{"id":13801,"date":"2018-11-12T08:00:01","date_gmt":"2018-11-12T16:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/12\/news-7568\/"},"modified":"2018-11-12T08:00:01","modified_gmt":"2018-11-12T16:00:01","slug":"news-7568","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/11\/12\/news-7568\/","title":{"rendered":"Four Ways Layered Security Will Improve Your Detection and Response"},"content":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Mon, 12 Nov 2018 14:00:53 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>It\u2019s widely understood by cybersecurity professionals today that it\u2019s no longer a case of <em>if<\/em> your organization gets attacked online but <em>when<\/em>. Trend Micro <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">blocked more than 20.4 billion threats<\/a> in the first half of 2018 alone, and the ready availability of \u201cas-a-service\u201d toolkits will continue to make cybercrime a hugely attractive and profitable venture. If attacks are inevitable, it\u2019s more important than ever to improve your detection and response to help minimize their impact. Most analysts agree: <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-03-14-gartner-says-detection-and-response-is-top-security-priority-for-organizations-in-2017\">claiming organizations must move<\/a> away from an unrealistic <em>prevention only<\/em> mind-set.<\/p>\n<p><strong>Under attack<\/strong><\/p>\n<p>There\u2019s no doubt that modern IT organizations are under more pressure than they\u2019ve ever been from malicious outsiders. Trend Micro\u2019s own stats from our <a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-2018-Midyear-Security-Roundup-unseen-threats-imminent-losses.pdf\">latest midyear report<\/a> reveal a 16% rise in reported US breaches from the second half of 2017 to the first six months of this year. Breaches which exposed over one million records saw an even bigger jump over the period, of 67%. That\u2019s not to mention the growing threat from cryptocurrency mining malware, where we saw detections rise 141%. Even ransomware, although slowing down in terms of volume growth (3%), was still detected by our tools over 380,000 times in the first half of 2018.<\/p>\n<p>When faced with these threats, organizations must of course do their best to block them outright. But when that\u2019s not possible there should be tools in place to minimize the length of time key systems and data are exposed for. Current estimates suggest the \u201cdwell time\u201d during which attackers go undetected inside systems stands today at just over 100 days.\u00a0 That\u2019s clearly unacceptable given what\u2019s at stake: major financial losses, reputational damage and possible customer attrition.<\/p>\n<p><strong>The fantastic four<\/strong><\/p>\n<p>So, what\u2019s the answer? Despite what you might hear, there\u2019s no such thing as a silver bullet. Instead, what\u2019s needed is a blend of threat detection techniques, optimized so the right technique is used at the right time to deal with a particular threat.<\/p>\n<p>Here are four specific ways that layered security can improve detection and response:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ol>\n<li><strong>Rapid Automated Sharing: <\/strong>From endpoint to email to network security, Trend Micro\u2019s security products become more than the sum of their parts through strong API-driven integration. Potential threats detected by these tools are automatically submitted to the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/analyzer.html\">Deep Discovery Analyzer<\/a> If rated malicious, the update is automatically shared with all other connected security solutions: no human action required. Through automation you can be protected faster<\/li>\n<li><strong>Reduce false positives: <\/strong>Nothing is 100% effective every time. A layered approach is best.\u00a0 Benign files or URLs which are mistaken for threats and then blocked can serious reduce user productivity. Trend Micro minimizes the chance of this happening by ensuring any potential threat, for example spotted at the endpoint or in an email, can be offloaded to Deep Discovery Analyzer for a definitive answer.\u00a0 This improves protection and keeps employees productive.<\/li>\n<li><strong>Improve visibility: <\/strong>Trend Micro will help correlate threat intelligence allowing the customer to connect the dots between network, endpoint, server and network security products. This provides better visibility to threats as they are detected, and lets you look back at how they spread.<\/li>\n<li><strong>Extend value: <\/strong>Deep Discovery Analyzer supports both Trend Micro and third-party security products. That means you can extend the value of existing security investments and even split the cost across multiple departments.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Modern organizations threaten to be overwhelmed by the complexity of today\u2019s threat landscape, and can struggle to drive value from multiple point solutions. Trend Micro\u2019s answer is <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/technologies\/connected-threat-defense.html\">connected threat defense<\/a>, a layered security approach that gives you a better way to quickly protect, detect, and respond to new threats while simultaneously improving visibility and streamlining investigation across your organization.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/four-ways-layered-security-will-improve-your-detection-and-response\/\">Four Ways Layered Security Will Improve Your Detection and Response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/four-ways-layered-security-will-improve-your-detection-and-response\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Mon, 12 Nov 2018 14:00:53 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/20180913232113171-949-nTZsKHu-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>It\u2019s widely understood by cybersecurity professionals today that it\u2019s no longer a case of if your organization gets attacked online but when. Trend Micro blocked more than 20.4 billion threats in the first half of 2018 alone, and the ready availability of \u201cas-a-service\u201d toolkits will continue to make cybercrime a hugely attractive and profitable venture&#8230;.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/four-ways-layered-security-will-improve-your-detection-and-response\/\">Four Ways Layered Security Will Improve Your Detection and Response<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,20117,19939,20118,714],"class_list":["post-13801","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-deep-discovery-analyzer","tag-detection-and-response","tag-layered-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13801"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13801\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}