Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, announced today that it will offer a comprehensive Threat Management Solution for enterprises that discovers, mitigates and manages threats in their internal network.
The goal is to help enterprises respond much faster to risk of data loss from malware activities, thereby significantly reducing their damage containment costs and improving their overall security posture.
The new solution is designed from the ground-up to identify and respond to next-generation threats. It monitors the network to catch hidden malware and disruptive applications that traditional security products fail to detect; it collaborates with "in-the-cloud" threat management services for a more detailed analysis of the customer threat environment; and it then performs network-wide cleanup and policy enforcement on the infected endpoints.
Powered by Trend Micro Smart Protection Network, a next-generation cloud-client content security infrastructure designed to protect customers from Web threats, Trend Micro Threat Management Solution will help customers achieve:
* Faster response to risk of data loss resulting from malware infections transmitting confidential data to the Internet.
* The ability to implement proactive security infrastructure planning and management due to increased knowledge of pain points in their network and emerging threat landscape.
* Cost savings in damage cleanup and containment efforts due to earlier detection of new security threats in the internal network by using advanced behavioural detection and correlation algorithms.
* Bandwidth and resource savings due to early detection of disruptive applications and services in the network.
* Detailed reports that help pinpoint the source of the threats, allowing the IT administrator to quickly respond to incidents which will result in better allocation and deployment of limited IT resources.
* Easier access to and management of threat/incident information with the help of a centralised management portal.
* Minimal interruption to existing services due to flexible out-of-band deployment.
The need for a Threat Management Solution to tackle internal threats
The threat landscape and the way people work are changing simultaneously. An underground cyber-crime economy has transformed the era of virus outbreaks -- malware writers are creating threats that are very targeted, stealthy and profit-driven. At the same time, workers are becoming more mobile, portable USB devices are becoming more popular, and applications like instant messaging, file sharing and streaming media are increasingly widespread. Such a combination is making it difficult for IT administrators to protect their company's internal network.
"This new threat landscape requires not just extreme speed in threat protection, which is what Trend Micro Enterprise Security is focused on, but smart, comprehensive protection as well," said Eva Chen, CEO and co-founder of Trend Micro. "The Trend Micro Threat Management Solution will help our customers gain a clear and concise view of their state of security so they can quickly discover, stop and remediate threats. This will save them time, money and effort."
Trend Micro Threat Management Solution -- a comprehensive solution for better detection, protection and management of threats in an internal network
The Threat Management Solution consists of two product suites - first, a Threat Discovery Suite that will uncover internal security threats within a network and provide customised threat reports and threat response recommendations; second, a Threat Mitigation Suite that acts on the information provided by the monitoring device and performs cleanup, policy enforcement and remediation. (Customers who wish to purchase the Threat Mitigation Suite should have already purchased the Threat Discovery Suite.)
Trend Micro Threat Discovery Suite, the first solution to be released from this suite in Q3 2008, will have features that include:
* Malware detection at the network layer to catch malware that attempts to propagate or infect other users, hidden malware that communicate to external parties to leak-out information or receive commands, and Web or e-mail content-based attacks such as Web exploits, cross-site scripting and phishing.
* Detection of disruptive applications and services such as instant messaging, P2P file sharing and streaming media. It also identifies unauthorised services that are potential security risks.
* Threat Management Services to help ensure earlier detection of new security threats in an internal network by using advanced correlation rules on the infection.
* Threat reporting capabilities that generate a clear view of the state of security. IT administrators can generate daily administrative reports for incident response and remediation. Executives may also create threat summary reports on the overall security posture of their company's networks.
* Flexible out-of-band deployment capabilities, which use port scanning on a network switch to mirror network packets for content inspection thereby ensuring no disruption of your network services.
Trend Micro Threat Mitigation Suite, which is scheduled to be released in Q4 2008, will include features such as:
* Infection root-cause analysis so customers understand the reason behind a threat. For example, if a user inserted a USB stick into a laptop that later got infected, Trend Micro's Threat Management Services would determine that the threat could have been the result of an infected USB stick.
* Endpoint policy enforcer checks to ensure endpoints have the latest virus patches or service packs. An endpoint that's not up-to-date or is infected will be prevented from connecting to the network and quarantined for updates and cleanup.
* Endpoint damage cleanup happens after the Threat Discovery Suite detects a threat or infection point; the Threat Mitigation Suite then begins the pattern-free cleanup process, remediating and later blocking brand new malware -- even those without a pattern file stored within a Trend Micro database.
Pricing and availability for North America
The Trend Micro Security Management Suite includes: Trend Micro Threat Discovery Suite, which is scheduled to be available in Q3 and includes: Trend Micro Threat Discovery Appliance (at a one-time-cost, starting at approximately $US40 000) and Trend Micro Threat Management Services (at an annual subscription fee, starting at $US20 000 per year.)
Trend Micro Mitigation Suite is scheduled to be available in Q4. Pricing is to be determined.
Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at http://www.trendmicro.com/go/trendwatch to learn more about the threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit http://www.trendmicro.com/.
SecureData
SecureData is a specialist, value-added distributor of perimeter, application, network, endpoint, storage and identity information security solutions and risk management solutions for the African sub-continent and Indian Ocean islands. A cross-section of the available solutions from SecureData illustrates wide coverage of the following information security and risk management domains: business continuity, security appliances and devices, hardware authentication, identity and access management, security and vulnerability management, secure content management, threat management and security services. SecureData's information security and risk management solutions include best-of-breed solutions, devices and appliances for the perimeter, data centres, applications, network, endpoints, messaging and Web. In addition, as a value-add to vendor, channel and customer, SecureData also provides a full complement of support, pre-sales and professional services around the solutions positioned in each discrete security vertical.
Editorial contacts


