Sun, Jan 20 2019, 8:32 am

Trend Micro brings in Connected Threat Defense mechanism

By Digital Edge Bureau, 20.07.2018, 00:03
 
TM_1

Bringing in integrated security measures to new-age enterprises & organizations: Nilesh Jain, Vice President – South-East Asia & India, Trend Micro

Taking a holistic approach to defending today’s firms and organizations against cyber-attacks, Trend Micro, has come out with the Connected Threat Defense mechanism, which helps protect, detect, and respond quite effectively.

With a 360-degree monitoring of network traffic, Trend Micro’s Connected Threat Defense is powered by XGen security and currently supported and leveraged by all three Trend Micro solutions – User Protection, Network Defense, and Hybrid Cloud Security; and supported by their products which include Deep Discovery, Deep Security, OfficeScan, ScanMail Exchange, Control Manager and InterScan Messaging solutions.

“The need for a Connected Threat Defense has emerged because the traditional model is no longer sufficient to defend against today’s attacks and threats. Organizations often use a variety of security products where managing the complexity and volume becomes a daunting task, and the threats growing across the network may remain undetected. With multiple security techniques, Trend Micro’s Connected Threat Defense provides scanning and disinfection of any incoming malware. If an attack is detected, targeted intelligence covering malicious files, IP addresses, and C&C communications is shared across products and environments for protection and these objects are blocked automatically when they are encountered next time which is a benefit of Connected Threat Defense”, said Nilesh Jain, Vice President – South-East Asia & India, Trend Micro.

The protection quadrant proactively protects networks, endpoints, and hybrid cloud environments. The detection quadrant includes network inspection and custom sandboxing. The response phase delivers real-time signatures and security updates to the other quadrants to prevent future attacks, identify root cause and speed up remediation. The central visibility and control provides a comprehensive view of the security of networks, endpoints, and hybrid cloud environments, and simplifies threat investigation and day-to-day management tasks.

Sharing his views on the efficacy of the new integrated security solutions, Mrutyunjay Mahapatra, DMD & CIO, SBI said, “We’ve partnered with Trend Micro for their Endpoint, Gateway and Data Centre Security solutions. To secure our ‘crown jewels’ that are going to be hosted on these virtualized servers, we are also in the process of securing Trend Micro’s Data Centre Security solution – Deep Security that provides host based security capabilities such as Virtual Patching that detects and patches vulnerabilities automatically across all OS and Applications on the fly. This solution requires no down time to deploy and can be used across physical, virtual and cloud platforms.”

Some of the other clients of the Connected Threat Defense solution provided by Trend Micro are Lupin Pharma, LIC Mutual Fund, Eli Group, BookMyShow, Anandabazar Patrika, and Evalueserve.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


7 + seven =

Other articlesgo to homepage

Operation Sharpshooter targets critical infrastructure: McAfee

Operation Sharpshooter targets critical infrastructure: McAfee(0)

In a new development, McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting nuclear, defense, energy, and financial companies, based on McAfee Global Threat Intelligence. This campaign, Operation Sharpshooter, leverages an in-memory implant to download and retrieve a second-stage implant—which we call Rising Sun—for further exploitation.

Security-as-code would define SW development: Trend Micro

Security-as-code would define SW development: Trend Micro(0)

At the recently held CLOUDSEC India 2018, hosted by Trend Micro, it has been highlighted that security-as-code and security automation would define the future of cybersecurity. These two trends are in line with application development in the cloud computing era. By moving security into the early stages of the development lifecycle – or implementing DevSecOps,

Kaspersky Lab ties up with Huawei for securing cloud

Kaspersky Lab ties up with Huawei for securing cloud(0)

Russia’s Kaspersky Lab and China’s Huawei have agreed to work together in the field of cloud security at the recently held  HUAWEI CONNECT 2018 in Shanghai, China. The cooperation will seamlessly integrate Kaspersky Lab’s security solutions with Huawei’s cloud computing solution, delivering a more comprehensive approach to security and building a more secure ecosystem while

Quick Heal offers extra months validity during festivities

Quick Heal offers extra months validity during festivities(0)

Gingering up the cheer to the upcoming festive season, Quick Heal Technologies has announced the launch of the Quick Heal Total Security Festive Pack. The festive pack gives Quick Heal customers four extra months of validity at no additional cost if activated on festive days. The days during which the offer can be availed— on

Security analytics firm Skybox ties up with RAH Infotech

Security analytics firm Skybox ties up with RAH Infotech(0)

In a significant development, Skybox Security, world’s leading provider of security intelligence & analytics software, has struck a national distribution tie-up with Gurgaon-headquartered RAH Infotech, which has emerged as one of India’s fastest growing value added distributors (VADs) specializing in the fields of networking and security products. The formal distribution partnership has been solemnized between

read more
banner









Contacts and information

New Delhi (India)

Social networks

Most popular categories