Story image

Trend Micro brings analytics to network security solution

28 Aug 2018

Cybersecurity solutions provider Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.

Now in addition to detecting and analysing threats on the network, customers will be able to streamline investigation and response with automated analysis and correlation of network events, while maximising organisations’ limited IT security resources.

Organisations today are being squeezed on both sides, by an endemic cybersecurity skills shortage and increasingly determined threat actors, driving a heightened fear of missing new threats.

They need a way to simplify and prioritise threat information, accelerating detection and response.

Trend Micro A/NZ technical director Mick McCluney says, “Nobody likes to be blindsided. Security professionals need to be able to see what is happening across their network and respond quickly when needed.

“They need to be able to filter the noise so they can focus on critical tasks.

“The new network analytics capabilities of Deep Discovery do just that, empowering organisations struggling with skills shortages to keep themselves protected and productive.”

In addition to the new network analytics capabilities, Deep Discovery has enhanced the sharing of advanced threat information or indicators of compromise (IOCs) by leveraging standards-based formats and transfers (STIX, TAXII, YARA).

All compatible security solutions an organisation uses, including the entire Trend Micro product family and third-party products, will have the up to the minute threat intelligence. This simplifies IOC management for stretched IT teams.

IDC security products program director Rob Ayoub says, “Today’s organisations are being steadily submerged by threat alerts.

“Firefighting these individual problems means there is no time for the security team to focus on the bigger picture.”

“Solutions that address this challenge effectively can offer significant benefits — enabling IT security teams to do more with less and add strategic value to the organisation.”

Network analytics enable security teams to easily look back at historical data in an automated way to determine:

  •  Who was the first point of compromise
  •  What other users in the network have been impacted
  •  Where the threat is calling out to, including Command and Control (C&C) and malicious site redirects

By providing a prioritised view of advanced threat detections it helps IT security teams automate investigations for quicker action, helping them save time and allowing them to focus their limited resources on other activities.

In addition, the solution accelerates remediation efforts and even prevents further attacks thanks to information displayed across the attack lifecycle.

Advanced threat sharing and network analytics capabilities for Deep Discovery are now available globally.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.