Tag Archives: IT security

Making the Internet a Better Place on Safer Internet Day

by Ross Baker

In a little under a generation, the internet has transformed the way we live and work forever. It’s enabled us all to become happier, healthier, more sociable and productive people. But as with everything, there’s a flip side. The online world has also given rise to cyberbullies, trolls, hackers and more. That’s why we need to continue fighting the good fight with industry-leading threat prevention.

But it’s also why we need initiatives like Safer Internet Day (SID), to help the most vulnerable in society stay safe online. Trend Micro is proud to be an official supporter yet again this year, as SID lands today, Tuesday 7th of February with the theme is ‘Be the change: unite for a better internet’.  Continue reading

Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Guest blog by Elisa Lippincott

Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders’ quadrant illustrates the positive progress we’ve made since the acquisition of TippingPoint in March 2016 from Hewlett Packard Enterprise.

What sets Trend Micro TippingPoint apart
Trend Micro TippingPoint Next-Generation Intrusion Prevention System (NGIPS) offers in-line comprehensive threat protection against advanced and evasive targeted attacks across data centers and distributed enterprise networks. It offers in-depth analysis of network traffic for comprehensive contextual awareness, visibility and agility necessary to keep pace with today’s dynamic threat landscape. Powered by security intelligence from TippingPoint Digital Vaccine® Labs (DVLabs) and the Zero Day Initiative vulnerability bounty program, the TippingPoint NGIPS provides accurate, preemptive threat prevention in real-time without affecting network performance. 

Earlier this year, we announced our first-to-market standalone NGIPS that delivers up to 100 Gbps inspection throughput with low latency. The TippingPoint 7600NX was designed for data centers and enterprise networks with high performance requirements who need a security solution that can easily scale to meet traffic demands.

With our Enterprise Vulnerability Remediation (eVR) capability, customers can pull in third-party vulnerability scanning data, map CVEs to TippingPoint Digital Vaccine® filters and take immediate action based on the enhanced threat intelligence to increase their security coverage. This powerful tool reduces administration time, increases security coverage, reduces unnecessary notifications, and provides a big picture view into an organization’s overall security posture.

ThreatLinQ is an easy-to-use, real-time threat intelligence console that allows customers to evaluate the changing threat landscape and make informed decisions to enhance their network security posture. Customers can access real-time threat intelligence, review Digital Vaccine filter details, and fine-tune their TippingPoint protection profiles.

We deliver Integrated Advanced Threat Prevention that provides enterprises:

Pre-emptive Threat Prevention: Inspect and block inbound, outbound and lateral network traffic in real-time to protect against known, unknown, and undisclosed vulnerabilities.

Threat Insight and Prioritization: Gain insight and context with complete visibility across the network to measure and drive vulnerability threat prioritization.

Real-Time Enforcement and Remediation: Defend the network from the edge to the data center to the cloud with real-time, inline enforcement and automated remediation of vulnerable systems. 

Operational Simplicity: Simplify security operations with flexible deployment options that are easy to setup and manage through a centralized management interface with recommended settings that provide immediate and ongoing threat protection.

Click here to learn more to find out why Gartner named Trend Micro TippingPoint a Leader in the 2017 IDPS Magic Quadrant.   

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


 

Trend Micro Named as a Leader in IDC MarketScape on Worldwide Email Security

by Bharat Mistry

It is always nice to end the year with accolades from an industry insider recognizing the effectiveness of one of your core products. IDC, a global market intelligence firm, recently named Trend Micro as a Leader in the IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment (doc #US41943716, December 2016).

This is particularly exciting for us because we see our email security products as the frontlines of security protection for our customers. More than 76 percent of targeted attacks, ransomware or advanced persistent threats (APTs) begin with emails. Our email products are also powered by the Trend Micro Smart Protection Network, which mines 100 terabytes of data daily to ensure that our customers are always sheltered from the 250 million+ threats we block every day.

This threat intelligence helps us continually enhance our solution; and in the report, IDC acknowledged our focus on some of the newest concepts in email security such as specialized threat analysis and protection (STAP) features, including sandboxing technologies and anti–spear phishing protocols. By using big data analytics and predictive technology, we are able to deliver immediate protection from emerging threats.

IDC’s report also includes valuable customer insights on our products, and we were recognized for listening to our customers and adapting our products to fit their current needs. In addition, they appreciated the multiple bundling options across our own products, as well as through our partners. This not only makes purchase easy, but our wide range of capabilities can fit an enterprise’s specific requirements.

IDC’s report also highlights an area where we try infuse productivity — our easy set up and product use. From on-premises software to cloud-based products, our email security solutions strive to help customers save time and improve efficiency.

As the threat landscape evolves, our commitment is to provide an adaptable email security solution as the first line of defense that includes a variety of industry-leading features and platform offerings that work within an organization.

For more information on IDC MarketScape positioning, please visit https://resources.trendmicro.com/IDC-MarketScape-Email-Security-Leader.html.

 

 

It’s Time to Up Cyber Maturity Levels in 2017 – Starting with the Endpoint

by Bharat Mistry

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

A good way to start the new year would surely be to consider how your organization can be smarter about security in 2017. And that means taking a look first at the endpoint.

Another year of breaches
Even before the catastrophic breaches at Yahoo, which may have affected over 1.5 billion accounts, were revealed, this was already shaping up to be another epic year for the black hats. Perhaps most worrying from the stream of breach incidents we’ve all read about in the news over the past 12 months is the fact that organisations are still making the same old mistakes.

Newly released data from UK-based insurer CFC Underwriting makes for particularly uncomfortable reading. It reveals that firm handled more than 400 claims on cyber breach policies this year – with the main categories being privacy breaches (31%), financial loss (22%) and ransomware (16%). Now, we don’t have mandatory breach reporting laws in the UK – not until the European GDPR comes into force in 2018, at least. So this is an interesting reminder that, while we might not always hear about them, security incidents are happening – and affecting UK firms every day.

More concerning still is that UK firms apparently represent 8% of the insurer’s policy count, but 17% of its claims count. Why does the UK have a disproportionately high volume of claims? CFC reckons because of the low cybersecurity maturity of these organisations.

Start with the endpoint
A comprehensive approach to cybersecurity of course requires multiple layers of protection including web and email gateways, networks and servers – not forgetting the vital “people” and “policy” elements. But many of the attacks which have led to damaging breaches over the past year started at the endpoint – the initial incursion point into the corporate network. We therefore need to start our efforts by better protecting this layer of infrastructure – but it’s not easy given the explosion in endpoints facilitated by cloud, mobile and IoT technologies.

Trend Micro’s answer is XGen: a cross-generational approach reliant on multiple layers of protection. None of these are a silver bullet on their own. But together they can form a formidable defence against the vast majority of known and unknown threats.

It should feature signature and non-signature based tools, including behavioural based filters, app control, exploit prevention and machine learning. The latter has been used for years by Trend Micro. But in this context we’ve made it even more effective at stopping threats by designing capabilities which extract and analyse a suspect file’s characteristics before and during its execution. This helps to reduce false positives and improve accuracy.

Endpoint compromise can play a vital role early on in the cyber kill chain. As we head into 2017, don’t underestimate the importance of gaining visibility and control at this layer. With huge regulatory pressure coming from Europe in 2018, no CISO can afford to ignore it.