RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Trend Micro Zero Trust Risk Insights

Product
Developers: Trend Micro
Date of the premiere of the system: 2021/09/29
Technology: IB - Security Information and Event Management (SIEM)

Main article: Security Information and Event Management (SIEM)

2021: Release of Zero Trust Model Risk Assessment Solution

On September 29, 2021, Trend Micro Incorporated announced the release of a risk assessment solution under the zero trust model. It passed beta testing in 3,500 organizations and will be an important component of the Trend Micro unified cybersecurity platform.

Trend Micro Zero Trust Risk Insights

According to the company, a comprehensive understanding of risks is the basis for effective prioritization of security and making decisions on automatic access control using the zero trust model. Many suppliers claiming to use the Zero Trust principle lose sight of this component in their own security philosophy. Trend Micro gives customers a complete understanding of the risks, so security groups can make informed decisions and implement effective solutions, and not just change one part of the cybersecurity infrastructure to another.

File:Aquote1.png
Often, digital transformation projects encounter outdated security systems, which become a source of problems and cause a practically unmanaged increase in complexity. The situation is exacerbated by the fact that the threat landscape is becoming more complex, which makes protection strategies just as complex. Information is key, and Trend Micro Zero Trust Risk Insights gives IT directors the right visibility into risk. This, in turn, helps organizations reduce management complexity and increase security.

noted Joel Stradling, Director of Security and Privacy Research in the European Region of research firm IDC
File:Aquote2.png

Based on the Trend Micro cybersecurity platform, the service is designed to continuously assess the risks associated with identity, devices, and cloud applications using telemetry between endpoints, email, cloud, networks, and SaaS applications. Risk information is used to automatically detect, block, or resolve problems before the connection is complete.

File:Aquote1.png
This solution provides additional telemetry and connection transparency across the entire IT environment, allowing you to reliably inform security center teams.

told Wendy Moore, Trend Micro's vice president of product marketing
File:Aquote2.png

File:Aquote1.png
The challenges we face in securing our infrastructure are becoming more complex. Understanding risks and potential vulnerabilities, as well as how attackers will try to use them, is the basis of good cybersecurity. Trend Micro products provide a complete picture of security and enable you to eliminate or prevent threats before they occur.

shared by Chase Renes, system administrator of Vision, an American regional bank
File:Aquote2.png

Trend Micro Zero Trust:

  • Identification risks - Identify hacked accounts and suspicious user activity, such as access to dangerous cloud applications or unusual login activity. This may indicate that the attacker gained access to the user's account. For example, phishing emails sent by an internal user are an obvious indicator of malicious use of an account.
  • Device risks - Identify suspicious processes, unsecured vulnerabilities, attack methods and tactics, and misconfigured applications or operating systems. So, the use of many legitimate tools can be an indicator of the ongoing ransomware attack. Zero Trust Risk Insights provides a range of overlapping services to provide a comprehensive understanding of your organization's security.
  • To prioritize vulnerabilities, Trend Micro's experience in vulnerability research is used, including ideas from the Zero Day Initiative alliance. The solution uses global and local information about threats when trying to exploit vulnerabilities, as well as their severity, to determine which of them should be prevented or corrected first.
  • Visibility of use e-mail is especially important for security groups, since phishing actions can indicate that data user identities have been compromised.
  • Cloud applications that users visit can be unauthorized or have privacy issues. Using the SaaS-based application reputation database, Trend Micro tracks access to dangerous applications.