Story image

Trend Micro brings analytics to network security solution

28 Aug 2018

Cybersecurity solutions provider Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.

Now in addition to detecting and analysing threats on the network, customers will be able to streamline investigation and response with automated analysis and correlation of network events, while maximising organisations’ limited IT security resources.

Organisations today are being squeezed on both sides, by an endemic cybersecurity skills shortage and increasingly determined threat actors, driving a heightened fear of missing new threats.

They need a way to simplify and prioritise threat information, accelerating detection and response.

Trend Micro A/NZ technical director Mick McCluney says, “Nobody likes to be blindsided. Security professionals need to be able to see what is happening across their network and respond quickly when needed.

“They need to be able to filter the noise so they can focus on critical tasks.

“The new network analytics capabilities of Deep Discovery do just that, empowering organisations struggling with skills shortages to keep themselves protected and productive.”

In addition to the new network analytics capabilities, Deep Discovery has enhanced the sharing of advanced threat information or indicators of compromise (IOCs) by leveraging standards-based formats and transfers (STIX, TAXII, YARA).

All compatible security solutions an organisation uses, including the entire Trend Micro product family and third-party products, will have the up to the minute threat intelligence. This simplifies IOC management for stretched IT teams.

IDC security products program director Rob Ayoub says, “Today’s organisations are being steadily submerged by threat alerts.

“Firefighting these individual problems means there is no time for the security team to focus on the bigger picture.”

“Solutions that address this challenge effectively can offer significant benefits — enabling IT security teams to do more with less and add strategic value to the organisation.”

Network analytics enable security teams to easily look back at historical data in an automated way to determine:

  •  Who was the first point of compromise
  •  What other users in the network have been impacted
  •  Where the threat is calling out to, including Command and Control (C&C) and malicious site redirects

By providing a prioritised view of advanced threat detections it helps IT security teams automate investigations for quicker action, helping them save time and allowing them to focus their limited resources on other activities.

In addition, the solution accelerates remediation efforts and even prevents further attacks thanks to information displayed across the attack lifecycle.

Advanced threat sharing and network analytics capabilities for Deep Discovery are now available globally.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.