Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Trend Micro Expands Risk Management Portfolio to Combat Advanced Persistent Threats

July 2011 by Marc Jacob

Trend Micro Incorporated announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to easily evade conventional perimeter and content security. As part of its strategy, Trend Micro is expanding its real-time threat management solutions portfolio with the introduction of Trend Micro™ Threat Intelligence Manager and a major new release of Trend Micro™ Threat Management System. In conjunction with cloud-based vulnerability management services, virtual patching capability and specialized Trend Micro™ Risk Management Services, these new products are designed to reduce the risk and impact of targeted advanced persistent threats in the enterprise.

The Need for Real-Time Threat Management

APTs, or advanced targeted attacks, and the damage they cause are increasingly in the news. Studies such as the 2011 Verizon Data Breach Investigation Report illustrate the sophistication of these multi-phase targeted attacks, and strikingly, the typical months-long duration from the onset of data loss to discovery and final containment. All the evidence clearly demonstrates that standard security and risk management strategies are not sufficient countermeasures to the real threat of such an attack.

Analysts and security experts agree that enterprise risk management practices need to expand and change to deal with these threats. Independent research firm Forrester Research calls for a “Zero Trust” security model, noting that “Zero Trust provides a business case to bring internal controls up to a level necessary to meet modern threats. When a company adopts a Zero Trust mentality, it will quickly find that it wants to know what is going on inside its network.”

How Trend Micro is Minimizing the Risk and Impact of APT Attacks
Today’s advanced attacks use a multi-phase approach to achieve valuable data theft – gaining a point of entry, downloading additional malware, locating and compromising target systems, and uploading data. While an actual compromise can happen quickly, the time span from entry to initial compromise is more often hours or days. The time to actual discovery and full containment can be several months. During this cycle an enterprise’s network is hosting an intruder whose purpose is to compromise valuable data. The good news is that evasive malware can be detected – by identification at entry, by its network activity, and by its effect on endpoints and servers.
Trend Micro real-time threat management solutions focus on these factors to reduce both the risk of APT attacks and the impact and duration of any successful attack by:

• Minimizing the likelihood of successful APT intrusion

• Shortening the time to attack discovery

• Expediting intrusion containment and remediation

Trend Micro Real-Time Threat Management Products and Services

NEW! Trend Micro Threat Intelligence Manager

Threat Intelligence Manager (TIM) is a sophisticated event management solution designed to provide complete insight into the lifecycle of security events. With easy access to the latest threat statistics, actionable security intelligence, and advanced visualization techniques, this malware-focused incident response tool empowers IT managers of enterprises to rapidly analyze and remediate risk points. This allows enterprises to quickly spot advanced and hidden threats, learn how they penetrated the corporate network, and gauge their impact. TIM’s incident and event analysis complements and expands the reporting capabilities of Trend Micro products and provides security specialists the insight needed to quickly respond to enterprise threats.
Threat Intelligence Manager is available now and U.S. pricing is $10.08 per user.

UPDATED! – Trend Micro Threat Management System

Threat Management System (TMS) is a network analysis and visibility solution that detects evasive intrusions, automates remediation, and is designed to provide the real-time visibility, insight, and control to protect enterprises from advanced attacks. TMS is used by over 300 customers worldwide, including some of the world’s most sophisticated government agencies and leading corporations within banking and telecommunications.

The latest release of TMS introduces a new malware identification and malware analysis platform, the Dynamic Threat Analysis System. The tool extends the capabilities of TMS’s leading threat detection and correlation engines by using sandboxing and other advanced methods to provide detailed exploration, simulation and full forensic analysis of suspected malware captured by the Threat Management System or submitted directly by a security specialist.
“Trend Micro Threat Management System has already paid for itself. In the first 48 hours, this tool detected viruses on biomedical devices from several manufacturers,” said Ty Smallwood, Information Services Security Officer, Medical Center of Central Georgia. “The product gives us the visibility that we never had before—now we can see in real time what is going on.”

Threat Management System is available now. U.S. pricing starts at $20,000 for 1000 users.

Trend Micro™ Vulnerability Management Services

This SaaS solution automates vulnerability management and policy compliance, providing network discovery, asset prioritization, vulnerability assessment, and remediation tracking. Policy compliance allows security managers to audit, enforce and document compliance with IT policies and external regulations.

Trend Micro™ Deep Security

Deep Security provides advanced security and self defense for physical, virtual and cloud-based servers. With firewall, IPS, integrity management, antivirus, and log management capabilities, Deep Security delivers in-depth protection as well as virtual patching to rapidly shield your systems from exploitation.

Trend Micro Risk Management Services

Trend Micro Threat Researchers and Service Specialists augment an enterprise’s security staff and expertise with a complete portfolio of proactive monitoring, remediation and strategic consulting services designed to further reduce the risk exposure and security management costs.
Risk Management Services are available at a full range of service levels and include:

• Proactive monitoring and alerting

• Threat analysis and advisory

• Threat remediation assistance

• Risk posture review and analysis

• Strategic security planning


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts