System identifies and responds to next-generation threats.

Press Release Summary:



Powered by Smart Protection Network, a cloud-client content security infrastructure, Threat Management Solution discovers, mitigates, and manages threats in internal network. System monitors network to catch hidden malware and disruptive applications. It then collaborates with in-the-cloud threat management services for detailed analysis of customer threat environment, and performs network-wide cleanup and policy enforcement on infected endpoints.



Original Press Release:



Trend Micro Announces a Threat Management Solution for Discovering and Mitigating Threats That Attack Internal Networks



NEW YORK, June 18 /-- Trend Micro Incorporated , a global leader in Internet content security, announced today that it will offer a comprehensive Threat Management Solution for enterprises that discovers, mitigates and manages threats in their internal network. The goal is to help enterprises respond much faster to risk of data loss from malware activities, thereby significantly reducing their damage containment costs and improving their overall security posture.

The new solution is designed from the ground-up to identify and respond to next-generation threats. It monitors the network to catch hidden malware and disruptive applications that traditional security products fail to detect; it collaborates with "in-the-cloud" threat management services for a more detailed analysis of the customer threat environment; and it then performs network-wide cleanup and policy enforcement on the infected endpoints.

Powered by Trend Micro Smart Protection Network, a next-generation cloud-client content security infrastructure designed to protect customers from Web threats, Trend Micro Threat Management Solution will help customers achieve:

-- Faster response to risk of data loss resulting from malware infections transmitting confidential data to the Internet.

-- The ability to implement proactive security infrastructure planning and management due to increased knowledge of pain points in their network and emerging threat landscape.

-- Cost savings in damage cleanup and containment efforts due to earlier detection of new security threats in the internal network by using advanced behavioral detection and correlation algorithms.

-- Bandwidth and resource savings due to early detection of disruptive applications and services in the network.

-- Detailed reports that help pinpoint the source of the threats, allowing the IT administrator to quickly respond to incidents which will result in better allocation and deployment of limited IT resources.

-- Easier access to and management of threat/incident information with the help of a centralized management portal.

-- Minimal interruption to existing services due to flexible out-of-band deployment.

The need for a Threat Management Solution to tackle internal threats

The threat landscape and the way people work are changing simultaneously. An underground cybercrime economy has transformed the era of virus outbreaks -- malware writers are creating threats that are very targeted, stealthy and profit-driven. At the same time, workers are becoming more mobile, portable USB devices are becoming more popular, and applications like instant messaging, file sharing and streaming media are increasingly widespread. Such a combination is making it difficult for IT administrators to protect their company's internal network.

"This new threat landscape requires not just extreme speed in threat protection, which is what Trend Micro Enterprise Security is focused on, but smart, comprehensive protection as well," said Eva Chen, CEO and co-founder of Trend Micro. "The Trend Micro Threat Management Solution will help our customers gain a clear and concise view of their state of security so they can quickly discover, stop and remediate threats. This will save them time, money and effort."

Trend Micro Threat Management Solution -- a comprehensive solution for better detection, protection and management of threats in an internal network

The Threat Management Solution consists of two product suites -- first, a Threat Discovery Suite that will uncover internal security threats within a network and provide customized threat reports and threat response recommendations; second, a Threat Mitigation Suite that acts on the information provided by the monitoring device and performs cleanup, policy enforcement and remediation. (Customers who wish to purchase the Threat Mitigation Suite should have already purchased the Threat Discovery Suite.)

Trend Micro Threat Discovery Suite, the first solution to be released from this suite in Q3 2008, will have features that include:

-- Malware detection at the network layer to catch malware that attempts to propagate or infect other users, hidden malware that communicate to external parties to leak-out information or receive commands, and Web or email content-based attacks such as Web exploits, cross-site scripting and phishing.

-- Detection of disruptive applications and services such as instant messaging, P2P file sharing and streaming media. It also identifies unauthorized services that are potential security risks.

-- Threat Management Services to help ensure earlier detection of new security threats in an internal network by using advanced correlation rules on the infection.

-- Threat reporting capabilities that generate a clear view of the state of security. IT administrators can generate daily administrative reports for incident response and remediation. Executives may also create threat summary reports on the overall security posture of their company's networks.

-- Flexible out-of-band deployment capabilities, which use port scanning on a network switch to mirror network packets for content inspection thereby ensuring no disruption of your network services.

Trend Micro Threat Mitigation Suite, which is scheduled to be released in Q4 2008, will include features such as:

-- Infection root-cause analysis so customers understand the reason behind a threat. For example, if a user inserted a USB stick into a laptop that later got infected, Trend Micro's Threat Management Services would determine that the threat could have been the result of an infected USB stick.

-- Endpoint policy enforcer checks to ensure endpoints have the latest virus patches or service packs. An endpoint that's not up-to-date or is infected will be prevented from connecting to the network and quarantined for updates and cleanup.

-- Endpoint damage cleanup happens after the Threat Discovery Suite detects a threat or infection point; the Threat Mitigation Suite then begins the pattern-free cleanup process, remediating and later blocking brand new malware -- even those without a pattern file stored within a Trend Micro database.

Pricing and Availability for North America

The Trend Micro Security Management Suite includes:

Trend Micro Threat Discovery Suite, which is scheduled to be available in Q3 and includes: Trend Micro Threat Discovery Appliance (at a one-time-cost, starting at approximately $US40,000) and Trend Micro Threat Management Services (at an annual subscription fee, starting at $US20,000 per year.)

Trend Micro Mitigation Suite is scheduled to be available in Q4. Pricing is to be determined.

About Trend Micro:

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit http://www.trendmicro.com/.

Copyright(C) 2008 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

CONTACT: Andrea Mueller, +1-916-337-5115, andrea_mueller@trendmicro.com, or Vivian Shic, +1-925-323-3550, Vivian_shic@trendmicro.com, both of Trend Micro Incorporated

Web site: http://www.trendmicro.com/

All Topics