for incident response and forensics, these tools are now being made available to the Trend Micro partner ecosystem, including, value-added resellers and service providers. Supporting Quote "Our research indicates that the majority of enterprise security professionals believe that it is 'highly likely' or 'somewhat likely' that their organization has been the target of an APT. Risks can no longer be ignored or addressed with token changes to the status quo; instead, response must be immediate and adaptive. An effective approach is with network-based security monitoring designed to detect and analyze attack activity in real-time. Trend Micro is one of few vendors whose solutions fit this description; with the Custom Defense, it is enhancing its capabilities in attack detection and intelligence." Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group Sources: 1. The Human Factor in Data Protection, Ponemon Institute,
January 2012 2. Trend Micro research, 2012LM
About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Claire M. Tallarico 416 616 9940
SOURCE: Trend Micro Canada
To view this news release in HTML formatting, please use the following URL: http://www.newswire.ca/en/releases/archive/October2012/09/c5185.html
CO: Trend Micro Canada ST: Ontario NI: INTERNET NP
-0- Oct/09/2012 15:26 GMT