sb-as logo
Story image

Trend Micro brings analytics to network security solution

28 Aug 2018

Cybersecurity solutions provider Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.

Now in addition to detecting and analysing threats on the network, customers will be able to streamline investigation and response with automated analysis and correlation of network events, while maximising organisations’ limited IT security resources.

Organisations today are being squeezed on both sides, by an endemic cybersecurity skills shortage and increasingly determined threat actors, driving a heightened fear of missing new threats.

They need a way to simplify and prioritise threat information, accelerating detection and response.

Trend Micro A/NZ technical director Mick McCluney says, “Nobody likes to be blindsided. Security professionals need to be able to see what is happening across their network and respond quickly when needed.

“They need to be able to filter the noise so they can focus on critical tasks.

“The new network analytics capabilities of Deep Discovery do just that, empowering organisations struggling with skills shortages to keep themselves protected and productive.”

In addition to the new network analytics capabilities, Deep Discovery has enhanced the sharing of advanced threat information or indicators of compromise (IOCs) by leveraging standards-based formats and transfers (STIX, TAXII, YARA).

All compatible security solutions an organisation uses, including the entire Trend Micro product family and third-party products, will have the up to the minute threat intelligence. This simplifies IOC management for stretched IT teams.

IDC security products program director Rob Ayoub says, “Today’s organisations are being steadily submerged by threat alerts.

“Firefighting these individual problems means there is no time for the security team to focus on the bigger picture.”

“Solutions that address this challenge effectively can offer significant benefits — enabling IT security teams to do more with less and add strategic value to the organisation.”

Network analytics enable security teams to easily look back at historical data in an automated way to determine:

  •  Who was the first point of compromise
  •  What other users in the network have been impacted
  •  Where the threat is calling out to, including Command and Control (C&C) and malicious site redirects

By providing a prioritised view of advanced threat detections it helps IT security teams automate investigations for quicker action, helping them save time and allowing them to focus their limited resources on other activities.

In addition, the solution accelerates remediation efforts and even prevents further attacks thanks to information displayed across the attack lifecycle.

Advanced threat sharing and network analytics capabilities for Deep Discovery are now available globally.

Story image
Check Point exposes Android malware vendor using dark net to rebrand products
Check Point security researchers have exposed an Android malware vendor using a marketer on the dark net to rebrand its products, with the intention of supercharging business and throwing off security vendors. More
Story image
New research reveals evolving tactics attackers use to trick victims
"Attackers prefer to use COVID-19 in their less targeted scamming attacks that focus on fake cures and donations."More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
LogRhythm buys out MistNet to bolster analytics capabilities
LogRhythm says its aim is to bring stronger levels of machine learning-based detection and response.More
Story image
Palo Alto Networks advances attack surface management with Expanse
"By integrating Expanse's attack surface management capabilities into Cortex after closing, we will be able to offer the first solution that combines the outside view of an organisation's attack surface with an inside view to proactively address all security threats."More
Story image
Dark net vendors wanting Bitcoin payments for unverified COVID-19 vaccines
As the medicines are being offered on the dark net, purchasers have no way of knowing whether they are genuine, according to Check Point.More