Corporate Partners

Trend Micro

Trend Ready | Security That Speeds Cloud Adoption

Blog@ Trend Micro

AWS re:Invent Round Up

It’s been a week since re:Invent, and the dust is still settling. The content from the event is being posted quickly. You can find all of the videos (with a few still coming), audio podcast versions, and slides from the sessions online. The challenge here is the how to process this massive amount of content....

Trend Micro Collaborates with Latin American Leaders on Cybercrime

The region’s cybercriminal underground is flourishing and is now at the forefront of the international arena with Russia and China. With more people and organizations gaining Internet access in the region, the pool of victims for cybercriminals to attack continues to increase. While the increase of cybercrime is staggering, the price of crimeware in this...

The Brazilian Underground Market

Today we released the latest in our ongoing series of in-depth research reports into the Cybercriminal Underground. Today’s report, “The Brazilian Underground Market: The Market for Cybercriminal Wannabes?”, by Fernando Mercês, adds Brazil to the list of countries whose cybercriminal underground that Trend Micro’s Forward-Looking Threat Research Team has delved into. Many people outside of Brazil...

AWS re:Invent 2014 Wrap Up

Wow. As expected re:Invent 2014 was a whirlwind. Last week, AWS launched 9 new services. Well 8 new standalone services and a new database engine that is important enough to be called a new service. Trend Micro was a diamond sponsor at the event and we had a huge presence at the event. For this...

Cyber PreCogs? What Do the Next 2-3 Years Hold For Us?

Google contacts not glasses; autonomous cars from Tesla and General Motors in many not just a few garages; and a major payment ecosystem reboot and cybercrime will continue to proliferate amongst the innovation of it all. These are just a few of the things I can be relatively certain will occur in the next 24-36...

Videos

Trend Micro and DeepSecurity

Trend Micro Deep Security Powering tomorrow's cloud-enabled enterprises with a dynamic data center of distributed physical and virtual servers operating in private and public clouds.

Delivering a Secure Cloud

In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.

Whitepapers

Helping Companies Fight Against Targeted Attacks

Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies. Download PDF

How Threat Actors Steal Your Data

Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem. Download PDF

Targeted Attack Campaigns

Advanced Persistent Threats (APTs) refer to a category of threats that aggressively pursue and chosen targets that over time attempt to get deeper into their network. For Enterprises, this is a high priority threat as human and systemic weaknesses can be mitigated with correct practices and solutions. In this report we look at targeted attack campaigns and how these can be mitigated. Download PDF

Agentless Security for Virtual Environments

Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution. Download PDF

Changing the Game for Anti-Virus in the Virtual Datacentre

This white paper reviews the challenges with endpoint security in virtualised environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virusscanners in multiple guest virtual machines, on a single physical host. Download PDF

Cost-effective Virtualisation & Cloud Security

Virtualisation and cloud computing can help your organisation achieve significant ROI as well as savings in hardware costs, operational expenditures, and energy demands - while achieving improvements in service quality and business agility. Despite this potential, many organisations maintain their existing physical server security, unaware that this limits their ability to maximize their use of virtualisation and cloud technologies. Download PDF

Deep Security 9

Virtualisation and cloud computing have changed the face of today’s data centre. Yet as organisations move from physical environments to a mix of physical, virtual, and cloud, many have addressed the prevailing threat landscape with yesterday’s mix of legacy security solutions. The results can actually threaten desired performance gains – for example, leaving unintentional security gaps. Download PDF

ESG: Information Security, Virtualisation, and the Journey to the Cloud

As organisations expand their virtualisation deployments to application and desktop virtualisation, they will find themselves on the road to cloud computing. ESG looks at the multi-phase process IT organisations will undergo and offers guidance on how each phase provides an opportunity to not only increase optimisation and efficiency, but enhance security as well. Download PDF

Cost Savings Through Virtual Patching

Software patches have long been an integral aspect of maintenance and development for any product or system. Regular patches allow a system to undergo dynamic growth, evolving and developing to meet new needs, respond to new developments, or address emergent weaknesses. Find out more about cost savings and overall gains to security and stability that an enterprise can accrue through the implementation of virtual patching technology. Download PDF

Kill Your Data To Protect It From Cybercriminals

There are two types of data: data someone wants to steal and everything else. Most security professionals today do not understand the motivations behind data theft; they put controls in place that protect the data that is most valuable to them, as opposed to data that is most valuable to criminals. Download PDF

Protecting the Dynamic Datacentre

The purpose of IT security is to enable your business, not impede it, but the challenges and complexity you face for your IT security grow every day. Compliance requirements impose security standards for data and applications on servers. Download PDF

The Trend Ready Program for Cloud Service Providers

Trend Ready Program for Cloud Service Providers is an initiative designed to help enterprises overcome the complex data and threat security risks that inhibit them from adopting cloud computing. It provides a validated set of trusted security tools that compliments your internal IT controls, helps you overcome fear about cloud security, and enhances your ability to fully embrace cloud computing. Download PDF

Virtual Patching: Lower Security Risks and Costs

This white paper reviews enterprise challenges with security patch management including risks to various areas of IT—security, compliance, operations, and budgets. It discusses how traditional approaches to remediating vulnerable systems can create new problems and provides a new model that keeps pace with the ever-increasing number of attack vectors. Download PDF

Trend Micro Deep Security: For Vulnerability Shielding

Countless software vulnerabilities leave the door open to data-stealing malware and other attacks. And IT teams can’t keep up—it’s virtually impossible to download, test, and deploy patches for all critical vulnerabilities before they are exploited. At the same time, emergency patching causes unacceptable downtime, overhead, and costs and other operational challenges. Given these challenges, there has never been a more urgent need for a virtual patching solution that complements existing patch management processes by shielding known and unknown vulnerabilities. Download PDF