View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 9, 2012

Trend Micro to introduce new threat protection application

Custom Defense protects businesses and government agencies from advanced persistent threats and targeted attacks

By CBR Staff Writer

Trend Micro is planning to introduce a threat protection application, Custom Defense, which claims to protects businesses and government agencies from advanced persistent threats (APTs) and targeted attacks.

With the new application, businesses and government agencies not only can detect and analyse APTs and targeted attacks, but also can adapt their protection and respond to these attacks, Trend Micro said.

Custom Defense integrates software, threat intelligence and specialised tools and services to deliver a new application for customers.

The new application is based on a threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications and attacker behaviors that are invisible to standard security defenses.

Integrated with control points across the network, Custom Defense can detect and block attacks occurring via corporate and personal email, social media applications, mobile devices and more.

Custom Defense can detect and block malware communications back to the cybercriminal, or attempts to move laterally to other valuable systems within the network.

With the new application, organisations can profile in depth the risk, origin and characteristics of the attack, and deliver actionable intelligence that guides the organisation on how to contain and remediate the attack.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

To investigate threat, the application offers a customised view of threat intelligence that is specific to the organisation’s environment and offers the ability to tap into the cloud-based threat intelligence network.

Custom Defense helps customers create custom responses to these targeted attacks to adapt and strengthen protection against further attacks.

The new application updates the global threat intelligence network and issues these custom security updates to Trend Micro gateway, endpoint and server enforcement points.

It also claims to send security updates to non-Trend Micro security products that may already be an important part of an organisation’s defense in-depth strategy.

Trend Micro’s new security application said to deliver 360-degree contextual visibility of the attack, providing organisation with the insight needed to respond to their specific attackers.

It also delivers insight such as what information is being targeted, how the attack works, who the attacker is, and perhaps most importantly, who is actually sponsoring the attack, the company claimed.

As a part of the new application, the company is also planning to introduce enhancements to critical software components, its threat intelligence, as well as the availability of specialised tools and services to provide a complete custom defense.

The new enhancements include:Deep Discovery, Messaging Security, Other Trend Micro Enterprise Security Products, Smart Protection Network and Threat Connect and Attack Response Tools and Services.

Trend Micro Deep Discovery detects and identifies evasive threats in real-time and provides the in-depth analysis and relevant actionable intelligence found at the heart of the Custom Defense solution.

As part of the Custom Defense application and for enhanced protection across the network, Trend Micro integrates advanced threat detection capabilities into its mail gateway and server security products.

Trend Micro Smart Protection Network cloud security infrastructure identifies new threats, delivering global threat intelligence to secure data wherever it resides, while Threat Connect provides the breadth of relevant Trend Micro threat intelligence about specific threats.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU