Trend Micro has announced an expansion of the Trend Micro Smart Protection Network, a cloud-based security infrastructure the company introduced in 2008 that powers most of its products and services.
The latest iteration of the Smart Protection Network incorporates advanced big data analytic capabilities that allow Trend Micro to identify new security threats across a broader range of data sources, providing intelligence designed to stop threats more quickly than before.
These capabilities have been integrated into the Smart Protection Network in order to tackle the growing volume and variety of threats, the company says. With the announcement, the Smart Protection Network now includes newly added technologies, including features to guard against mobile application threats; vulnerability rules (for vulnerability and exploits); network inspection rules (for network communications); and in-the-cloud whitelisting (for minimizing false positives).
These combine with the Smart Protection Network's existing “reputation” technologies—Web reputation, E-mail reputation, and File reputation—to expand Trend Micro's global threat intelligence.
The new offering also includes custom tools to correlate critical relationships among all the components of an attack, and model cybercriminal behavior to quickly determine whether something is good or bad. This modeling allows Trend Micro to proactively identify new threats from the data streams using behavioral-based identification methods. By correlating global threat intelligence across many threat vectors, the product protects against the wide variety of attacks, the company says.
"Since the launch of the Smart Protection Network in 2008, the threat landscape has shifted to now focus on mobility and targeted attacks,” Eva Chen, CEO of Trend Micro, said in a statement. “Threats and cybercriminal attacks have taken on an unprecedented level of volume, variety, and velocity. These changes demand a smarter, accelerated approach to security so that our customers can confidently embrace the mobile device and cloud-era, knowing their data is protected, no matter where it resides."
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access