Trend Micro unleashes big data analytics
Posted on 08 August 2012.
Bookmark and Share
Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company's products and services.

The latest iteration incorporates advanced big data analytic capabilities that enable Trend Micro to identify new security threats across data sources, delivering global threat intelligence.


These capabilities, especially crucial in the era of mobility, cloud adoption, and advanced persistent threats and targeted attacks, have been integrated into the Smart Protection Network in order to tackle the dramatic volume, variety, and velocity of threats.

The Smart Protection Network now includes:
  • Newly added technologies, including mobile app reputation (for mobile threats), vulnerability rules (for vulnerability and exploits), network inspection rules (for network communications), and in-the-cloud whitelisting (for minimizing false positives). These combine with the Smart Protection Network's existing reputation technologies -- Web reputation, Email reputation, and File reputation – to further Trend Micro's global threat intelligence, one of the most comprehensive in the world.
  • New, custom tools to correlate critical relationships among all the components of an attack, and model cybercriminal behavior and the environments they work in to quickly determine whether something is good or bad. This modeling allows Trend Micro to proactively identify new threats from the data streams using behavioral-based identification methods. By correlating global threat intelligence across many threat vectors, Trend Micro delivers protection against the wide variety of attacks today.
  • An evolved cloud infrastructure, allowing for a greater capacity to collect massive amounts of threat data without consuming bandwidth on customers' networks and endpoints. Trend Micro was one of the first security companies to move beyond the conventional approach of resident protection and utilize the power of the cloud to block threats before they reach users. The Smart Protection Network provides automated protection through its cloud infrastructure enabling Trend Micro to protect customers across physical, mobile, virtual, and cloud environments.
Trend Micro customers benefit from these new capabilities, receiving real-time protection against today's threats through security products such as Trend Micro Deep Security – the company's flagship product for physical, virtual and cloud environments; Trend Micro Deep Discovery – an Advanced Persistent Threat detection solution; and Trend Micro Titanium for consumer endpoint security.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //