sb-nz logo
Story image

Trend Micro brings analytics to network security solution

28 Aug 2018

Cybersecurity solutions provider Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.

Now in addition to detecting and analysing threats on the network, customers will be able to streamline investigation and response with automated analysis and correlation of network events, while maximising organisations’ limited IT security resources.

Organisations today are being squeezed on both sides, by an endemic cybersecurity skills shortage and increasingly determined threat actors, driving a heightened fear of missing new threats.

They need a way to simplify and prioritise threat information, accelerating detection and response.

Trend Micro A/NZ technical director Mick McCluney says, “Nobody likes to be blindsided. Security professionals need to be able to see what is happening across their network and respond quickly when needed.

“They need to be able to filter the noise so they can focus on critical tasks.

“The new network analytics capabilities of Deep Discovery do just that, empowering organisations struggling with skills shortages to keep themselves protected and productive.”

In addition to the new network analytics capabilities, Deep Discovery has enhanced the sharing of advanced threat information or indicators of compromise (IOCs) by leveraging standards-based formats and transfers (STIX, TAXII, YARA).

All compatible security solutions an organisation uses, including the entire Trend Micro product family and third-party products, will have the up to the minute threat intelligence. This simplifies IOC management for stretched IT teams.

IDC security products program director Rob Ayoub says, “Today’s organisations are being steadily submerged by threat alerts.

“Firefighting these individual problems means there is no time for the security team to focus on the bigger picture.”

“Solutions that address this challenge effectively can offer significant benefits — enabling IT security teams to do more with less and add strategic value to the organisation.”

Network analytics enable security teams to easily look back at historical data in an automated way to determine:

  •  Who was the first point of compromise
  •  What other users in the network have been impacted
  •  Where the threat is calling out to, including Command and Control (C&C) and malicious site redirects

By providing a prioritised view of advanced threat detections it helps IT security teams automate investigations for quicker action, helping them save time and allowing them to focus their limited resources on other activities.

In addition, the solution accelerates remediation efforts and even prevents further attacks thanks to information displayed across the attack lifecycle.

Advanced threat sharing and network analytics capabilities for Deep Discovery are now available globally.

Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Video: 10 Minute IT Jams - Who is CrowdStrike?
Today, Techday speaks to CrowdStrike ANZ channel director Luke Francis about the company's key products and offerings, its upcoming annual security conference, and the infrastructure it leverages in the A/NZ region.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
NZX CIO David Godfey to resign by year's end
"David has been in the business for more than a decade, and has been a great contributor over that time - including through the challenges we faced this year due to COVID and the more recent cyber attacks where he has shown wonderful calmness and support of his teams.”More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More