View
Sorting
Products found: 6
Trend Micro Consumer Connect
Keep Customers Safe from the Newest Threats
Stop Malicious Software The evolution of new technology and infrastructure will steadily lead to more and more security vulnerabilities. Trend Micro now monitors threat activities around the clock across both networks and endpoints. Thanks to big data and machine learning, Trend Micro identifies new anomalies and risks faster than ever before. Protect More Than Devices Many new types of simple IoT devices now connect to the internet through new protocols. Trend Micro offers a wide range of innovative solutions to protect your customers, making it simple for them to feel completely safe online. Secure Networks New devices keep transmitting more kinds of data to each other and to the cloud. Only a multi-layer security solution can deal with network threats and stop invasive data collection schemes to protect the privacy of your customers. Manage with a Simple Console Maintaining security throughout the network poses a big challenge to telecoms relying on a variety of solutions. An intuitive management console allows for the effective management of monitoring and response systems.Comprehensive Solutions for Telecom Providers
SCAM & FRAUD DETECTION Block phishing scams using the latest AI technology with context analysis to stop web or email social engineering attacks. PRIVACY & IDENTITY PROTECTION Block dangerous websites that steal personal data and alert customers whose data has started circulating on the Dark Web. ADVANCED AI TECHNOLOGY Artificial Intelligence and machine learning can detect suspicious events before connected household devices suffer an attack. PARENTAL CONTROLS Help children use the web safely, featuring a single setup process and content limits for all their devices. COMPLETE DEVICE PROTECTION Take advantage of enterprise intrusion prevention technology and cloud intelligence to protect the entire networks of customers from attacks. WEB THREAT SUPPRESSION Defend against ransomware and other dangers to ensure the security of online transactions from home wifi networks. DELIVER PROTECTION ANYWHERE Secure mobile devices no matter where they go.Comprehensive Solutions for Telecom Providers
- Easy Integration
- Accelerated Business Growth
- New Marketing Channels
- Greater Customer Satisfaction
Trend Micro Deep Discovery Analyzer
Deep Discovery Analyzer extends the value of existing security investments from Trend Micro and third-parties (through a web services API) by providing custom sandboxing and advanced analysis. It can also provide expanded sandboxing capabilities to other Trend Micro products. Suspicious objects can be sent to the Analyzer sandbox for advanced analysis using multiple detection methods. If a threat is discovered, security solutions can be updated automatically.
KEY CAPABILITIES:
Custom Sandbox Analysis uses virtual images that are tuned to precisely match your system configurations, drivers, installed applications, and language versions. This approach improves the detection rate of advanced threats that are designed to evade standard virtual images. The custom sandbox environment includes safe external access to identify and analyze multi-stage downloads, URLs, command and control (C&C), and more, as well as supporting manual or automated file and URL submission.
Flexible Deployment Analyzer can be deployed as a standalone sandbox or alongside a larger Deep Discovery deployment to add additional sandbox capacity. It is scalable to support up to 60 sandboxes in a single appliance, and multiple appliances can be clustered for high availability or configured for a hot or cold backup.
Advanced Detection Methods such as static analysis, heuristic analysis, behavior analysis, web reputation, and file reputation ensure threats are discovered quickly. Analyzer also detects multi-stage malicious files, outbound connections, and repeated C&C from suspicious files.
Broad file analysis range Examines a wide range of Windows executables, Microsoft Office, PDF, web content, and compressed file types using multiple detection engines and sandboxing. Custom policies can be defined by file type.
Document exploit detection Discovers malware and exploits delivered in common document formats by using specialized detection and sandboxing.
URL analysis Performs sandbox analysis of URLs contained in emails or manually submitted samples.
Web services API and manual submission Enables any product or malware analyst to submit suspicious samples. Shares new IOC detection intelligence automatically with Trend Micro and third-party products.
Support for Windows, Mac, and Android operating systems.
Detect ransomware Detects script emulation, zero-day exploits, targeted and password-protected malware commonly associated with ransomware. IT also uses information on known threats to discover ransomware through pattern and reputation-based analysis. The custom sandbox can detect mass file modifications, encryption behavior, and modifications to backup and restore.
Trend Micro Detection and Response
Today’s advanced threats are designed to bypass traditional cybersecurity defenses and compromise sensitive corporate data by exfiltrating or encrypting it for ransom.
Effective detection and response solutions seek out these advanced threats and eliminate them before they compromise data.
Trend Micro has integrated layered advanced detection and response techniques into its Endpoint Protection Platform to leverage its automation and response capabilities. Machine learning (both pre-execution and run-time), vulnerability protection, behavioral analysis, application control, and other advanced techniques are designed to work seamlessly with your endpoint protection.
To fully understand how an advanced attack penetrated security defenses and how it morphed and spread to manifest itself into an enterprise, security researchers need to be able to build a Root Cause Analysis. The analysis is done by recording system events and behaviors and investigating the data. To that end, we offer two options:
Trend Micro Endpoint Sensor
An optional component for Trend’s endpoint protection platform. Endpoint Sensor records system events and behaviors on endpoints, allowing threat investigators to search user telemetry for advanced threats using IOCs (Indicators of Compromise) or potential attacks using IOAs (Indicators of Attack).
Understand the entry, spread, and depth of attacks. The sensor can generate a root cause analysis and create a remediation plan.
Trend Micro Managed Detection and Response
Provides 24/7 alert monitoring, alert prioritization, investigation, and threat hunting services to Trend Micro customers as a managed servicer.
The MDR service collects data from endpoints, network security, and server security to correlate and prioritize alerts and system information and determine a full root cause analysis. Our threat investigators investigate on behalf of you and provide a full remediation plan.
Trend Micro Endpoint Security
- File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.
- C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.
- Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).
- Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).
- Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.
- Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.
- Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.
- Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).
- Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.
- Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.
- Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.
Trend Micro Hosted Email Security
Trend Micro Hosted Email Security is a no-maintenance-required solution that delivers continuously updated protection to stop phishing, ransomware, BEC, advanced threats, spam and malware before they reach your network. It protects Microsoft Exchange, Microsoft Office 365, Gmail and other hosted and on-premises email solutions.
Key features:
Layered protection: Provides protection for phishing, spam, and graymail with multiple techniques, including sender reputation, content and image analysis, machine learning, and more.
Email fraud protection: Protects against BEC with enhanced machine learning, combined with expert rules, analyzing both the header and content of the email.
Document exploit protection: Detects advanced malware and exploits in PDF, Microsoft Office, and other documents using static and heuristic logic to detect and examine abnormalities.
Zero-day protection: Combines pre-execution machine learning, anti-malware, and dynamic analysis using sandboxing to detect zero-day malware.
Cloud sandboxing: Includes cloud sandboxing for automatic in-depth simulation and analysis of potentially malicious attachments in a secure virtual environment hosted by Trend Micro.
URL time-of-click: Blocks emails with malicious URLs before delivery and re-checks URL safety when a user clicks on it.
Web reputation service: Scans URLs embedded in emails and blocks URLs leading to malicious sites by using the enhanced web reputation services from the Trend Micro Smart Protection Network.
Email encryption: Policy-driven email encryption includes hosted key management service and enables recipients to read encrypted emails on any device using a web browser.
Data loss prevention (DLP): Provides DLP profiles to make it easier to track and document sensitive data, and safeguard confidential information.
Source verification and authentication: Includes Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC).
Threat intelligence: Uses the Smart Protection Network, one of the largest threat intelligence databases, to correlate web, email, file, domain registries, and many other threat sources to identify attacker infrastructures, before they are launched.