SOFTWARE SECURITY

Minimize Cybersecurity Risk and Relieve Overstretched Security Teams with Trend Micro Support and Service Bundles

Trend Micro Incorporated | September 07, 2021

Trend Micro Incorporated a global cybersecurity leader, today announced the launch of Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium support, an early warning service, Managed XDR and incident response, help customers prevent, detect and respond to cyber threats faster by supplementing internal resources.

The prevalence of cybersecurity threats and the dynamic threat landscape leave businesses vulnerable and put security experts in high demand to triage and investigate incidents.

According to Aaron Sherrill, Senior Research Analyst at 451 Research, part of S&P Global Market Intelligence[1], "Security teams are struggling to understand the right approach or strategy to employ to detect and respond to advanced threats. While most organizations have a plethora of security tools at their disposal, they are creating enormous amounts of data that must be explored and inspected. It is becoming increasingly difficult to distinguish between the noise and indicators of serious threats – especially complex, distributed threats that operate low and slow to avoid detection."

Over half of Security Operations Center (SOC) teams feel overwhelmed by alerts and aren't confident in their abilities to prioritize or respond to these alerts, according to a recent Trend Micro survey. Outsourcing security management significantly lightens the workloads and saves businesses from catastrophic breaches. 

"The weight of the world was felt by our security team as we work tirelessly to enable organization success in the digital transformation journey," said Andre Castleberry, cybersecurity manager of Hall County, Georgia. "Trend Micro's managed services have empowered our small team to manage risk and compliance at scale. Having threat experts support day-to-day detection and response for our security platform allows our employees to focus resources on serving our constituents."

Trend Micro's expert threat analysis and monitoring via its different services helps fortify business risk management plans. Managed threat detection and response across a complete security platform takes the burden of threat data triage off of stretched security teams, allowing internal resources to focus on business enablement.

"Security teams are stretched to the max while the business risk of cybersecurity continues to increase," said Wendy Moore, vice-president of product marketing for Trend Micro. "We want to help make our customers' lives easier while also minimizing their risk of attack. Providing better insight across the entire security platform, from product enablement, to risk monitoring and mitigation, to attack detection and response is one way we're doing that. Our proactive services that cross the threat lifecycle enables more advanced visibility and protection, helping businesses manage threats most effectively."

Enterprise security requires streamlined operations with a broader perspective, including better context to hunt, detect and contain threats to best manage the business risk introduced by cyber threats. Trend Micro's powerful cybersecurity platform detects malicious activities, with threat intelligence from various sources, helping catch threats faster and improve investigations, analysis, and response times, while eliminating pressure from the SOC team so they can focus on high value activities.

Leveraging Trend Micro's services adds business value by combining premium customer support with such options as:

Early Warning Service scans for early indicators of compromise and then alert customers of potential threats before they cause system harm.
Incident Response provides expert resources in case of a critical, active attack.
Managed Detection and Response monitors alerts and logs across the entire environment, identifying and investigating events and providing ongoing threat expertise.
Trend Micro is committed to supporting customers through their digital transformation journey, supporting internal resources, so customers get the most out of their security platform.

About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Spotlight

The hard facts SMB's need to know about. Ransomware remains one of the growing concerns for small and medium sized businesses, worldwide. Even though it poses such a risk, 50% of businesses admit they feel they are not adequately prepared to protect themselves against a Ransomware attack.

Spotlight

The hard facts SMB's need to know about. Ransomware remains one of the growing concerns for small and medium sized businesses, worldwide. Even though it poses such a risk, 50% of businesses admit they feel they are not adequately prepared to protect themselves against a Ransomware attack.

Related News

DATA SECURITY

QuSecure Partners with DataBridge Sites

DataBridge Sites | June 15, 2022

QuSecure, Inc., a pioneer in post-quantum cybersecurity (PQC), announced today a collaboration with DataBridge Sites, a cutting-edge data center provider that serves off-site business critical IT environments, to demonstrate its Quantum-as-a-Service (QaaS) orchestration platform QuProtect. QuProtect is the industry's first end-to-end post-quantum cybersecurity software-based solution that uses quantum secure channels to safeguard encrypted communications and data with quantum resilience. As an outcome of the collaboration, QuProtect is the first and only PQC solution provided as a live service in a data center. Business, IT, and security executives may quickly learn more about a successful PQC implementation by offering an accessible and tangible example of advanced PQC at datacenters like DataBridge. According to Shor's algorithm, any quantum computer with sufficient power would ultimately overcome all present global encryption. As a result, in order to secure data and communications, all business and government bodies must update to quantum-resistant equipment. Furthermore, data stolen now can be decoded in the future by a quantum computer, thus major enterprises must begin the strategic and information collecting stages of transitioning their cybersecurity to assure quantum resilience. The QuSecure/Databridge collaboration offers a technique for demonstrating quantum resilience. “Our team is very excited to now be home to the QuSecure environment, which is the first PQC software that is currently live in a data center. Our company sees the quantum computing industry as a rapid growth area that can be used widespread through the commercial and federal marketplace. QuSecure’s unique offering will add to our ecosystem of service providers for clients to utilize.” Mike Lozupone, DataBridge Sites director of business development He further added, “DataBridge sees this partnership as being mutually beneficial, and we feel fortunate to work with companies like QuSecure as their business continues to grow. We expect new customers to be driven to our facility to benefit from the combination of QuSecure’s quantum security offerings and the infrastructure scale and physical security provided by DataBridge Sites.” QuProtect delivers quantum-resistant cryptography at any time, on any device. QuProtect employs an end-to-end, quantum-security-as-a-service (QSaaS) architecture that addresses the most vulnerable aspects of the digital ecosystem by combining zero-trust, next-generation post-quantum cryptography, quantum-strength keys, high availability, simple deployment, and active defense into a detailed and coherent cybersecurity suite. The end-to-end method is built around the full data lifecycle, including data storage, communication, and consumption. Skip Sanzeri, QuSecure Founder and COO said that “DataBridge is a world-class organization, and we are pleased to partner with them to provide the first instance of post-quantum cybersecurity available in a data center. The quantum threat, or Q-Day, is coming at us rapidly, and in May the White House published two initiatives to actively build U.S. quantum computing and post-quantum cybersecurity programs. Our partnership with DataBridge is another big step along the way to National Security in line with the White House memos.” QuProtect is the most sophisticated PQC solution in the market, offering quantum-resilience for many of today's key use cases such as network, IoT, edge devices, and satellite communications. QuProtect may be hosted on-premises or in the cloud, giving the most suitable solution to the post-quantum dilemma and addressing today's complicated compliance concerns, such as BYOD and work-from-home regulations. PQC can be implemented across all network devices with minimum interruption to existing systems, defending against present and future quantum assaults that might irrevocably destroy industries and infrastructures in the government and commercial sectors.

Read More

NETWORK THREAT DETECTION

Axonius Integrates with the New, Enhanced Amazon Inspector to Deliver Comprehensive Cyber Asset Attack Surface Management

Axonius | December 06, 2021

Axonius, a leader in cybersecurity asset management, today announced an integration with the new Amazon Inspector, an automated security assessment service. The integration will enable mutual customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. Amazon Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. The solution automatically discovers all running Amazon Elastic Compute Cloud (Amazon EC2) instances and container images residing in Amazon Elastic Container Registry (Amazon ECR), at any scale, and immediately starts assessing them for known vulnerabilities. Because Axonius delivers a complete inventory of assets from many correlated data sources, customers can gain a comprehensive view of their cloud security posture, including vulnerability data found from Amazon Inspector. "Customers are burdened by the increasing number of security tools to protect the sprawl of cloud, physical, and virtual assets in their environments,It's not easy for them to surface which assets are not covered by their security controls that should be, or if they are covered, whether the control is actually working. Customers are exhausted with the highly manual, slow, and error-prone processes that negatively impact their risk mitigation, threat management, and compliance. With Axonius, customers can get a unified view of their assets and dramatically accelerate the process of strengthening security posture across all of their assets.” Mark Daggett, vice president of worldwide channels and alliances, Axonius Comprehensively Track and Assess the Security of AWS Assets: In just a few clicks, the Axonius Query Wizard can identify any AWS assets that have not been assessed with Amazon Inspector. Customers can also easily search for a set of assets based on their last scan time, or segment AWS assets with known vulnerabilities by common vulnerabilities and exposures (CVE) severity, CVE ID, and more. It can also be used to track the Amazon Inspector usage and coverage. Manage Vulnerabilities Within a Broader Context: Beyond simply identifying known vulnerabilities, Axonius delivers correlated data from tools such as endpoint detection and response, privilege access management, and more to help cloud security, DevOps, and security operations teams prioritize which vulnerabilities to remediate first. With an endless backlog of vulnerabilities to manage, this level of context is imperative to helping teams mitigate the vulnerabilities that are more likely to be exploited, or that would have the most impact if exploited. Improve Cloud Compliance Based on Industry Benchmarks: Customers can also ensure that their AWS assets adhere to security best practices, such as the CIS AWS Foundations Benchmark. Using Axonius and Amazon Inspector, cloud security teams can prioritize which assets pose the most risk due to any detected vulnerability or deviation from security standards and best practices. “To be effective, security and DevOps teams need to prioritize vulnerability remediation based on business impact”, said Michael Fuller, director of product management, AWS Security Services. “With the new Amazon Inspector, we’ve dramatically simplified continuous and automated vulnerability assessment for customers across their entire organization, whether they have one AWS account or five thousand. The Axonius integration then brings developers more contextual asset data to help prioritize vulnerability remediation.” About Axonius Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies. Deployed in minutes, the Axonius cyber asset attack surface management (CAASM) solution integrates with hundreds of data sources to give customers the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, automating response actions, and informing business-level strategy. Cited as one of the fastest growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of devices for customers around the world.

Read More

DATA SECURITY

Cynet CISO Challenge for Cybersecurity Leaders Measure Expertise Against their Peers

Cynet | May 11, 2021

Cynet, supplier of the world's first self-ruling XDR stage, today declared the 2021 CISO Challenge for network safety group pioneers to approve their insight and comprehension of genuine security subjects going from essential to cutting edge - including more unstable situations defying associations today. For the 2021 CISO Challenge, Cynet has gathered a gathering of senior CISOs, specialists, and analysts to build up this all-new trial of cutting-edge network safety abilities. The opposition on the site will stay open for about fourteen days, during which time anybody can join and endeavor to address the inquiries, which change from fundamental to progressively refined. There will be a sum of 25 inquiries, with everyone dependent on genuine situations, as opposed to straightforward random data. Questions will cover consistency and guideline, hazard evaluation and the executives' estimations and measurements, danger and weakness the board, just as situations and moral contemplations that most InfoSec pioneers face in the field. The test begins on May fifth at 8 am Eastern Daylight Time (EDT) and closes on May 21st at 11:59 pm (EDT). The site will stay open after the challenge for anybody to test their insight, however not for a prize. It is intended to be a great route for security pioneers to all the more likely comprehend their degree of information and find what holes, assuming any, they have in their order of network safety administration. Since this is a serious occasion, it will permit competitors to perceive how they perform comparative with other people who have acknowledged the demand. The $5,000 thousand prizes will be introduced toward the finish of the challenge. "The CISO Challenge will be a fiery occasion in a cutthroat air, where InfoSec pioneers have the chance to gauge facing the best in the business," said Eyal Gruner, Cynet CEO and Co-Founder. "The challenge goes past the reading material and permits CISOs to do what they specialize in when the pressing factor is on." Cynet is reacting to the business' requirement for more noteworthy cooperation and backing for CISOs at sub-Fortune 2000 associations. The CISO Challenge is intended for Infosecurity pioneers at associations where the dangers are critical, however, assets are restricted and require more elevated levels of mechanization to guarantee fruitful and productive activities. About Cynet Cynet empowers any association to put its network safety on autopilot, smoothing out and mechanizing their whole security tasks while giving upgraded levels of perceivability and assurance, paying little heed to the security group's size, ability or assets and without the requirement for a multi-item security stack. It does as such by locally merging the fundamental security advances expected to give associations exhaustive danger assurance into a solitary, simple to-utilize XDR stage; robotizing the manual cycle of examination and remediation across the climate; and giving a day in and day out proactive MDR administration - checking, examination, on-request investigation, episode reaction and danger chasing - at no extra expense.

Read More