Trend Micro puts zero trust theory into practice with latest launch
Trend Micro has announced the full exit of its risk analysis capability following beta testing of 3,500 companies.
The enterprise’s zero-trust risk assessment solution, Zero Trust Risk Insights, is now a key part of the enterprise’s unified cybersecurity platform.
Trend Micro says the company strives to give customers a full understanding of their risks so that security teams can make informed decisions and implement effective solutions, rather than swapping out part of their infrastructure. cybersecurity against another.
Built on Trend Micro’s comprehensive cybersecurity platform, the service is designed to continuously assess the risk of cloud identities, devices and applications using telemetry across endpoints, email, cloud , networks and SaaS applications.
This risk overview is used to automatically detect, block, or resolve issues before a connection is terminated. Customers also benefit from continuous assessment of security posture and comprehensive information without the need for additional apps or agents.
Trend Micro CTO, A / NZ, Mick McCluney, says, âThis new solution adds additional telemetry and visibility of connections across the entire IT environment to truly inform SOC teams.
âThe risk and security of users, devices and applications can be easily seen, issues prioritized in a way unique to the capabilities of the Trend Micros platform. This is a real theory of zero trust put into product form. “
According to the company, Trend Micro’s Zero Trust solution focuses on:
Identity risks: Identify compromised user accounts and suspicious user activity, such as accessing risky cloud applications or unusual login activity. These can indicate that a user account is being abused by an attacker. For example, phishing emails sent by an internal user are a notable indicator of malicious account abuse.
Risks associated with the device: Identify suspicious processes, unpatched vulnerabilities, attack techniques and tactics, and misconfigured applications or operating systems. For example, the use of many legitimate tools can be an indicator of an ongoing ransomware attack.
Overall, Zero Trust Risk Insights provides overlapping services to ensure a holistic understanding of organizational security. Vulnerability prioritization takes advantage of Trend Micro’s vulnerability research, including information from the Zero Day Initiative.
It uses global and local threat intelligence on attempted exploitation as well as vulnerability severity to prioritize critical vulnerabilities to apply a prevention rule or patch.
Visibility into email usage is especially important for security teams, as phishing activity could indicate that user identities have been compromised, the company says.
Cloud applications visited by users may not be authorized or have data sovereignty and privacy issues. Using a SaaS-based application reputation database, Trend Micro tracks access to risky applications.
According to Trend Micro, as the evolving threat landscape continues to garner attention amid high-profile security incidents, decision-makers in enterprises around the world are beginning to realize the benefits of a large zero-trust solution.
Joel Stradling, IDC’s research director for security and privacy in Europe, said: âSome of the downsides of digital transformation projects are legacy security systems causing problems and an almost unmanageable increase in complexity.
âTo make this worse, the threat landscape is increasingly sophisticated, which makes defense strategies just as complex.
âInformation is king, and Trend Micro’s Zero Trust Risk Insights gives CISOs greater visibility into an organization’s security risks, which helps organizations eliminate multiple layers of management complexity and strengthen their security.