{"id":9988,"date":"2017-10-19T08:00:35","date_gmt":"2017-10-19T16:00:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/19\/news-3761\/"},"modified":"2017-10-19T08:00:35","modified_gmt":"2017-10-19T16:00:35","slug":"news-3761","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/19\/news-3761\/","title":{"rendered":"Trend Micro Top Again for Breach Detection, Says NSS Labs"},"content":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Thu, 19 Oct 2017 15:13:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"154\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-300x154.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-300x154.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-440x226.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-380x195.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web.jpg 612w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of surprise, putting IT teams in a reactive or defensive posture. In this context, you need a provider that\u2019s proven to offer industry leading protection against breaches.<\/p>\n<p>That\u2019s why we\u2019re delighted that Trend Micro Deep Discovery has been Recommended for the fourth year in a row by NSS Labs Breach Detection Systems report \u2013 scoring an unbeatable 100% detection rate.<\/p>\n<p><strong>Breaches galore<\/strong><\/p>\n<p>You don\u2019t have to go back far to see the damage that data breaches can inflict on organizations and their customers. Just take a look at the fallout from the Equifax incident, which has exposed highly sensitive data on 145.5 million Americans. Already the <a href=\"https:\/\/www.engadget.com\/2017\/10\/13\/irs-freezes-equifax-fraud-prevention-contract\/\">firm is losing contracts<\/a> following the breach. Industry fines, legal costs, share price losses, possible customer attrition and brand damage are also common following such incidents \u2013 raising the stakes for cybersecurity.<\/p>\n<p>Many modern attacks are covert, often combining spearphishing techniques and malware designed to fly under the radar of traditional defenses. There are plenty of weaknesses for attackers to exploit: in <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\">the first six months of 2017 alone<\/a> 382 new vulnerabilities were publicly disclosed via our Zero Day Initiative. Given the challenges in defending against such attacks, it\u2019s perhaps no surprise that over the past 12 years the <a href=\"http:\/\/www.idtheftcenter.org\/Data-Breaches\/data-breaches\">Identity Theft Resource Center has recorded<\/a> thousands of breaches exposing over a billion records in the US.<\/p>\n<p><strong>The best you can get<\/strong><\/p>\n<p>That\u2019s where\u00a0Trend Micro\u2122 Deep Discovery\u2122 comes in. Powered by XGen\u2122 security, it\u2019s designed to help organizations detect, analyze, and respond to advanced malware including ransomware and targeted attacks. Deep Discovery features a range of layered cross-generational threat protection techniques including custom sandboxing, endpoint activity tracking, anti-spearphishing email analysis, and comprehensive network scanning. This multi-layered approach is what we call XGen\u2122: optimized to apply the right technology at the right time, resulting in the highest detection rate possible.<\/p>\n<p>NSS Labs proves the power and effectiveness of this layered approach with the 2017 Breach Prevention Systems report. In the category of evasions \u2013 a key way to compare solutions on the market \u2013 we scored a perfect 100%, whereas five of the seven companies appraised struggled. How did Deep Discovery do so well in the detections of evasions? Custom sandboxing. Custom sandboxing was the key driver behind our anti-evasion detection. Because the custom sandbox can mimic the exact corporate desktop the threat has no idea it is in a sandbox tricking the threat into executing in the sandbox environment allowing Deep Discovery to fully analyse the threat.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-540020\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM.jpg\" alt=\"\" width=\"600\" height=\"597\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM.jpg 762w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM-300x298.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM-640x637.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM-440x438.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/SVM-380x378.jpg 380w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Our Connected Threat Defense approach linking up protection at the endpoint, datacenter and network layers minimizes security gaps and ensures there\u2019s nowhere for the bad guys to hide. That represents peace of mind in an increasingly hostile online world where the cards can often seem stacked against the IT security team. With TCO dropping significantly from $240 per protected Mbps to under $40 in 2017, there are now a whole host of reasons why organizations should take a fresh look at Deep Discovery.<\/p>\n<p>For more details and to download the report, please click <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/campaigns\/nss-bds.html?cm_mmc=XGen-_-NetworkDefense-_-Blog-_-Simply-Security:Perfect-Score\">here<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/trend-micro-top-breach-detection-says-nss-labs\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Thu, 19 Oct 2017 15:13:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"154\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-300x154.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-300x154.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-440x226.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web-380x195.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/NSS_Labs_BDS_Badge_2017_horz_web.jpg 612w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,10384,714,10418],"class_list":["post-9988","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-network","tag-security","tag-trend-spotlight"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9988"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9988\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9988"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}