Trend Micro Rolls Out IoT Security 2.0
Latest version of IoT security platform improves protection, visibility and control
January 10, 2019
PRESS RELEASE
DALLAS, January 9, 2019 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced the global launch of Trend Micro IoT Security (TMIS) 2.0 to help manufacturers and managed service providers improve the security of their products and the wider IoT ecosystem, while enabling them to drive competitive differentiation.
With most traditional security products, it’s not possible for end users to install protection for IoT solutions by themselves, which is where TMIS 2.0 comes in.
“IoT threats are no longer theoretical: endpoints around the globe are being hijacked for data theft, attacked with ransomware and crypto-mining malware, conscripted into DDoS botnets and more,” said Akihiko Omikawa, executive vice president of Trend Micro. “It’s vital that manufacturers step up to raise the bar on security. By integrating threat monitoring, detection and protection into the device itself, consumers and businesses will enhance their security from the moment they install and switch on TMIS 2.0. That’s the kind of value the market is increasingly demanding of IoT device makers.”
The TMIS 2.0 platform can be pre-installed onto IoT devices during the product development lifecycle, requiring minimum deployment effort and providing maximum protection through a range of system hardening and risk detection features.
This updated version offers tight integration with Trend Micro’s industry-leading threat intelligence platform the Smart Protection Network to offer a Web Reputation Service and IoT Reputation Service which block visits to malicious URLs/websites.
The improved installation script makes integration easier for device makers and IoT MSPs, and provides new capabilities to automate security learnings for these firms with less operational effort.
Reports on vulnerabilities, virtual patch deployment and more are emailed to administrators and device makers to provide more flexible management capabilities. A security detection log is stored locally and can be accessed by the device maker for each specific purpose (e.g. to show red light on the device). TMIS 2.0 also boasts an offline mode and proxy support for a wider range of networking environments.
All of these enhancements come alongside the product’s comprehensive range of security capabilities: Application Whitelisting, Hosted Intrusion Prevention Services (HIPS), and System Vulnerability Scanning.
Together, they work to reduce the device attack surface, ensure firmware integrity and block active attacks — minimizing cyber risk for the end customer but also keeping device maintenance costs as low as possible while burnishing the corporate reputation of the device maker/MSP.
More information of Trend Micro IoT Security, please visit: Trend Micro IoT Solutions
About Trend Micro
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud workloads, networks, and endpoints. With more than 6,000 employees in 50 countries and the world’s most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world. For more information, visit www.trendmicro.com.
###
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024