|By PR Newswire||
|October 8, 2012 02:00 PM EDT||
CUPERTINO, Calif., Oct. 8, 2012 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), is introducing "Custom Defense" – the industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Custom Defense integrates software, global threat intelligence, and specialized tools and services to deliver a comprehensive solution for customers.
Today's most damaging attacks are those targeted specifically at an organization – its people, its systems, its vulnerabilities, and its data. Stealthier and more sophisticated than ever, cybercriminals use clever social engineering techniques like spear phishing to quietly penetrate select organizations, deploying customized malware that can live undetected for months within an organization. Cybercriminals can remotely and covertly steal an organization's valuable information – from credit card data to the more lucrative intellectual property or government secrets – potentially destroying an organization's competitive advantage, or in the case of government even putting national security at risk.
While many organizations feel that they have been targeted, 67 percent admit that their current security activities are insufficient to stop a targeted attack.1 Not surprisingly, 55 percent are not even aware of intrusions2, and fewer know the extent of the attack or who exactly is behind it. While necessary to thwart the majority of today's attacks, standard defenses have proven insufficient to handle APTs and targeted attacks; a custom attack requires a custom defense. Trend Micro's Custom Defense solution enables a complete Detect – Analyze – Adapt – Respond lifecycle. Custom Defense goes beyond the ability to just detect and analyze targeted attacks by blocking and shutting them down before the real damage occurs. This comprehensive solution also delivers custom insight about the specific threat and cybercriminals involved, empowering organizations with the information they need to fight back against their attackers.
The Custom Defense – How It Works
At the heart of the Custom Defense solution is a specialized threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications and attacker behaviors that are invisible to standard security defenses. Uniquely integrated with control points across the network, the solution can detect and block attacks occurring via corporate and personal email, social media applications, mobile devices and more. It can also detect and block malware communications back to the cybercriminal, or attempts to move laterally to other valuable systems within the network. Unlike competitive offerings that use generic 'sandboxes' in the hope that one will trigger and detect the attack, the Custom Defense solution allows for multiple, customer-defined sandboxes that better reflect their real-life environment and allow them to determine whether they have been breached. The Custom Defense sandbox detonates suspect code in a safe, controlled environment that can be optimized for performance and to evade hacker techniques that are on the lookout for sandboxing solutions.
Upon detection, the Custom Defense solution best enables organizations to profile in depth the risk, origin and characteristics of the attack, and uniquely delivers actionable intelligence that guides the organization on how to contain and remediate the attack. To aid in the threat investigation, this solution offers a customized view of threat intelligence that is specific to the organization's environment, and offers the ability to tap into the power of a global, cloud-based threat intelligence network.
To immediately adapt and strengthen protection against further attacks, the Custom Defense solution helps customers create custom responses to these targeted attacks, such as IP blacklists, custom spear phishing protection, and coming soon, custom signatures -- all specific to each attack. The solution automatically updates the global threat intelligence network and issues these custom security updates to Trend Micro gateway, endpoint and server enforcement points. Built using an open and extensible platform, the solution can also send security updates to non-Trend Micro security products that may already be an important part of an organization's defense in-depth strategy.
Finally, the solution delivers 360-degree contextual visibility of the attack, arming the organization with the insight needed to respond to their specific attackers. The solution can deliver insight such as what information is being targeted, how the attack works, who the attacker is, and perhaps most importantly, who is actually sponsoring the attack. How the organization responds depends on its own situation, and could be as simple as evasive action to make it difficult for the attacker to continue, but could also include public exposure of the attacker to discredit him or her in the cyber community, or even legal action against the attacker and sponsor.
The Custom Defense – Key Components
As part of this announcement, Trend Micro is revealing enhancements to critical software components, its threat intelligence, as well as the availability of specialized tools and services – all of which are necessary for providing a complete custom defense.
Trend Micro Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and relevant actionable intelligence found at the heart of the Custom Defense solution. It has been enhanced to meet the growing demands of large enterprises and governments:
- Open: Delivers highly scalable, customer-defined sandboxing analysis that can be leveraged by other products
- Automated: Automatically shares IP/Domain blacklists with Trend Micro and third party products
- Scalable: Supports incremental capacity ranges up to 50,000 samples/day
- Lower TCO: Offers multiple form factors with the ability to start simply with a single device to monitor all network traffic types
- Infrastructure fit: Breadth of attack detection goes beyond Microsoft-targeting malware and identifies lateral movement, cross-port activity and privilege escalation
As part of the Custom Defense solution and for better protection across the network, Trend Micro is the first to integrate advanced threat detection capabilities into its mail gateway and server security products. Trend Micro™ ScanMail™Suite for Microsoft® Exchange™, Trend Micro™ ScanMail™ Suite for IBM® Lotus® Domino™, and Trend Micro™ InterScan™ Messaging Security have been integrated with Deep Discovery to send suspicious files for sandbox analysis and detection of previously unknown malware. In addition, these products feature a new exploit detection engine that identifies email attachments that contain exploits for vulnerabilities in major Adobe, Microsoft Office and other programs and blocks or quarantines them, furthering the level of protection provided.
Other Trend Micro Enterprise Security Products
All Trend Micro protection products will integrate more tightly with the adaptive updates of Deep Discovery. Additional product integrations are planned and will be announced at a later date.
Smart Protection Network and Threat Connect
The Trend Micro Smart Protection Network cloud security infrastructure rapidly and accurately identifies new threats, delivering global threat intelligence to secure data wherever it resides. It looks in more places for threat data, and uses big data analytics to deliver actionable threat intelligence across mobile, physical, virtual and cloud environments.
The Threat Connect information portal is accessible via Deep Discovery. It has been enhanced to provide the full breadth of relevant Trend Micro threat intelligence about specific threats – aiding in the rapid assessment, containment and remediation of an attack.
Attack Response Tools and Services
For years, Trend Micro has been helping its customers effectively identify and remediate targeted cyber-attacks with tools and services that enable Trend Micro support engineers to discover and analyze advanced threats in mail stores and network traffic, as well as for searching log files for traces of attack activity. Proven effective for incident response and forensics, these tools are now being made available to the Trend Micro partner ecosystem, including, value-added resellers and service providers.
"Custom Defense is not just a step forward—it is a big leap forward. With the new 'sand box' capability of Deep Discovery we can evaluate a suspicious java applet or code snippet and make the right decision. After all, it is not always the broad-scale threats that represent the biggest danger to our business. Today, it could be a targeted attack—a piece of code crafted just to get at our data. Trend Micro Custom Defense gives us a line of defense against targeted attacks. We can now shut them down quickly."
- Andrew McCullough, Lead Information Security Architect, IT
G6 Hospitality (Motel 6 and Studio 6), Dallas, Texas
"I can't say enough good things about this product—it's doing an awesome job in our environment. We are just getting started with Deep Discovery and we expect that long-term it will yield even more benefits for us. Right now, it is helping us respond more quickly to incidents. It is telling us all kinds of things we would never have known if not for this tool."
- Manager, Desktop Security
Large U.S. Manufacturing Company
"Trend Micro has a great track record of performance and innovation in protecting our clients assets, and the addition of Custom Defense raises the bar higher by shortening the critical window of exposure between threat identification and response."
- Dan Wilson, Senior Vice President of Partner Alliances, Accuvant
"Our research indicates that the majority of enterprise security professionals believe that it is 'highly likely' or 'somewhat likely' that their organization has been the target of an APT. Risks can no longer be ignored or addressed with token changes to the status quo; instead, response must be immediate and adaptive. An effective approach is with network-based security monitoring designed to detect and analyze attack activity in real-time. Trend Micro is one of few vendors whose solutions fit this description; with the Custom Defense, it is enhancing its capabilities in attack detection and intelligence."
- Jon Oltsik, Senior Principal Analyst
Enterprise Strategy Group
- The Human Factor in Data Protection, Ponemon Institute, January 2012
- Trend Micro research, 2012
- Trend Micro Custom Defense
- Forrester Protecting Against APTs: Network Visibility
- IT Harvest Interview About Deep Discovery
- How Deep Discovery Works Against Targeted Attacks
White Papers and Case Studies:
- ESG Understanding and Addressing APTs
- Motel 6 Customer Case Study
- Leading Manufacturing Company Customer Case Study
Data Sheets and Web pages:
- Deep Discovery Data Sheet
- Combating Advanced Persistent Threats
- Deep Discovery: Next-generation Protection from Advanced Persistent Threats
About Trend Micro
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
SOURCE Trend Micro Incorporated
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlined research, analysis and recommendations from his recently published book on this phenomena on the way leading edge organizations like GE and Disney are unlocking the Internet of Things opportunity and what steps your organization should be taking to position itself for the next platform of digital competition.
Jan. 26, 2015 02:00 AM EST Reads: 2,699
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Jan. 26, 2015 01:00 AM EST Reads: 2,511
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
Jan. 26, 2015 12:45 AM EST Reads: 3,457
SYS-CON Events announced today that ActiveState, the leading independent Cloud Foundry and Docker-based PaaS provider, has been named “Silver Sponsor” of SYS-CON's DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. ActiveState believes that enterprises gain a competitive advantage when they are able to quickly create, deploy and efficiently manage software solutions that immediately create business value, but they face many challenges that prevent them from doing so. The Company is uniquely positioned to help address these challenges thro...
Jan. 25, 2015 11:45 PM EST Reads: 1,781
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
Jan. 25, 2015 07:45 PM EST Reads: 2,326
SYS-CON Media announced that Cisco, a worldwide leader in IT that helps companies seize the opportunities of tomorrow, has launched a new ad campaign in Cloud Computing Journal. The ad campaign, a webcast titled 'Is Your Data Center Ready for the Application Economy?', focuses on the latest data center networking technologies, including SDN or ACI, and how customers are using SDN and ACI in their organizations to achieve business agility. The Cisco webcast is available on-demand.
Jan. 25, 2015 07:00 PM EST Reads: 1,241
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Jan. 25, 2015 06:15 PM EST Reads: 3,805
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science from the University of California, Berkeley.
Jan. 25, 2015 06:00 PM EST Reads: 3,007
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
Jan. 25, 2015 06:00 PM EST Reads: 2,733
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
Jan. 25, 2015 04:30 PM EST Reads: 3,040
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP and chief architect at BSQUARE Corporation; Seth Proctor, CTO of NuoDB, Inc.; and Andris Gailitis, C...
Jan. 25, 2015 04:00 PM EST Reads: 2,439
SYS-CON Events announced today that CodeFutures, a leading supplier of database performance tools, has been named a “Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. CodeFutures is an independent software vendor focused on providing tools that deliver database performance tools that increase productivity during database development and increase database performance and scalability during production.
Jan. 25, 2015 04:00 PM EST Reads: 1,567
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Jan. 25, 2015 03:00 PM EST Reads: 2,452
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 25, 2015 02:30 PM EST Reads: 2,256
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
Jan. 25, 2015 02:15 PM EST Reads: 2,877
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
Jan. 25, 2015 01:00 PM EST Reads: 3,779
“The age of the Internet of Things is upon us,” stated Thomas Svensson, senior vice-president and general manager EMEA, ThingWorx, “and working with forward-thinking companies, such as Elisa, enables us to deploy our leading technology so that customers can profit from complete, end-to-end solutions.” ThingWorx, a PTC® (Nasdaq: PTC) business and Internet of Things (IoT) platform provider, announced on Monday that Elisa, Finnish provider of mobile and fixed broadband subscriptions, will deploy ThingWorx® platform technology to enable a new Elisa IoT service in Finland and Estonia.
Jan. 25, 2015 11:00 AM EST Reads: 1,476
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...
Jan. 25, 2015 11:00 AM EST Reads: 2,873
As enterprises move to all-IP networks and cloud-based applications, communications service providers (CSPs) – facing increased competition from over-the-top providers delivering content via the Internet and independently of CSPs – must be able to offer seamless cloud-based communication and collaboration solutions that can scale for small, midsize, and large enterprises, as well as public sector organizations, in order to keep and grow market share. The latest version of Oracle Communications Unified Communications Suite gives CSPs the capability to do just that. In addition, its integration ...
Jan. 25, 2015 11:00 AM EST Reads: 2,817
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, a...
Jan. 25, 2015 10:45 AM EST Reads: 2,949