sb-as logo
Story image

Trend Micro brings analytics to network security solution

28 Aug 2018

Cybersecurity solutions provider Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.

Now in addition to detecting and analysing threats on the network, customers will be able to streamline investigation and response with automated analysis and correlation of network events, while maximising organisations’ limited IT security resources.

Organisations today are being squeezed on both sides, by an endemic cybersecurity skills shortage and increasingly determined threat actors, driving a heightened fear of missing new threats.

They need a way to simplify and prioritise threat information, accelerating detection and response.

Trend Micro A/NZ technical director Mick McCluney says, “Nobody likes to be blindsided. Security professionals need to be able to see what is happening across their network and respond quickly when needed.

“They need to be able to filter the noise so they can focus on critical tasks.

“The new network analytics capabilities of Deep Discovery do just that, empowering organisations struggling with skills shortages to keep themselves protected and productive.”

In addition to the new network analytics capabilities, Deep Discovery has enhanced the sharing of advanced threat information or indicators of compromise (IOCs) by leveraging standards-based formats and transfers (STIX, TAXII, YARA).

All compatible security solutions an organisation uses, including the entire Trend Micro product family and third-party products, will have the up to the minute threat intelligence. This simplifies IOC management for stretched IT teams.

IDC security products program director Rob Ayoub says, “Today’s organisations are being steadily submerged by threat alerts.

“Firefighting these individual problems means there is no time for the security team to focus on the bigger picture.”

“Solutions that address this challenge effectively can offer significant benefits — enabling IT security teams to do more with less and add strategic value to the organisation.”

Network analytics enable security teams to easily look back at historical data in an automated way to determine:

  •  Who was the first point of compromise
  •  What other users in the network have been impacted
  •  Where the threat is calling out to, including Command and Control (C&C) and malicious site redirects

By providing a prioritised view of advanced threat detections it helps IT security teams automate investigations for quicker action, helping them save time and allowing them to focus their limited resources on other activities.

In addition, the solution accelerates remediation efforts and even prevents further attacks thanks to information displayed across the attack lifecycle.

Advanced threat sharing and network analytics capabilities for Deep Discovery are now available globally.

Story image
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.More
Story image
CrowdStrike recognised as leading endpoint security vendor on global scale
IDC's report shows that CrowdStrike demonstrated a 2018-2019 growth rate of 99% and close to doubled its market share, while the market shares of the top three vendors in the corporate endpoint segment declined.More
Download image
Crypto-of-Things: Mobile device security with cryptography at its heart
It’s a method that’s as safe as traditional airgapped hardware security modules, but it doesn’t compromise on software usability.More
Story image
Cyber attacks keeping business leaders up at night, new research finds
Data breaches and insider threats are keeping organisations up at night, according to new research from KnowBe4, the security awareness training and simulated phishing platform.More
Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Story image
APAC parents hide internet activity from children more than cyber attackers
A new report from Kaspersky has turned a modern trope - that teens have things to hide in their internet history - on its head, by proving the opposite is also true.More