{"id":6532,"date":"2017-02-07T06:00:33","date_gmt":"2017-02-07T14:00:33","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/07\/news-356\/"},"modified":"2017-02-07T06:00:33","modified_gmt":"2017-02-07T14:00:33","slug":"news-356","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/07\/news-356\/","title":{"rendered":"Bridging the Generational Gap with Trend Micro XGen\u2122 Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-768x513.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-1024x684.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-900x601.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-380x254.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE.jpg 1050w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>We\u2019ve entered a new era of cyber threats. It\u2019s like no other that\u2019s gone before, in that CISOs must battle not only the huge volume of \u201cold threats\u201d out there but also a growing array of stealthier new attacks designed to circumvent traditional tools. These could include certain types of targeted attacks, ransomware, zero-day threats, and even business process compromise. And they have to deal with a much larger attack surface created by cloud, mobility, and riskier user behavior. It\u2019s no surprise that <a href=\"http:\/\/www.idtheftcenter.org\/2016databreaches.html\">2016 hit a record number of recorded data breaches in the US<\/a> \u2013 over 1,000. And many more are likely to have gone as-yet unnoticed.<\/p>\n<p>That\u2019s why, in this new era, organizations need to bridge the gap between an old and new generation of threats, IT architectures, and yes, even user behaviors. That\u2019s just what <a href=\"http:\/\/www.trendmicro.com\/us\/business\/xgen\/index.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_-\/xgen\/index.html-_-vanity\">Trend Micro XGen<\/a>\u2122 security was designed to do.<\/p>\n<p><strong>Known and unknown<\/strong><\/p>\n<p>IT security teams have a problem. On the one hand the volume of known bad threats knocking at the door has reached epidemic proportions. Trend Micro blocked 80 billion such attacks in 2016 alone. But that\u2019s just the start. Thanks to the growing availability of tools and knowledge on the dark web, we\u2019re also seeing a surge in new and unique threats \u2013 something like 500,000 every day. These require more advanced techniques to spot and block.<\/p>\n<p>In our 2017 predictions report, <a href=\"http:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2017\"><em>The Next Tier<\/em><\/a>, we anticipate that the next generation of targeted attacks will be developed to feature new and unexpected techniques designed to fool security products. These might include advanced sandbox detection\/evasion and VM escapes. Complicating matters is that these threats are targeted at every part of your IT infrastructure, from endpoints to networks and servers \u2013 all the way out to the cloud.<\/p>\n<p>Deploying advanced security to all parts of the organization can be challenging because it requires different operational skills and resources. Many organizations do so with point products, which multiply the IT workload, impair visibility and performance and can leave gaps for the threats to sneak through.<\/p>\n<p><strong>The XGen difference: cross-generational<\/strong><\/p>\n<p>Many security vendors claim to have a single silver bullet to tackle this new era of cyber threats. I wish that were true, but it simply isn\u2019t that straightforward. Machine learning alone is not the answer. While it can be a powerful way to predict whether an unknown file is malicious, it is also more computationally intensive with a higher rate of false positives, so is not the most efficient or effective way tackle the massive volume of known bad threats. Instead, there needs to be a \u2018cross-generational\u2019 approach that knows how to use the right threat defense technique at the right time to ensure maximum protection with the utmost efficiency. XGen\u2122 security does exactly that, including \u2013 but not limited to \u2013 the following:<\/p>\n<p><strong>Antimalware <\/strong>and<strong> Content Filtering <\/strong>to quickly detect and block the massive number of known bad files, URLs and spam.<\/p>\n<p><strong>Behavioral Analysis<\/strong> including memory inspection, suspicious action monitoring and browser exploit protection examines an unknown item and its behavior at runtime to determine if it\u2019s suspicious.<br \/> <strong><br \/> <\/strong><strong>High-Fidelity Machine Learning<\/strong> uses mathematical algorithms to predict maliciousness, with the ability to analyze unknown files before execution and during runtime for greater accuracy,. It also features \u201cnoise cancellation\u201d capabilities to reduce false positives.<\/p>\n<p><strong>Sandbox Analysis<\/strong> enables on-the-fly analysis of unknown threats \u2013 allowing them to run in a safe environment to examine their behaviors.<\/p>\n<p><strong>Intrusion Prevention<\/strong> shields known vulnerabilities against unknown, zero-day exploits.<\/p>\n<p><strong>Application Control<\/strong> allows only known good applications to install or run.<\/p>\n<p><strong>Integrity Monitoring<\/strong> flags any suspicious system changes.<\/p>\n<p><strong>Response and Containment<\/strong> enables investigative forensics, quarantine of suspicious items and automated security updates.<\/p>\n<p>The Trend Micro <a href=\"http:\/\/cloudsecurity.trendmicro.com\/us\/technology-innovation\/our-technology\/smart-protection-network\/\">Smart Protection Network<\/a> \u2013 our cloud-based global threat intelligence which blocks 250 million threat each day \u2013 fuels these techniques to ensure customers are protected against the latest threat findings.<\/p>\n<p>What\u2019s more, the XGen\u2122 approach to security also eases the burden on IT security. Threat defense techniques are designed to fit each layer of security\u2014user environments, networks and hybrid clouds\u2014making it faster and easier to deploy and manage. And, the solutions seamlessly share threat intelligence, enabling automated security updates. Everything is also nicely connected through a central console that offers visibility across security layers, speeding time to response.<\/p>\n<p>As this generation quickly blurs into the next\u2014with hackers continuing to add new types of threats to the volume of existing ones, and with the number of points to protect growing every day \u2013 IT security leaders must adopt a cross-generational approach to security.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/bridging-generational-gap-trend-micro-xgen-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-768x513.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-1024x684.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-900x601.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE-380x254.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_74054191_XLARGE.jpg 1050w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>We\u2019ve entered a new era of cyber threats. It\u2019s like no other that\u2019s gone before, in that CISOs must battle not only the huge volume of \u201cold threats\u201d out there but also a growing array of stealthier new attacks designed to circumvent traditional tools. These could include certain types of targeted attacks, ransomware, zero-day threats,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-6532","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6532"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6532\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6532"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}