{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"en":"User","ru":"Пользователь","_type":"localeString"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"_type":"localeString","en":"Deployments found","ru":"Внедрений найдено"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"ru":"ROI","_type":"localeString","en":"ROI"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"_type":"localeString","en":" Branch","ru":"Отрасль"},"users":{"en":"Users","ru":"Пользователи","_type":"localeString"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"_type":"localeString","en":"Info source","ru":"Информационный ресурс"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"label":"catalog-implementations-text-block","body":{"ru":[{"children":[{"_key":"1435aa0421110","_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса."}],"_type":"block","style":"normal","_key":"1435aa042111","markDefs":[]}],"_type":"localeBlock","en":[{"style":"normal","_key":"0e40f9075bd0","markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00"}],"_type":"block"}]}}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"}},{"translations":{"ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString","en":"Implementations"},"name":"og:description"},{"name":"title","translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"}},{"name":"description","translations":{"ru":"Описание внедрений","_type":"localeString","en":"Implementations description"}},{"name":"keywords","translations":{"_type":"localeString","en":"Implementations keywords","ru":"Внедрения ключевые слова"}}],"title":{"ru":"ROI4CIO: Внедрения","_type":"localeString","en":"ROI4CIO: Implementations"}}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"trend-micro-endpoint-security-for-education-university":{"id":546,"title":"Trend Micro Endpoint Security for Education (University)","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Kingston University</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Industry:</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Education</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Region:</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">Europe, UK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Products</span>\r\n<ul><li>Smart Protection Suite Complete</li><li>Control Manager</li><li>Endpoint Application Control</li><li>Endpoint Encryption</li><li>Integrated Data Loss Protection (iDLP)</li><li>OfficeScan</li><li>Mobile Security</li><li>Email Security Gateway</li><li>Vulnerability Protection</li></ul>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">IT Environment</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Mac, Microsoft Windows and Office 365</span>\r\nKingston University is a thriving higher education institution spread out over four campuses in southwest London. With more than 17,000 students, 2,000 staff, 6,500 devices — including Macs, PCs, and short-loan laptops — and a sizeable cloud environment to protect, there’s plenty to keep Chief Information Officer Simon Harrison busy.\r\nUniversities are increasingly in the crosshairs of online attackers who believe porous networks and underinvestment in cybersecurity by some make them an easy target. Data breaches at UK universities have doubled over the past two years, according to FOI data, as state-sponsored hackers and financially motivated gangs look to steal highly valuable research data. Additionally, phishing attempts targeting students have rocketed in recent months, while ransomware is an ever-present danger.\r\n<span style=\"font-style: italic;\">“Many of our students use our devices to support their learning and for social activities, which exposes them to attacks. We are looking to protect endpoints and servers from ransomware, malware, spyware and so on,” says Harrison. “If we’re not well protected, people can introduce infected files onto our cloud servers and on-site storage via their own devices or flash drives.”</span>\r\n<span style=\"font-style: italic;\">"When we started this journey, we were primarily interested in protecting the devices we owned. But through conversations with Trend Micro, the partner relationship has grown where we are now able to provide Trend Micro Antivirus to our students and staff as well." Simon Harrison, Chief Information Officer, Kingston University</span>\r\n<span style=\"font-weight: bold;\">Challenges</span>\r\nLike many organisations, Kingston University is currently undergoing a digital transformation journey designed to improve learning, teaching, and research outcomes, as well as IT resilience and service delivery. As part of this ongoing, multi-year initiative, security has always been front-of-mind, according to Harrison. Apart from the risk of data loss and ransomware-based service outages — which would have a huge impact on staff and students — there’s a reputational risk if university services are seen to be sending out malware, he explains.\r\nTo provide assurance to the Board and Audit and Risk Committee, Harrison devised several key requirements:\r\n<ul><li>IT security infrastructure must address the growing diversity of the threat landscape</li><li>Proactive threat protection with a high degree of management and granular analytics</li><li>Protection across endpoints and hybrid cloud servers</li><li>Connected, layered defence to complement existing next-gen firewalls</li></ul>\r\n“<span style=\"font-style: italic;\">Having recognised that what we had wouldn’t be good enough for the future, it became a story of how to find a vendor to meet our requirements for endpoint, server and cloud technologies,” explains Harrison.</span>\r\n<span style=\"font-weight: bold;\">Why Trend Micro</span>\r\nAfter evaluating recommendations from Gartner and Forrester and speaking with a number of contacts in universities and other organisations, Harrison and his team began appraising several vendors. They ran proof of concept tests to see if marketing claims matched the reality of protecting the Kingston University IT environment. In the end, they settled on Trend Micro™ Smart Protection Complete to protect physical endpoints and the university cloud services, including Microsoft® Office 365® and Box, which contain around half of the university’s core process-enabling applications.\r\n<span style=\"font-style: italic;\">"We’re offering the students and staff the ability to protect themselves. Our students and staff see this as a benefit, and from our point of view, these devices that connect to our network are more likely to be virus free. It improves the digital health of the entire ecosystem to everyone’s mutual benefit." Simon Harrison,</span>\r\n<span style=\"font-style: italic;\">Chief Information Officer, Kingston University</span>\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nProcurement and implementation was straightforward, and thanks to channel partner Longwall Security, the Trend Micro solution was quickly set up and configured to maximise protection for Kingston University’s specific IT environment and needs.\r\nPowered by XGen™ for cross-generational, multi-layered security, Trend Micro™ Smart Protection Complete protects endpoints, mobile devices, email and cloud apps, and web activity from a single interface. It allowed the organisation to:\r\n<ul><li>Regain control of end-user IT by centralising threat and data protection across multiple layers</li><li>Stop ransomware from encrypting endpoints</li><li>Block zero-day malware with signature-less techniques</li><li>Enable users to securely work from the platforms they find most productive</li><li>Protect data with no increase in management or client footprint</li><li>Minimise risks with any mix of real-time, proactive cloud-based security</li><li>Reduce management complexity and overall costs</li></ul>\r\nThe Trend Micro solution blocked a staggering 82 million ransomware threats in the first half of 2017 alone.\r\n<span style=\"font-weight: bold;\">Results</span>\r\nTrend Micro™ Smart Protection Complete has enabled the IT team at Kingston University to proactively manage any malware outbreaks and other cybersecurity and data protection challenges in a highly effective manner. That means the institution has mitigated the threat of data loss and service outages, which can cause huge disruptions for staff and students, minimised reputational and financial risk, and helped fulfil its GDPR compliance obligations. But the partnership with Trend Micro has evolved into something even more beneficial, which Harrison hopes will stretch far into the future.\r\n<span style=\"font-style: italic;\">“When we started this journey, we were primarily interested in protecting the devices we owned. But through conversations with Trend Micro, the partner relationship has grown where we are now able to provide Trend Micro Antivirus to our students and staff as well,” he concludes.</span>\r\n<span style=\"font-style: italic;\">“We’re offering the students and staff the ability to protect themselves. Our students and staff see this as a benefit, and from our point of view, these devices that connect to our network are more likely to be virus free. It improves the digital health of the entire ecosystem to everyone’s mutual benefit.“</span>","alias":"trend-micro-endpoint-security-for-education-university","roi":0,"seo":{"title":"Trend Micro Endpoint Security for Education (University)","keywords":"","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Kingston University</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-fami","og:title":"Trend Micro Endpoint Security for Education (University)","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Kingston University</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-fami"},"deal_info":"","user":{"id":4374,"title":"Kingston University","logoURL":"https://old.roi4cio.com/uploads/roi/company/Kingston_University_logo.png","alias":"kingston-university","address":"","roles":[],"description":"Kingston University London (informally Kingston or KUL) is a public research university located within the Royal Borough of Kingston upon Thames, in South West London, United Kingdom. The university specialises in the arts, design, fashion, science, engineering, and business. It received university status in 1992, before which the institution was known as Kingston Polytechnic. Its roots, however, go back to the Kingston Technical Institute, founded in 1899.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.kingston.ac.uk/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kingston University","keywords":"","description":"Kingston University London (informally Kingston or KUL) is a public research university located within the Royal Borough of Kingston upon Thames, in South West London, United Kingdom. The university specialises in the arts, design, fashion, science, engineerin","og:title":"Kingston University","og:description":"Kingston University London (informally Kingston or KUL) is a public research university located within the Royal Borough of Kingston upon Thames, in South West London, United Kingdom. The university specialises in the arts, design, fashion, science, engineerin","og:image":"https://old.roi4cio.com/uploads/roi/company/Kingston_University_logo.png"},"eventUrl":""},"supplier":{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""},"vendors":[{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""}],"products":[{"id":1734,"logo":false,"scheme":false,"title":"Trend Micro Endpoint Security","vendorVerified":0,"rating":"1.40","implementationsCount":3,"suppliersCount":0,"alias":"trend-micro-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a list of known malware signatures is far less CPU-intensive than the more advanced behavior-based detection techniques.) But with new variants of crypto-ransomware being released every minute, the usefulness of signature based detection as a standalone security technique is waning. To provide any real value to an enterprise, it must be complemented by a wide range of other techniques. Still, signature-based detection should be a part of a multi-layered security approach, including:\r\n<ul> <li>File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.</li> <li>C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.</li> </ul>\r\n<span style=\"font-weight: bold;\">Non-signature-based detection</span> These techniques defend against malware without requiring any previous knowledge of exact file signatures. Instead, they make determinations based on a file’s characteristics and behavior. Some of the techniques to be included in a multi-layered security approach include the following: <span style=\"font-weight: bold;\">Variant protection</span> Variant protection looks for obfuscated, polymorphic or variants of malware by using fragments of previously seen malware and detection algorithms. <span style=\"font-weight: bold;\">Census check</span> The likelihood that a file is malicious can be determined in part by its prevalence and maturity (i.e., how often it has been seen over a given time period). Files that have never been detected are considered to be more suspicious. This technique has proven to be quite strong against malware hash factories. <span style=\"font-weight: bold;\">Whitelisting check</span> To reduce false positives on endpoint detections, all files should be checked against a database of known and verified good files. (As an example, Trend Micro’s certified safe software whitelist contains almost one billion known good files.) <span style=\"font-weight: bold;\">Behavioral analysis</span> This technique examines an item as it is unpacked, looking for suspicious or unusual behavior in how it interacts with operating systems, applications and scripts — even if the item isn’t on a blacklist. While crypto-ransomware can easily pass by traditional anti-virus (by being a freshly compiled executable), it will behave suspiciously as it loads into memory, triggering further action. As attackers are still finding it difficult to evade behavior-based detection, this technique is a must-have for any organization. Behavioral analysis can take many forms, including:\r\n<ul> <li>Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).</li> <li>Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).</li> <li>Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.</li> <li>Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.</li> <li>Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.</li> <li>Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).</li> </ul>\r\n<span style=\"font-weight: bold;\">Exploit prevention</span> While there are hundreds of thousands of malicious files out there, there aren’t very many unique exploits that can be used to compromise a user’s system. As such, it is often easier to focus on preventing the exploitation of specific application or OS-related vulnerabilities rather than blocking the files themselves. Also known as vulnerability shielding, exploit prevention techniques can include:\r\n<ul> <li>Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.</li> <li>Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.</li> <li>Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.</li> </ul>\r\n","shortDescription":"Trend Micro Endpoint Security - Defend against the threats of today and tomorrow with XGen™ security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trend Micro Endpoint Security","keywords":"","description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:title":"Trend Micro Endpoint Security","og:description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l"},"eventUrl":"","translationId":1735,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":400,"title":"High costs"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.trendmicro.com/en_us/about/customer-stories/kingston_university.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trend-micro-endpoint-security-for-healthcare":{"id":545,"title":"Trend Micro Endpoint Security for Healthcare","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Brooks Rehabilitation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Industry: </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Healthcare</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Employees: </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">2,800</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Region: </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">North America, United States</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Products</span>\r\n<ul><li>Smart Protection Complete:</li><li>OfficeScan</li><li>ScanMail</li><li>Control Manager</li><li>Vulnerability Protection</li><li>Endpoint Encryption</li></ul>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">IT Environment</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Two data centers, 150 servers, virtualized, Cisco networking, 2,500 laptops/desktop running Windows, private cloud</span>\r\nProviding world-class rehabilitation solutions since 1970, Brooks Rehabilitation is dedicated to advancing the health and well-being of communities throughout the southeastern U.S. Brooks’ highly-trained clinicians provide the most advanced therapy and medical care, along with the compassion, motivation, and hope to help people reach their highest level of recovery.\r\nBrooks operates one of the nation’s largest inpatient rehabilitation hospitals with 160 beds, one of the region’s largest home healthcare agencies, 32 outpatient rehabilitation clinics, and much more. Within the hospital is the Cybernic Treatment Center where they are introducing robotic treatment with the Hybrid Assistive Limb (HAL) for patients paralyzed by spinal cord injuries. In addition, Brooks operates the Clinical Research Center and provides many low- or no-cost community programs to improve the quality of life for people living with physical disabilities. To meet the needs of patients and clinicians, the IT organization supports more than 2,800 employees with two data centers, and approximately 150 servers.\r\n<span style=\"font-weight: bold;\">Challenges</span>\r\nFor Brooks Rehabilitation, keeping its IT environment and patient personal health information protected across a widely distributed network is an ongoing priority—and a challenge. Like many healthcare organizations, Brooks was the target of constant cyber threats, including phishing emails that trick employees into revealing protected information, such as passwords, to gain access to business data, including credit card and patient information. Also, with approximately one-third of employees using mobile devices, Brooks needed to protect employees’ mobile devices and data.\r\nBrooks is also required to meet HIPAA, HITECH Act1, and other compliance regulations. “Without visibility across our entire network’s threat landscape, it was difficult to identify threats, pinpoint vulnerabilities, and rapidly address them to ensure our systems and data were secure and in compliance with healthcare regulations,” said Brian Barbour, System Engineer/End User Experience at Brooks Rehabilitation.\r\n<span style=\"font-weight: bold;\">Why Trend Micro</span>\r\nBrooks Rehabilitation has been a Trend Micro customer since 2013, and Barbour had used Trend Micro security products for 10 years before joining the company in early 2017. Barbour met with Trend Micro shortly after he joined, and quickly discovered that an upgrade to Trend Micro™ Smart Protection Complete would give them the powerful security capabilities they were looking for at minimal cost.\r\nBrooks was impressed with how the entire Trend Micro team provided an amazing amount of help upfront to ensure their success. <span style=\"font-style: italic;\">“They were always fast to respond to our inquiries and very helpful—which made our decision to work with them an easy one,” said Barbour.</span>\r\n<span style=\"font-style: italic;\">"As a leader in treatment with robotic IoT devices, Trend Micro’s ability to provide security for these devices helps Brooks with the safety and well-being of patients." Brian Barbour, System Engineer/End User Experience, Brooks Rehabilitation</span>\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nTo implement Trend Micro™ Smart Protection Complete, Brooks Rehabilitation started with a pilot implementation of Trend Micro™ Vulnerability Protection. Its network-level host intrusion prevention system shields against vulnerabilities in operating systems and client applications. “Trend Micro experts went above and beyond to help us simplify the implementation process,” said Barbour.\r\nBrooks next implemented Trend Micro™ ScanMail™ solution to block traditional malware and guard against targeted email attacks and spear phishing using document exploit detection, enhanced web reputation, and sandboxing. In addition, Trend Micro™ Smart Protection Network™ cloud-based security identifies and blocks threats in real time.\r\nWith Smart Protection Complete, Brooks can eliminate security gaps across any user activity and any endpoint using application control, intrusion prevention endpoint encryption, data loss prevention, and more. In addition, full disk encryption supports compliance. “Encryption is very important, especially with our mobile workforce. If a laptop containing personal health information is stolen and its disk is encrypted, we know we’re still compliant with HIPAA regulations,” said Barbour.\r\nFinally, with Trend Micro™ Control Manager™ solution in place, Barbour and his team can manage multiple layers of connected threat and data protection for complete visibility. <span style=\"font-style: italic;\">“It’s really helpful to see the entire threat landscape and know every facet of our IT infrastructure is protected,” said Barbour.</span>\r\n<span style=\"font-style: italic;\">"The solution detected malicious code and removed hundreds of phishing emails from our system with the click of a button." Brian Barbour, System Engineer/End User Experience, Brooks Rehabilitation</span>\r\n<span style=\"font-weight: bold;\">Results</span>\r\nSince deploying Smart Protection Complete, Brooks has gained several benefits, including identifying and stopping phishing exploits. “The solution detected malicious code and removed hundreds of phishing emails from our system with the click of a button,” said Barbour. “With the solution’s encryption capabilities, we reduced our encryption time by 30 percent and now have greater compliance protection at a reduced cost.”\r\nIn addition to providing visibility across the threat landscape, Control Manager integrates every Trend Micro product in a single view.<span style=\"font-style: italic;\"> “Control Manager allows us to see our top 10 risky users and provides behavioral analysis, so we can see what transpired to create an issue,” said Barbour.</span>\r\n<span style=\"font-style: italic;\">“As a leader in treatment with robotic IoT devices, Trend Micro’s ability to provide security for these devices helps Brooks with the safety and well-being of patients. I’ve worked with Trend Micro products most of my career. Trend Micro not only keeps up with changes in technology, but I’m confident they’ll be here to take care of new threats as they arise,” said Barbour.</span>\r\n<span style=\"font-weight: bold;\">What's Next</span>\r\nLooking ahead, Brooks Rehabilitation plans to implement additional cloud solutions offered by Trend Micro™ Smart Protection suites. Barbour and his team are also considering Trend Micro™ Worry-Free™ Business Security, and Trend Micro™ Deep Discovery™ network defense solution to further protect their IT environment, information and users.","alias":"trend-micro-endpoint-security-for-healthcare","roi":0,"seo":{"title":"Trend Micro Endpoint Security for Healthcare","keywords":"","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Brooks Rehabilitation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-fa","og:title":"Trend Micro Endpoint Security for Healthcare","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Brooks Rehabilitation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-fa"},"deal_info":"","user":{"id":4375,"title":"Brooks Rehabilitation","logoURL":"https://old.roi4cio.com/uploads/roi/company/Brooks_Rehabilitation_logo.png","alias":"brooks-rehabilitation","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At Brooks Rehabilitation, we have more than 40 years of expertise in providing medical rehabilitation services. Our highly trained clinicians provide the most advanced therapy and medical care, along with the compassion, motivation, and hope to help people reach their highest level of recovery.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">OUR MISSION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">To empower people to achieve their highest level of recovery and participation in life through excellence in rehabilitation.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">OUR VISION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Brooks Rehabilitation is the recognized leader in providing a system of world-class rehabilitation solutions, advancing the health and well-being of our communities.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">OUR VALUES</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Excellence in Care, as demonstrated through:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>Innovation</li><li>Integrity</li><li>Service</li><li>Compassion</li><li>Teamwork</li><li>Accountability</li><li>Continuous learning</li></ul>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.brooksrehab.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Brooks Rehabilitation","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At Brooks Rehabilitation, we have more than 40 years of expertise in providing medical rehabilitation services. Our highly trained clinicians provide the most advanced ","og:title":"Brooks Rehabilitation","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">At Brooks Rehabilitation, we have more than 40 years of expertise in providing medical rehabilitation services. Our highly trained clinicians provide the most advanced ","og:image":"https://old.roi4cio.com/uploads/roi/company/Brooks_Rehabilitation_logo.png"},"eventUrl":""},"supplier":{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""},"vendors":[{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""}],"products":[{"id":1734,"logo":false,"scheme":false,"title":"Trend Micro Endpoint Security","vendorVerified":0,"rating":"1.40","implementationsCount":3,"suppliersCount":0,"alias":"trend-micro-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a list of known malware signatures is far less CPU-intensive than the more advanced behavior-based detection techniques.) But with new variants of crypto-ransomware being released every minute, the usefulness of signature based detection as a standalone security technique is waning. To provide any real value to an enterprise, it must be complemented by a wide range of other techniques. Still, signature-based detection should be a part of a multi-layered security approach, including:\r\n<ul> <li>File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.</li> <li>C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.</li> </ul>\r\n<span style=\"font-weight: bold;\">Non-signature-based detection</span> These techniques defend against malware without requiring any previous knowledge of exact file signatures. Instead, they make determinations based on a file’s characteristics and behavior. Some of the techniques to be included in a multi-layered security approach include the following: <span style=\"font-weight: bold;\">Variant protection</span> Variant protection looks for obfuscated, polymorphic or variants of malware by using fragments of previously seen malware and detection algorithms. <span style=\"font-weight: bold;\">Census check</span> The likelihood that a file is malicious can be determined in part by its prevalence and maturity (i.e., how often it has been seen over a given time period). Files that have never been detected are considered to be more suspicious. This technique has proven to be quite strong against malware hash factories. <span style=\"font-weight: bold;\">Whitelisting check</span> To reduce false positives on endpoint detections, all files should be checked against a database of known and verified good files. (As an example, Trend Micro’s certified safe software whitelist contains almost one billion known good files.) <span style=\"font-weight: bold;\">Behavioral analysis</span> This technique examines an item as it is unpacked, looking for suspicious or unusual behavior in how it interacts with operating systems, applications and scripts — even if the item isn’t on a blacklist. While crypto-ransomware can easily pass by traditional anti-virus (by being a freshly compiled executable), it will behave suspiciously as it loads into memory, triggering further action. As attackers are still finding it difficult to evade behavior-based detection, this technique is a must-have for any organization. Behavioral analysis can take many forms, including:\r\n<ul> <li>Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).</li> <li>Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).</li> <li>Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.</li> <li>Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.</li> <li>Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.</li> <li>Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).</li> </ul>\r\n<span style=\"font-weight: bold;\">Exploit prevention</span> While there are hundreds of thousands of malicious files out there, there aren’t very many unique exploits that can be used to compromise a user’s system. As such, it is often easier to focus on preventing the exploitation of specific application or OS-related vulnerabilities rather than blocking the files themselves. Also known as vulnerability shielding, exploit prevention techniques can include:\r\n<ul> <li>Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.</li> <li>Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.</li> <li>Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.</li> </ul>\r\n","shortDescription":"Trend Micro Endpoint Security - Defend against the threats of today and tomorrow with XGen™ security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trend Micro Endpoint Security","keywords":"","description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:title":"Trend Micro Endpoint Security","og:description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l"},"eventUrl":"","translationId":1735,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":400,"title":"High costs"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":385,"title":"Risk of data loss or damage"},{"id":384,"title":"Risk of attacks by hackers"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.trendmicro.com/en_us/about/customer-stories/brooks-rehabilitation.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trend-micro-endpoint-security-for-nonprofit-charity":{"id":544,"title":"Trend Micro Endpoint Security for Nonprofit, Charity","description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</li><li>Smart Protection Suite</li><li>Smart Protection for Endpoints</li><li>OfficeScan</li><li>Endpoint Encryption</li><li>Data Loss Prevention (DLP)</li><li>Control Manager</li><li>Deep Security</li></ul>\r\n<span style=\"font-weight: bold;\">IT Environment</span>\r\n<ul><li>Microsoft Office 365</li><li>VMware 260+ endpoints</li><li>50-60 virtual desktops</li><li>PC and mac</li><li>mobile</li></ul>\r\n<span style=\"font-weight: bold;\">Overview</span>\r\nFor more than 100 years, United Way of Greater Atlanta has been serving its community. Today, it works in 13 counties in and around the greater metropolitan area. As one of the largest United Way organizations in the country, it invests $100 million annually in more than 200 programs. The charitable organization focuses on helping children succeed in school, helping families become financially stable, improving health outcomes for people of all ages, and reducing chronic homelessness.\r\nA 10-member IT team supports 200 staff members at eight offices and 20 remote call center agents who take community calls for assistance from their homes. More than 50 seasonal workers join the organization on virtual desktops during the fall pledge drive. Several years ago, United Way of Greater Atlanta virtualized servers and desktops and today runs a completely virtualized environment on the VMware platform.\r\nTo honor their mobile workforce, the organization supports a bring-your-own device (BYOD) program with Airwatch management and has replaced about 70% of staff desktops with laptops. IT recently deployed Microsoft Office 365 and now encourages staff to move from other cloud file sharing programs to Microsoft OneDrive.\r\n<span style=\"font-weight: bold;\">Challenges</span>\r\nWhen a big retailer suffers a breach, people don’t necessarily stop shopping with that retailer. A breach at United Way of Greater Atlanta, however, could send donors looking for a safer place to put their information and contributions. That’s why protecting donor or recipient data is so important for the nonprofit. “We face the same security challenges as many large organizations, such as data leakage, data loss prevention and intrusion detection. For us, there is a higher degree of risk because we are a volunteer-led, donor-driven organization,” said Orinzal Williams, Executive Director of IT for United Way of Greater Atlanta.\r\nNot only does United Way of Greater Atlanta compete with other nonprofits, but it competes with organizations that deliver transaction services to nonprofits as a way to expedite contributions. United Way vows to return 90% of its funds back to the community, which requires keeping overhead low. “We have to remain competitive while keeping our donor information secure,” said Williams.\r\nLike many large organizations, United Way of Greater Atlanta needed to revisit its endpoint security solution to address changes in how today’s workers do their jobs. An endpoint solution that had served the organization for about seven years was inadequate in an environment of laptops, mobile phones, and security issues around public cloud file storage solutions like Dropbox or Box.\r\nWith 268 endpoints to secure and an additional 50 or 60 virtual desktops during the fall fund drive, the small IT team was usually reacting to a problem rather than proactively preventing it. “We needed a more robust endpoint security solution that would help us stay on top of security without devoting a lot of time to it,” said Williams.\r\n<span style=\"font-style: italic;\">"Smart Protection for Endpoints allows us to be more efficient and compliant. When IT is efficient, the organization is being efficient with donor dollars and more money goes to the community. That’s a huge benefit." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta </span>\r\n<span style=\"font-weight: bold;\">Why Trend Micro</span>\r\nTo protect sensitive information on laptops, United Way of Greater Atlanta sought a new endpoint security solution capable of on- and off-premises protection. While Williams did look at solutions from other well-known security vendors, Trend Micro was always top of mind. <span style=\"font-style: italic;\">“I’m a huge fan of Trend Micro Deep Security,” said Williams, who uses the solution to protect the organization’s VMware environment. “I called the Trend Micro rep to ask if they had anything to help us out. We had a 15-minute conversation about Smart Protection for Endpoints, and I was sold,” he adde</span>\r\n<span style=\"font-style: italic;\">“The members of my team wear multiple hats. We can’t have something that is so complicated it requires a dedicated resource to manage it. We needed the best combination of robustness and ease of use, where we can set it up but not babysit it all day. For this reason, Trend Micro was the best solution for us,” said Williams. “We started using Smart Protection for Endpoints immediately without additional training, because the dashboard is just like Deep Security,” he added</span>\r\n<span style=\"font-style: italic;\">"We used to put everything else on hold to combat the spread of malware on files on the server. With Smart Protection for Endpoints, we get an alert that the firewall has quarantined a machine on its own. Now we have one machine to check and nothing else that has to be done – no issue on the server or on other machines." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta</span>\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nWith help from a simple setup program, it took Williams about 45 minutes to deploy Smart Protection for Endpoints and install it on ten IT machines before launching a staged deployment to the rest of the organization. The suite offers protection against traditional attacks and the latest targeted attacks. “Smart Protection for Endpoints works with our Mac hardware, has BYOD functionality, and is lightweight and easy to deploy to our remote workforce,” said Williams.\r\nTo ensure protection now and in the future, IT decided to purchase a full suite of complementary endpoint solutions that deliver multiple layers of interconnected threat and data protection. “We may not use everything, but it’s there if we need it or auditors request it,” said Williams. The Security for Mac module adds a layer of protection for a growing number of Apple Mac clients in the network. The organization also uses the solution’s firewall, built-in compliance rules, endpoint encryption, and data loss prevention (DLP) module. They are currently testing virtual patching.\r\nThe DLP module ensures compliance with IT policy by blocking any attempts to send out sensitive information or inadvertently store it on the local hard drive. “When I know certain people are working with sensitive information, I can target their machines for DLP. Once we install the agent on the desktop, I can activate it from the console, and DLP is automatically put in place,” Williams added. “With DLP and other plug-ins, we are confident we are not leaking information out.”\r\nSetting policies is an important part of controlling user behavior, such as ensuring users can’t execute dangerous applications on endpoints. “We manage our remote agents by setting up a profile for on-network use and strengthening it for off-network,” said Williams.\r\nThe IT team makes extensive use of Trend Micro Control Manager, which provides a central view and reporting across connected Trend Micro security. “I really love the visibility into the machines and the control we have. We can do a little or a whole lot with it – we can have a basic level of protection or go deep and block certain applications at the firewall process. This really fits how we work,” said Williams, who jumps to many different tasks in the course of a day.\r\nAlerts and reports help Williams and his team respond quickly to issues in the environment. Williams can target machines that don’t have the current version of security software, so the IT team can find out why they didn’t update. He can also follow an alert on a quarantined machine with a scan, if necessary.\r\n<span style=\"font-style: italic;\">"Smart Protection for Endpoints allows us to be more efficient and compliant. When IT is efficient, the organization is being efficient with donor dollars and more money goes to the community. That’s a huge benefit." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta </span>\r\n<span style=\"font-weight: bold;\">Results</span>\r\nMultitasking got easier for the IT team following implementation of Smart Protection for Endpoints. Before deploying the security suite, IT faced from eight to 20 security issues a week, any one of which could spread malware or a Trojan like CryptoLocker to files on the server. It took all hands on deck to run solutions to combat a serious security issue. With Smart Protection for Endpoints, IT receives an alert that the firewall has automatically quarantined a machine. “Now we have one isolated issue to check and nothing else that has to be done – no issue on the server or on other machines. The threat probably didn’t even take hold on the original machine,” said Williams.\r\n<span style=\"font-style: italic;\">“Smart Protection for Endpoints does a great job of blocking unwanted traffic. It flags bad websites and stops malware entering from spam emails. It also flags personal email, which covers a huge hole and is a big win for us,” said Williams. He estimates that 50 threats – mostly malware from web traffic – have been blocked by Smart Protection for Endpoints since its implementation four months ago. The software is so efficient that the server never gets above 10% utilization. “The system remains efficient even when we have scheduled scans,” said Williams.</span>\r\nSmart Protection for Endpoints alerts, reports, and preprogrammed compliance features ensure a small IT team can operate efficiently to protect donor information at United Way of Greater Atlanta. “I don’t want to see us spending a lot of money on internal operations. I want the money to help the community. Since deploying Smart Protection for Endpoints, we know we are delivering the best service without increasing our workload,” said Williams. “I can say with confidence to our board that the combination of Deep Security and Smart Protection for Endpoints ensures we are taking all the necessary steps to make our environment secure,” he added\r\nWilliams has not had to call in a support ticket for Smart Protection for Endpoints. However, he’s confident that if an issue developed he would receive exemplary service. In all the time he’s used Deep Security, he’s only called in five tickets, and only one of those required an escalation. He received a call back on the escalation within the hour. “Trend Micro worked with us on the problem after hours until we got it resolved,” said Williams. “The fact that I’ve only had five tickets is a testament to the quality of Trend Micro software,” he added\r\n<span style=\"font-weight: bold;\">What's next?</span>\r\n<span style=\"font-style: italic;\">“We are still trying to figure out what actions we need to take for the cloud,” said Williams. The organization migrated to Office 365 almost a year ago, so most file sharing now takes place through OneDrive. Currently, they rely on the Smart Protection for Endpoints DLP module and built-in Microsoft protection on Office 365 to protect data in cloud applications. As Williams investigates a more layered defense for cloud apps, he will certainly look into Trend Micro solutions and consider their applicability for United Way of Greater Atlanta</span>","alias":"trend-micro-endpoint-security-for-nonprofit-charity","roi":0,"seo":{"title":"Trend Micro Endpoint Security for Nonprofit, Charity","keywords":"","description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</l","og:title":"Trend Micro Endpoint Security for Nonprofit, Charity","og:description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</l"},"deal_info":"","user":{"id":4373,"title":"United Way of Greater Atlanta","logoURL":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg","alias":"united-way-of-greater-atlanta","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in more than 200 programs in 13 counties through the United Way Child Well-Being Impact Fund. But, that’s not all. We bring together people and resources to tackle complex community issues and drive sustainable positive change to help our community thrive.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Vision</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Greater Atlanta is a community where all individuals and families thrive — a community where everyone has the opportunity to live a healthy life, acquire the education and skills they need to earn a good living and have a roof over their heads.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Mission</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Engage and bring together people and resources to drive sustainable improvements in the well-being of children, families and individuals in the community.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.unitedwayatlanta.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"United Way of Greater Atlanta","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:title":"United Way of Greater Atlanta","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:image":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg"},"eventUrl":""},"supplier":{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""},"vendors":[{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""}],"products":[{"id":1734,"logo":false,"scheme":false,"title":"Trend Micro Endpoint Security","vendorVerified":0,"rating":"1.40","implementationsCount":3,"suppliersCount":0,"alias":"trend-micro-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a list of known malware signatures is far less CPU-intensive than the more advanced behavior-based detection techniques.) But with new variants of crypto-ransomware being released every minute, the usefulness of signature based detection as a standalone security technique is waning. To provide any real value to an enterprise, it must be complemented by a wide range of other techniques. Still, signature-based detection should be a part of a multi-layered security approach, including:\r\n<ul> <li>File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.</li> <li>C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.</li> </ul>\r\n<span style=\"font-weight: bold;\">Non-signature-based detection</span> These techniques defend against malware without requiring any previous knowledge of exact file signatures. Instead, they make determinations based on a file’s characteristics and behavior. Some of the techniques to be included in a multi-layered security approach include the following: <span style=\"font-weight: bold;\">Variant protection</span> Variant protection looks for obfuscated, polymorphic or variants of malware by using fragments of previously seen malware and detection algorithms. <span style=\"font-weight: bold;\">Census check</span> The likelihood that a file is malicious can be determined in part by its prevalence and maturity (i.e., how often it has been seen over a given time period). Files that have never been detected are considered to be more suspicious. This technique has proven to be quite strong against malware hash factories. <span style=\"font-weight: bold;\">Whitelisting check</span> To reduce false positives on endpoint detections, all files should be checked against a database of known and verified good files. (As an example, Trend Micro’s certified safe software whitelist contains almost one billion known good files.) <span style=\"font-weight: bold;\">Behavioral analysis</span> This technique examines an item as it is unpacked, looking for suspicious or unusual behavior in how it interacts with operating systems, applications and scripts — even if the item isn’t on a blacklist. While crypto-ransomware can easily pass by traditional anti-virus (by being a freshly compiled executable), it will behave suspiciously as it loads into memory, triggering further action. As attackers are still finding it difficult to evade behavior-based detection, this technique is a must-have for any organization. Behavioral analysis can take many forms, including:\r\n<ul> <li>Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).</li> <li>Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).</li> <li>Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.</li> <li>Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.</li> <li>Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.</li> <li>Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).</li> </ul>\r\n<span style=\"font-weight: bold;\">Exploit prevention</span> While there are hundreds of thousands of malicious files out there, there aren’t very many unique exploits that can be used to compromise a user’s system. As such, it is often easier to focus on preventing the exploitation of specific application or OS-related vulnerabilities rather than blocking the files themselves. Also known as vulnerability shielding, exploit prevention techniques can include:\r\n<ul> <li>Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.</li> <li>Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.</li> <li>Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.</li> </ul>\r\n","shortDescription":"Trend Micro Endpoint Security - Defend against the threats of today and tomorrow with XGen™ security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trend Micro Endpoint Security","keywords":"","description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:title":"Trend Micro Endpoint Security","og:description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l"},"eventUrl":"","translationId":1735,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":306,"title":"Manage Risks"},{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":400,"title":"High costs"},{"id":397,"title":"Insufficient risk management"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.trendmicro.com/en_us/about/customer-stories/uw-atlanta-sps.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["trend-micro-endpoint-security-for-education-university","trend-micro-endpoint-security-for-healthcare","trend-micro-endpoint-security-for-nonprofit-charity"]},"links":{"first":"http://apis.roi4cio.com/api/implementations?page=1","last":"http://apis.roi4cio.com/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/implementations","per_page":20,"to":3,"total":3},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}