Trend Micro Unveils Enterprise Protection Strategy
Posted on 22 May 2002.
Proactive Initiative Redefines Virus Outbreak Management; New Product Architecture and Services Lower Costs of Outbreaks

Cupertino, Calif. - May 21, 2002 - Trend Micro, Inc. (Nasdaq: TMIC; TSE: 4704), a worldwide leader in network antivirus and Internet content security solutions, today launched its Enterprise Protection Strategy which manages the explosive costs of virus outbreaks, helps to quarantine viruses and prevent them from spreading, and improves the visibility of an attack and minimizes its impact on network operations. Trend Micro's Enterprise Protection Strategy will provide businesses with a flexible architecture of services, products, centralized management, and faster access to TrendLabs(tm) for proactive outbreak management.

Over the next month, Trend Micro will make available the first three offerings of this comprehensive architecture:

Outbreak Prevention Services - proactive attack-specific information and prevention policies to help enterprises deflect, isolate, and stem attacks prior to the release of the pattern file.
Damage Assessment and Cleanup Services - attack-specific cleaning services that help enterprises rid their networks of virus remnants and increase post-attack protection.
Outbreak Lifecycle Management and Reporting - Trend Micro(tm) Control Manager 2.1, which includes administration, monitoring, and reporting of the pre- and post-pattern file outbreak phases.

Trend Micro's Enterprise Protection Strategy is designed for enterprises and small-to-medium businesses worldwide and is currently available direct and through Trend Micro's comprehensive network of more than 1,000 Premium partners.

"Our Enterprise Protection Strategy sets a new industry standard for antivirus outbreak lifecycle management today and into the future," said Steve Chang, Chairman of the Board, President and CEO, Trend Micro. "By working closely with our customers, we are approaching their challenges differently by expanding the role of antivirus and centralized management far beyond today's functionality. Trend Micro continues to prove its innovation by shifting the paradigm from point solutions and pattern file deployment to a flexible architecture that addresses the entire virus outbreak lifecycle which minimizes costs and potential business disruption for our customers."

Today's Virus Outbreaks Pose Unnecessary Challenges and Costs With an average of 500 new and increasingly sophisticated viruses each month, companies using traditional antivirus and content security products and practices remain vulnerable to attack. For Nimda-like attacks that use multiple network entry points and payload mechanisms, there is currently no method of systematically managing antivirus policies, products, and damage assessment from the gateway to the server to the desktop.

Trend Micro's Enterprise Protection Strategy offers a new approach to coordinated enterprise protection by comprehensively managing the three primary phases of the enterprise virus outbreak lifecycle. These phases are outbreak prevention, pattern file deployment, and damage assessment and cleanup.

"We are pleased to see Trend Micro, a longstanding OPSEC partner, redefine and advance virus outbreak management," said Asheem Chandna, Vice President of Business Development and Product Management for Check Point Software Technologies (NASDAQ: CHKP). "Our joint customers can look forward to increased levels of integrated capabilities and centralized management via Check Point's SMART management architecture."

Faster Response Times Helps Manage the Outbreak and Prevent Spreading

The outbreak prevention phase is the critical time period before a pattern file is available, when enterprises scramble for information, manually configure their networks to block and isolate attacks based on suspected virus behavior, and communicate this information and policy settings to often global and decentralized operations.

Trend Micro's Outbreak Prevention Services enable organizations to better manage this critical prevention phase of an outbreak by deploying attack-specific policy recommendations that can be centrally deployed to block, isolate, and contain a virus without requiring an administrator to shut down ports or devices which stop business productivity. During a 6-month trial conducted with Trend Micro's enterprise customers, users experienced a 50 percent improvement in response time using Outbreak Prevention Services versus the traditional method of waiting for a pattern file. This translates into substantial reductions in virus damage costs and lost productivity, as well as easing the administrative burdens of coordinating decentralized policy actions worldwide.

Improving the Costly Post-Attack Damage Assessment and Cleanup Stage

The damage assessment and cleanup phase is the period after a pattern file is deployed and the virus has been contained. For administrators today, cleaning the network of virus remnants is extremely time consuming and expensive, since most enterprises rely on manual cleanup and restoration. For example, Computer Economics estimates that approximately 80 percent of the associated total cost of ownership (TCO) for the Goner worm virus was attributed to cleanup efforts after the virus attack occurred.

Trend Micro's Damage Cleanup Services help identify which systems have been infected and allow administrators to deploy Trojan cleaning templates that more quickly rid the desktops and servers of virus remains and "cleanup" productivity devices after an attack. In addition to reducing costs, Trend Micro's Damage Cleanup Services minimize the potential for a virus re-attack and help enterprises isolate areas where they are vulnerable. All of these benefits can translate into significantly improved return on investment (ROI) for post-attack antivirus and content security operations.

"Trend Micro Enterprise Protection Strategy is a giant leap forward," said Chris Christiansen, Vice President of Internet Infrastructure and Security Software Research at IDC. "By addressing every step of the virus outbreak lifecycle, enterprises and small-to-medium businesses will benefit from the centralized management and decreased impact to the organization's bottom line."

Reducing TCO with Trend Micro Control Manager - A Redefinition of Central Management

Unlike the traditional approach to centralized antivirus and content security management, which concentrates primarily on deployment and monitoring of pattern files, Trend Micro Control Manager 2.1 (formally Trend VCS) now delivers centralized management, administration, and reporting of the entire outbreak lifecycle. From enabling and deploying prevention policies quickly and accurately for enterprise protection prior to attacks to managing the damage and cleanup activities associated with post-attack restoration, Trend Micro Control Manager 2.1 provides enterprises improved visibility and control for their entire antivirus operations. Trend Micro Control Manager 2.1 reports the status prior to, during, and after virus attacks, minimizing the overall impact of virus outbreaks on operations and productivity. This new approach to centralized management can not only lower the TCO for IT operations but also improve business productivity enterprise-wide.

About Trend Micro
Trend Micro, Inc. is a leader in network antivirus and Internet content security software and services with US headquarters in Cupertino, CA and business units worldwide. Trend Micro products are sold through corporate resellers and value-added resellers. For additional information and evaluation copies of all Trend Micro products, visit www.trendmicro.com or call (800) 228-5651 in North America.

###

TrendLabs and Trend Micro Control Manager are trademarks of Trend Micro, Inc. and are registered in certain jurisdictions. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such.





Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //