Click here to close now.




















Welcome!

@CloudExpo Authors: Liz McMillan, Ian Khan, Jason Bloomberg, Carmen Gonzalez, Greg O'Connor

News Feed Item

Trend Micro Introduces Custom Defense Against APTs and Targeted Attacks

Unique Solution Delivers Adaptive Protection and Empowers Customers to Fight Back Against Their Attackers

CUPERTINO, Calif., Oct. 8, 2012 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), is introducing "Custom Defense" – the industry's first advanced threat protection solution that enables businesses and government agencies not only to detect and analyze advanced persistent threats (APTs) and targeted attacks, but also to rapidly adapt their protection and respond to these attacks. Custom Defense integrates software, global threat intelligence, and specialized tools and services to deliver a comprehensive solution for customers.

Today's most damaging attacks are those targeted specifically at an organization – its people, its systems, its vulnerabilities, and its data. Stealthier and more sophisticated than ever, cybercriminals use clever social engineering techniques like spear phishing to quietly penetrate select organizations, deploying customized malware that can live undetected for months within an organization. Cybercriminals can remotely and covertly steal an organization's valuable information – from credit card data to the more lucrative intellectual property or government secrets – potentially destroying an organization's competitive advantage, or in the case of government even putting national security at risk.

While many organizations feel that they have been targeted, 67 percent admit that their current security activities are insufficient to stop a targeted attack.1 Not surprisingly, 55 percent are not even aware of intrusions2, and fewer know the extent of the attack or who exactly is behind it. While necessary to thwart the majority of today's attacks, standard defenses have proven insufficient to handle APTs and targeted attacks; a custom attack requires a custom defense. Trend Micro's Custom Defense solution enables a complete Detect – Analyze – Adapt – Respond lifecycle.  Custom Defense goes beyond the ability to just detect and analyze targeted attacks by blocking and shutting them down before the real damage occurs. This comprehensive solution also delivers custom insight about the specific threat and cybercriminals involved, empowering organizations with the information they need to fight back against their attackers.

The Custom Defense – How It Works

Detect

At the heart of the Custom Defense solution is a specialized threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications and attacker behaviors that are invisible to standard security defenses. Uniquely integrated with control points across the network, the solution can detect and block attacks occurring via corporate and personal email, social media applications, mobile devices and more. It can also detect and block malware communications back to the cybercriminal, or attempts to move laterally to other valuable systems within the network. Unlike competitive offerings that use generic 'sandboxes' in the hope that one will trigger and detect the attack, the Custom Defense solution allows for multiple, customer-defined sandboxes that better reflect their real-life environment and allow them to determine whether they have been breached. The Custom Defense sandbox detonates suspect code in a safe, controlled environment that can be optimized for performance and to evade hacker techniques that are on the lookout for sandboxing solutions.

Analyze

Upon detection, the Custom Defense solution best enables organizations to profile in depth the risk, origin and characteristics of the attack, and uniquely delivers actionable intelligence that guides the organization on how to contain and remediate the attack. To aid in the threat investigation, this solution offers a customized view of threat intelligence that is specific to the organization's environment, and offers the ability to tap into the power of a global, cloud-based threat intelligence network.

Adapt

To immediately adapt and strengthen protection against further attacks, the Custom Defense solution helps customers create custom responses to these targeted attacks, such as IP blacklists, custom spear phishing protection, and coming soon, custom signatures -- all specific to each attack.  The solution automatically updates the global threat intelligence network and issues these custom security updates to Trend Micro gateway, endpoint and server enforcement points. Built using an open and extensible platform, the solution can also send security updates to non-Trend Micro security products that may already be an important part of an organization's defense in-depth strategy.

Respond

Finally, the solution delivers 360-degree contextual visibility of the attack, arming the organization with the insight needed to respond to their specific attackers. The solution can deliver insight such as what information is being targeted, how the attack works, who the attacker is, and perhaps most importantly, who is actually sponsoring the attack. How the organization responds depends on its own situation, and could be as simple as evasive action to make it difficult for the attacker to continue, but could also include public exposure of the attacker to discredit him or her in the cyber community, or even legal action against the attacker and sponsor.

The Custom Defense – Key Components

As part of this announcement, Trend Micro is revealing enhancements to critical software components, its threat intelligence, as well as the availability of specialized tools and services – all of which are necessary for providing a complete custom defense.

Deep Discovery

Trend Micro Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and relevant actionable intelligence found at the heart of the Custom Defense solution. It has been enhanced to meet the growing demands of large enterprises and governments:

  • Open: Delivers highly scalable, customer-defined sandboxing analysis that can be leveraged by other products
  • Automated: Automatically shares IP/Domain blacklists with Trend Micro and third party products
  • Scalable: Supports incremental capacity ranges up to 50,000 samples/day
  • Lower TCO: Offers multiple form factors with the ability to start simply with a single device to monitor all network traffic types
  • Infrastructure fit: Breadth of attack detection goes beyond Microsoft-targeting malware and identifies lateral movement, cross-port activity and privilege escalation

Messaging Security

As part of the Custom Defense solution and for better protection across the network, Trend Micro is the first to integrate advanced threat detection capabilities into its mail gateway and server security products. Trend Micro™ ScanMail™Suite for Microsoft® Exchange™, Trend Micro™ ScanMail™ Suite for IBM® Lotus® Domino™, and Trend Micro™ InterScan™ Messaging Security have been integrated with Deep Discovery to send suspicious files for sandbox analysis and detection of previously unknown malware. In addition, these products feature a new exploit detection engine that identifies email attachments that contain exploits for vulnerabilities in major Adobe, Microsoft Office and other programs and blocks or quarantines them, furthering the level of protection provided.

Other Trend Micro Enterprise Security Products

All Trend Micro protection products will integrate more tightly with the adaptive updates of Deep Discovery. Additional product integrations are planned and will be announced at a later date.

Smart Protection Network and Threat Connect

The Trend Micro Smart Protection Network cloud security infrastructure rapidly and accurately identifies new threats, delivering global threat intelligence to secure data wherever it resides. It looks in more places for threat data, and uses big data analytics to deliver actionable threat intelligence across mobile, physical, virtual and cloud environments.

The Threat Connect information portal is accessible via Deep Discovery. It has been enhanced to provide the full breadth of relevant Trend Micro threat intelligence about specific threats – aiding in the rapid assessment, containment and remediation of an attack.

Attack Response Tools and Services

For years, Trend Micro has been helping its customers effectively identify and remediate targeted cyber-attacks with tools and services that enable Trend Micro support engineers to discover and analyze advanced threats in mail stores and network traffic, as well as for searching log files for traces of attack activity.  Proven effective for incident response and forensics, these tools are now being made available to the Trend Micro partner ecosystem, including, value-added resellers and service providers. 

Quotes

Customer

"Custom Defense is not just a step forward—it is a big leap forward. With the new 'sand box' capability of Deep Discovery we can evaluate a suspicious java applet or code snippet and make the right decision. After all, it is not always the broad-scale threats that represent the biggest danger to our business. Today, it could be a targeted attack—a piece of code crafted just to get at our data. Trend Micro Custom Defense gives us a line of defense against targeted attacks. We can now shut them down quickly."

- Andrew McCullough, Lead Information Security Architect, IT 
  G6 Hospitality (Motel 6 and Studio 6), Dallas, Texas  

"I can't say enough good things about this product—it's doing an awesome job in our environment. We are just getting started with Deep Discovery and we expect that long-term it will yield even more benefits for us. Right now, it is helping us respond more quickly to incidents. It is telling us all kinds of things we would never have known if not for this tool."

- Manager, Desktop Security
Large U.S. Manufacturing Company

"Trend Micro has a great track record of performance and innovation in protecting our clients assets, and the addition of Custom Defense raises the bar higher by shortening the critical window of exposure between threat identification and response."

- Dan Wilson, Senior Vice President of Partner Alliances, Accuvant

Analyst

"Our research indicates that the majority of enterprise security professionals believe that it is 'highly likely' or 'somewhat likely' that their organization has been the target of an APT. Risks can no longer be ignored or addressed with token changes to the status quo; instead, response must be immediate and adaptive. An effective approach is with network-based security monitoring designed to detect and analyze attack activity in real-time. Trend Micro is one of few vendors whose solutions fit this description; with the Custom Defense, it is enhancing its capabilities in attack detection and intelligence." 

- Jon Oltsik, Senior Principal Analyst
Enterprise Strategy Group

Sources:

  1. The Human Factor in Data Protection, Ponemon Institute, January  2012
  2. Trend Micro research, 2012

Supporting materials:

Supporting Videos:

White Papers and Case Studies:

Data Sheets and Web pages:

About Trend Micro
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Puppet Labs is pleased to share the findings from our 2015 State of DevOps Survey. We have deepened our understanding of how DevOps enables IT performance and organizational performance, based on responses from more than 20,000 technical professionals we’ve surveyed over the past four years. The 2015 State of DevOps Report reveals high-performing IT organizations deploy 30x more frequently with 200x shorter lead times. They have 60x fewer failures and recover 168x faster
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Com...
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of ...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Learn what is going on, contribute to the discussions, and e...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small,...
Moving an existing on-premise infrastructure into the cloud can be a complex and daunting proposition. It is critical to understand the benefits as well as the challenges associated with either a full or hybrid approach. In his session at 17th Cloud Expo, Richard Weiss, Principal Consultant at Pythian, will present a roadmap that can be leveraged by any organization to plan, analyze, evaluate and execute on a cloud migration solution. He will review the five major cloud transformation phases a...
Amazon and Google have built software-defined data centers (SDDCs) that deliver massively scalable services with great efficiency. Yet, building SDDCs has proven to be a near impossibility for ‘normal’ companies without hyper-scale resources. In his session at 17th Cloud Expo, David Cauthron, founder and chief executive officer of Nimboxx, will discuss the evolution of virtualization (hardware, application, memory, storage) and how commodity / open source hyper converged infrastructure (HCI) so...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so the...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what...
SYS-CON Events announced today that Micron Technology, Inc., a global leader in advanced semiconductor systems, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Micron’s broad portfolio of high-performance memory technologies – including DRAM, NAND and NOR Flash – is the basis for solid state drives, modules, multichip packages and other system solutions. Backed by more than 35 years of tech...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises ar...