Trend Micro Expands Risk Management Portfolio To Address Advanced Persistent Threats

Real-time threat management solutions improve protection, reduce time-to-discovery, and minimize containment costs

June 14, 2011

6 Min Read

PRESS RELEASE

CUPERTINO, Calif., June 13, 2011– Today, Trend Micro Incorporated (TSE: 4704) announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to easily evade conventional perimeter and content security. As part of its strategy, Trend Micro is expanding its real-time threat management solutions portfolio with the introduction of Trend Micro™ Threat Intelligence Manager and a major new release of Trend Micro™ Threat Management System. In conjunction with cloud-based vulnerability management services, virtual patching capability and specialized Trend Micro™ Risk Management Services, these new products are designed to reduce the risk and impact of targeted advanced persistent threats in the enterprise.

The Need for Real-Time Threat Management APTs, or advanced targeted attacks, and the damage they cause are increasingly in the news. Studies such as the 2011 Verizon Data Breach Investigation Report illustrate the sophistication of these multi-phase targeted attacks, and strikingly, the typical months-long duration from the onset of data loss to discovery and final containment. All the evidence clearly demonstrates that standard security and risk management strategies are not sufficient countermeasures to the real threat of such an attack. Analysts and security experts agree that enterprise risk management practices need to expand and change to deal with these threats. Independent research firm Forrester Research calls for a “Zero Trust” security model, noting that “Zero Trust provides a business case to bring internal controls up to a level necessary to meet modern threats. When a company adopts a Zero Trust mentality, it will quickly find that it wants to know what is going on inside its network.”

“Trend Micro has innovated to help our customers more effectively combat APTs. Our proactive, real-time threat management solutions are designed to provide customers with network-wide visibility and control, actionable threat intelligence and timely vulnerability protection,” said John Maddison, executive general manager, Data Center Business Unit at Trend Micro. “Only Trend Micro—with our cloud-based approach and unique integrated threat discovery, analysis and automated remediation capabilities—can help Enterprises optimize their security posture against today’s threats, while affording vendor consolidation and cost reduction opportunities.”

How Trend Micro is Minimizing the Risk and Impact of APT Attacks Today’s advanced attacks use a multi-phase approach to achieve valuable data theft – gaining a point of entry, downloading additional malware, locating and compromising target systems, and uploading data. While an actual compromise can happen quickly, the time span from entry to initial compromise is more often hours or days. The time to actual discovery and full containment can be several months. During this cycle an enterprise’s network is hosting an intruder whose purpose is to compromise valuable data. The good news is that evasive malware can be detected – by identification at entry, by its network activity, and by its effect on endpoints and servers. Trend Micro real-time threat management solutions focus on these factors to reduce both the risk of APT attacks and the impact and duration of any successful attack by: • Minimizing the likelihood of successful APT intrusion • Shortening the time to attack discovery • Expediting intrusion containment and remediation

Trend Micro Real-Time Threat Management Products and Services

NEW! Trend Micro Threat Intelligence Manager Threat Intelligence Manager (TIM) is a sophisticated event management solution designed to provide complete insight into the lifecycle of security events. With easy access to the latest threat statistics, actionable security intelligence, and advanced visualization techniques, this malware-focused incident response tool empowers IT managers of enterprises to rapidly analyze and remediate risk points. This allows enterprises to quickly spot advanced and hidden threats, learn how they penetrated the corporate network, and gauge their impact. TIM’s incident and event analysis complements and expands the reporting capabilities of Trend Micro products and provides security specialists the insight needed to quickly respond to enterprise threats. Threat Intelligence Manager is available now and U.S. pricing is $10.08 per user.

UPDATED! – Trend Micro Threat Management System Threat Management System (TMS) is a network analysis and visibility solution that detects evasive intrusions, automates remediation, and is designed to provide the real-time visibility, insight, and control to protect enterprises from advanced attacks. TMS is used by over 300 customers worldwide, including some of the world’s most sophisticated government agencies and leading corporations within banking and telecommunications.

The latest release of TMS introduces a new malware identification and malware analysis platform, the Dynamic Threat Analysis System. The tool extends the capabilities of TMS’s leading threat detection and correlation engines by using sandboxing and other advanced methods to provide detailed exploration, simulation and full forensic analysis of suspected malware captured by the Threat Management System or submitted directly by a security specialist. “Trend Micro Threat Management System has already paid for itself. In the first 48 hours, this tool detected viruses on biomedical devices from several manufacturers,” said Ty Smallwood, Information Services Security Officer, Medical Center of Central Georgia. “The product gives us the visibility that we never had before—now we can see in real time what is going on.”

Threat Management System is available now. U.S. pricing starts at $20,000 for 1000 users.

Trend Micro™ Vulnerability Management Services This SaaS solution automates vulnerability management and policy compliance, providing network discovery, asset prioritization, vulnerability assessment, and remediation tracking. Policy compliance allows security managers to audit, enforce and document compliance with IT policies and external regulations.

Trend Micro™ Deep Security Deep Security provides advanced security and self defense for physical, virtual and cloud-based servers. With firewall, IPS, integrity management, antivirus, and log management capabilities, Deep Security delivers in-depth protection as well as virtual patching to rapidly shield your systems from exploitation.

Trend Micro Risk Management Services Trend Micro Threat Researchers and Service Specialists augment an enterprise’s security staff and expertise with a complete portfolio of proactive monitoring, remediation and strategic consulting services designed to further reduce the risk exposure and security management costs. Risk Management Services are available at a full range of service levels and include: • Proactive monitoring and alerting • Threat analysis and advisory • Threat remediation assistance • Risk posture review and analysis • Strategic security planning About Trend Micro Trend Micro Incorporated (TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the Trend Micro™ Smart Protection Network™ infrastructure, our industry-leading cloud-computing security technology, products and services stop threats where they emerge, on the Internet, and are supported by 1,000+ threat intelligence experts around the globe. For additional information, visit Trend Micro.

Read more about:

2011
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights