With the rise of targeted attacks, Trend Micro urges enterprises to redefine their security strategy to focus on the three C’s: Custom Defense, Complete End User Protection and Cloud Security.

Trend Micro celebrates 25 years this year, since its founding in 1988.
With perimeter defense and conventional security becoming less effective against advanced targeted attacks, Trend Micro today announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats.
The Smart Protection Strategy covers three focus areas with new solution concepts –
- custom defense against customised targeted cyber-attacks
- complete end user protection for exchange of information in today’s bring-your-own-device (BYOD) era
- cloud security optimised for data centers.
Eva Chen – CEO and Co-Founder, Trend Micro – described in detail the company’s Smart Protection Strategy at the annual Trend Micro APAC Media Summit 2013 in Singapore today.
JD Sherry – Global Director of Technology and Solutions, Trend Micro – then shared his perspective on the rapidly changing threat landscape, proposing how he believes cyber defence could be carried out in the new cloud era.
The three tenets of Trend Micro’s Smart Protection Strategy are extracted from the company’s press release and appended below. The full press release may be viewed/downloaded here.
Custom Defense for Targeted Cyber Attacks
According to a recent survey of more than 1,000 IT professionals and managers across Asia Pacific, the biggest perceived IT threat is data breach, with almost half of the respondents citing it as a serious issue.
“The survey result emphasizes the need to educate this region’s mindset around enterprise security; there’s a misconception that investing in better antivirus is the cure. Combating and mitigating risks against a targeted attack is not a single product or technology discussion,” said JD Sherry, Global Director of Technology and Solutions, Trend Micro.
However, in the same survey, the top security investment was still anti-virus or anti-malware, followed by data leakage prevention.
Overall, the report showed that advanced persistent threats (APTs) or targeted attacks were not regarded as serious and viewed with lower priority by the respondents in this region.
Organizations need to take a new approach that enables them not only to detect and analyze APTs, but also to rapidly adapt their security controls and respond to the attackers.
Trend Micro’s Custom Defense Strategy integrates solutions, global threat intelligence, specialized tools and services to deliver a comprehensive solution for customers.
APTs or targeted attacks continue to penetrate and evade the conventional security controls such as antivirus, next-generation firewall, and intrusion prevention systems, as recently witnessed with the attacks on banks and media companies in South Korea.
These attacks are typically remotely orchestrated via Command & Control (C&C) communications between the infiltrated systems and the attackers themselves.
“There’s no silver bullet. These customized attacks require a custom defense. Trend Micro is the only major security vendor who understands APTs. Customers have the right to expect their security products to do a better job of detecting potential threats and giving them the intelligence they need to respond appropriately,” said Sherry.
Recently tracked C&C data from TrendLabs researchers shows over 1500 active C&C sites, with victims per site ranging from 1 to over 25,000.
In light of these attack behaviors, Trend Micro’s Custom Defense Strategy offers new advances in C&C response with unique custom detection and protection that can be automatically routed to network devices, gateway, server and endpoint protection points – empowering enterprises to adapt and respond to such attacks.
By correlating with terabytes of threat intelligence in the cloud, Trend Micro’s Smart Protection Network arms organizations with insight about the specific threats and cybercriminal involved, empowering them with the information needed to fight back.
Trend Micro customers in South Korea, who employed Custom Defense technologies, were able to discover and respond to the recent attack before damage could be done.
Complete End User Protection for Today’s BYOD Era
Consumerization of IT brings not only increase in employee productivity, but also challenges of data loss and security breach through employee-owned devices.
Employees using uncontrolled, personal cloud services that have suffered security breaches, such as Dropbox, YouSendIt and iCloud, are becoming key information leakage threats.
“Cyber attackers are now good at customizing their attacks to focus on specific people, systems, and vulnerabilities inside the targeted organizations” said Eva Chen, CEO and Co-Founder, Trend Micro.
Trend Micro is launching SafeSync for Enterprise, a secured file synchronization and collaboration solution that resides inside enterprise datacenter/private cloud.
The on-premise solution enables productivity and collaboration of mobile workers who use multiple devices such as smartphones, tablets, and PCs, without sacrificing enterprise information assets.
In addition, with the introduction of Trend Micro Enterprise Security and Data Protection, Trend Micro extends its existing anti-malware platform to include integrated data leakage prevention (iDLP) capabilities, offering existing and new customers a comprehensive, easy-to-install, centrally managed data protection solution.
The new solution activates comprehensive data leakage prevention capabilities across existing Trend Micro endpoint, mobile, mail, and gateway solutions.
From anywhere, any device, any application, end users can access and exchange information safely.
Cloud and Datacenter Security
About 20 percent of the companies in Asia Pacific have more than half of their servers virtualized, and that is expected to increase to 37 percent by end of 2013.
As more companies deploy server virtualization and embark on the journey to the cloud, datacenters become increasingly diversified and complex.
“Spear-phishing emails remain the primary means of delivering malware, while a wide variety of tactics and tools including remote access Trojans have been used to attack covertly and maintain persistence unauthorized foothold of your network,” Chen elaborated.
In an environment where server workloads span across physical, virtual and cloud environments, server security needs to be easy-to-manage, follow the workload across the cloud, and not slow down systems’ performance.
As datacenter transforms, enterprises need Next Generation server security solution that offers complete protection, simple single-pane-of-glass management, and highest virtualization ROI, across physical, virtual, and cloud environments.
Trend Micro Deep Security , next generation server security platform, is best optimized for cloud and virtualization, designed to maximize the return on investment in virtualization for enterprises, as well as cloud service providers with an infrastructure-as-a-service (IaaS) practice.
Latest version extends datacenter security to hybrid and public clouds – integrating with vCloud and Amazon Web Services API, and delivering multi-tenant architecture for software-defined datacenters.
In addition, Trend Micro SecureCloud, provides data encryption in cloud.
This encryption and key management system allows IT managers to embrace virtualization and cloud computing, safe in the knowledge that their company’s most valuable asset – its data – is protected from theft, accidental exposure and even unapproved migration to another datacenter.
This puts the power back into the hands of the business, enabling policy-based key management no matter what the environment – for maximum data security and compliance.
Tags: attacks, BYOD, cloud, cyber, datacenters, defence, media, security, seminar, Singapore, Trend Micro
This entry was posted on Tuesday, April 9th, 2013 at 9:38 pm and is filed under Cloud, Enterprise IT, Events, Figures, Mobile, Security, Seminars, Software, Technology, Trend Micro. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.