Trend Micro has announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats. The strategy covers three focus areas with new solution concepts – custom defense against customized targeted cyber-attacks, complete end user protection for exchange of information in today’s bring-your-own-device (BYOD) era, and cloud security optimized for data centers.
According to a recent survey of more than 1,000 IT professionals and managers across Asia Pacific, the biggest perceived IT threat is data breach, with almost half of the respondents citing it as a serious issue. However, in the same survey, the top security investment was still anti-virus or anti-malware, followed by data leakage prevention. Overall, the report showed that advanced persistent threats (APTs) or targeted attacks were not regarded as serious and viewed with lower priority by the respondents in this region.
Organizations need to take a new approach that enables them not only to detect and analyze APTs, but also to rapidly adapt their security controls and respond to the attackers. Trend Micro’s Custom Defense Strategy integrates solutions, global threat intelligence, specialized tools and services to deliver a comprehensive solution for customers.
APTs or targeted attacks continue to penetrate and evade the conventional security controls such as antivirus, next-generation firewall, and intrusion prevention systems, as recently witnessed with the attacks on banks and media companies in South Korea. These attacks are typically remotely orchestrated via Command & Control (C&C) communications between the infiltrated systems and the attackers themselves. Recently tracked C&C data from TrendLabs researchers shows over 1500 active C&C sites, with victims per site ranging from 1 to over 25,000.
In light of these attack behaviors, Trend Micro's Custom Defense Strategy offers new advances in C&C response with unique custom detection and protection that can be automatically routed to network devices, gateway, server and endpoint protection points - empowering enterprises to adapt and respond to such attacks.
By correlating with terabytes of threat intelligence in the cloud, Trend Micro’s Smart Protection Network arms organizations with insight about the specific threats and cybercriminal involved, empowering them with the information needed to fight back. Trend Micro customers in South Korea, who employed Custom Defense technologies, were able to discover and respond to the recent attack before damage could be done.
Trend Micro is launching SafeSync for Enterprise, a secured file synchronization and collaboration solution that resides inside enterprise datacenter/private cloud. The on-premise solution enables productivity and collaboration of mobile workers who use multiple devices such as smartphones, tablets, and PCs, without sacrificing enterprise information assets.
In addition, with the introduction of Trend Micro Enterprise Security and Data Protection, Trend Micro extends its existing anti-malware platform to include integrated data leakage prevention (iDLP) capabilities, offering existing and new customers a comprehensive, easy-to-install, centrally managed data protection solution. The new solution activates comprehensive data leakage prevention capabilities across existing Trend Micro endpoint, mobile, mail, and gateway solutions. From anywhere, any device, any application, end users can access and exchange information safely.
Trend Micro Deep Security, next generation server security platform, is best optimized for cloud and virtualization, designed to maximize the return on investment in virtualization for enterprises, as well as cloud service providers with an infrastructure-as-a-service (IaaS) practice. Latest version extends datacenter security to hybrid and public clouds – integrating with vCloud and Amazon Web Services API, and delivering multi-tenant architecture for software-defined datacenters. In addition, Trend MicroTM SecureCloudTM, provides data encryption in cloud. This encryption and key management system allows IT managers to embrace virtualization and cloud computing, safe in the knowledge that their company’s most valuable asset – its data – is protected from theft, accidental exposure and even unapproved migration to another datacenter. This puts the power back into the hands of the business, enabling policy-based key management no matter what the environment – for maximum data security and compliance.