Trend Micro Threat Management Services. Frequently Asked Questions GENERAL QUESTIONS. External FAQ: Trend Micro Threat Management Services

Similar documents
Cisco Advanced Malware Protection for Endpoints

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

User Documentation Web Traffic Security. University of Stavanger

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

WildFire. Preparing for Modern Network Attacks

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Cisco Advanced Malware Protection for Endpoints

The Symantec Approach to Defeating Advanced Threats

The Hillstone and Trend Micro Joint Solution

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Symantec Advanced Threat Protection: Network

Hope is not a strategy. Jérôme Bei

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Fighting Advanced Threats

First Look Trend Micro Deep Discovery Inspector

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Protecting the Infrastructure: Symantec Web Gateway

Requirements When Considering a Next- Generation Firewall

24/7 Visibility into Advanced Malware on Networks and Endpoints

Unified Security, ATP and more

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

IBM Security re-defines enterprise endpoint protection against advanced malware

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Advanced Threat Protection with Dell SecureWorks Security Services

How To Test For Security Protection

Zscaler Cloud Web Gateway Test

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Cisco Cloud Web Security

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Comprehensive Advanced Threat Defense

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Cisco SAFE: A Security Reference Architecture

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Reduce Your Virus Exposure with Active Virus Protection

Information Security Services

Introducing IBM s Advanced Threat Protection Platform

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Content Security: Protect Your Network with Five Must-Haves

Protecting against cyber threats and security breaches

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Security strategies to stay off the Børsen front page

Zak Khan Director, Advanced Cyber Defence

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

End-user Security Analytics Strengthens Protection with ArcSight

REVOLUTIONIZING ADVANCED THREAT PROTECTION

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

Breaking the Cyber Attack Lifecycle

Quick Heal Exchange Protection 4.0

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Keylogging Identity The Defense System TM. Whitepaper. Legal Club of America 7771 W. Oakland Park Blvd. #217 Sunrise, Florida

Concierge SIEM Reporting Overview

The Threat Keeps Growing, Are we Doing it Wrong: David Naudé - Commercial Manager SA

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Unknown threats in Sweden. Study publication August 27, 2014

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

STATE OF NEW YORK PUBLIC SERVICE COMMISSION

IT Security & Compliance. On Time. On Budget. On Demand.

How To Protect Your Network From Attack From A Network Security Threat

Putting Operators at the Centre of

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Cloud Based Secure Web Gateway

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM Security IBM Corporation IBM Corporation

VIGILANCE INTERCEPTION PROTECTION

Combating the Next Generation of Advanced Malware

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY

Bio-inspired cyber security for your enterprise

WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting

Cisco Cyber Threat Defense - Visibility and Network Prevention

Payment Card Industry Data Security Standard

INTRODUCING isheriff CLOUD SECURITY

ENABLING FAST RESPONSES THREAT MONITORING

Intelligent, Scalable Web Security

Stop advanced targeted attacks, identify high risk users and control Insider Threats

IBM Endpoint Manager Product Introduction and Overview

Defending Against Cyber Attacks with SessionLevel Network Security

Whitepaper. DriveLock. Endpoint Security for IGEL Thin-Clients

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Advanced Persistent Threats

Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test

KEY STEPS FOLLOWING A DATA BREACH

Trend Micro Endpoint Comparative Report Performed by AV Test.org

The Four-Step Guide to Understanding Cyber Risk

Netsweeper Whitepaper

Evaluating Microsoft s protection performance and capabilities

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Cloud App Security. Tiberio Molino Sales Engineer

QRadar SIEM and FireEye MPS Integration

Cisco Cloud Security Interoperability with Microsoft Office 365

One Minute in Cyber Security

Transcription:

Trend Micro Management Services Frequently Asked Questions External FAQ: Trend Micro Management Services Last updated: September 10, 2009 GENERAL QUESTIONS Q: What is Management Services? A: For enterprises that need a way to discover and remediate stealthy malware infections such as targeted, data-stealing threats that have evaded detection, Management Services is a network security overwatch service that provides an additional security layer in order to strengthen an organization s existing security infrastructure with threat discovery, containment, and remediation services. Unlike security solutions that are unaware of active data-stealing malware infiltrations within the network, Trend Micro Management Services helps ensure ultimate protection of corporate assets with increased protection, greater visibility, and less management complexity. Q: What security issues does this service address? A: As malware threats become more sophisticated and workplace data leaks grow more prevalent, it is apparent that today s threats are finding new ways to evade detection from the organization s existing security infrastructure. When a malware infection successfully bypasses detection, the security solution(s) that missed the detection don t sound warning alarms that they missed something. As a result, enterprises find it difficult to gain comprehensive, corporate-wide visibility into malware infections lurking within the network. With Management Services, customers gain visibility into their ongoing security posture along with proactive monitoring, early warning, containment, and remediation services. Q: What are the unique benefits of Management Services? A: Management Services provides: Increased Protection with an additional layer of security that closes the existing corporate security gap with a network security overwatch service. With Management Services, organizations have a faster response to infection containment and remediation along with proactive security planning through the Trend Micro Management Advisors. Greater Visibility into the organization s security posture with continuous threat discovery reporting and proactive early warning notifications. Less Management Complexity with Trend Micro s Management Advisors, who offer 20 years of experience in the security industry to help you proactively plan your security. Q: What are the package options for Management Services? Management Services page 1 of 5

A: Trend Micro Management Services is the umbrella brand name for the services line, which consists of three services package offerings. Trend Micro Discovery Services: A network security overwatch service that strengthens an organization s existing security infrastructure by providing 24x7 monitoring and discovery of stealthy threats that have evaded detection. Trend Micro Remediation services: Includes the Discovery Services features as well as adds 24x7 monitoring, proactive early warning notifications, and remediation advisory services. 24x7 remediation is provided by Trend Micro expert Management Advisors working proactively to monitor the threat discovery reports for security breaches. Upon detection of a security event, customers will be notified with an early warning alert and be provided remediation advisory services. Trend Micro Lifecycle Management Services: Encompasses features in the previous packages and extends them to include automated threat remediation and root-cause analysis with Mitigator technology. These services are coupled with security advisory from a dedicated Trend Micro Management Advisor, who offers customized corporate threat security management planning, outbreak drills, infrastructure business impact briefings, and recommendations on best practices. Q: What are the feature differences between the package offerings? Feature Service Discovery Remediation Lifecycle Management Network overwatch threat discovery Network security assessment reports (manual daily / weekly) Proactive threat monitoring & early warning notifications containment and remediation advisory services 24x7 access to Trend Micro Management Advisors Automated threat remediation technology infection root-cause analysis Bi-annual threat outbreak drills for best practice responses Customized Security Management Plan Quarterly Executive Business Review Annual threat landscape updates briefings Q: How will Management Services help me measure my overall security effectiveness? A: Management Services removes the guesswork in measuring an organization s security effectiveness. With Discovery Reports, customers gain insight into what threats are being Management Services page 2 of 5

missed by the existing security infrastructure, including business risk profile, affected assets, infection sources, and threat statistics. With quarterly business reviews, organizations will gain further insight into their security effectiveness with detailed analysis provided by Management Advisors. When a malware infection successfully bypasses detection, the security solution(s) that missed the detection don t sound warning alarms that they missed something. As a result, enterprises find it difficult to gain comprehensive, corporate-wide visibility into malware infections lurking within the network. With Management Services, customers gain visibility into their ongoing security posture along with proactive monitoring, early warning, containment, and remediation services. Q: What are the service level standards for Management Services? A: Customers who choose Trend Micro Lifecycle Management Services can expect a Management Advisor to contact them within two (2) hours of receiving a notification of a high-profile malware alert to follow up on necessary activities and recommendations. Remediation Services customers can expect a follow-up with one (1) business day. Q: What type of organization would need Management Services? A: Management Services is ideal for enterprise organizations with 1,000+ employees who are looking for better oversight, visibility, and management of unknown threat infections. Regardless of your business focus, all industries benefit from TMS helping to ensure ultimate protection of your corporate assets. Q: What if I don t think I have any unknown threats lurking in my network? A: Of course, with a top-rated security infrastructure, it is completely natural to wonder if Management Services can provide enterprises greater protection and additional value. Customers who have taken the next steps to introduce a network security overwatch service with Management Services have been greatly impressed with the discovery of unknown threats, the greater visibility gained, and the proactive security planning that is made possible by this additional insight into your network. The proof of the value can be found in the results. Management Services assessment trials have been performed worldwide on enterprises ranging from 1,000 to 80,000 employees and discovered that: 100% had active malware 56% had information-stealing malware 72% had one or more IRC bots 80% had a malware web download 42% had a network worm Q: Is it possible to trial Management Services? A: Absolutely. Interested and qualified customers can conduct a zero-obligation, 2-week trial of Trend Micro Discovery Services. At the completion of the trial assessment period, customers will receive a customized executive summary report. A sample report can be viewed here. If you would like to begin a trial assessment of Discovery Services, please contact your channel partner or a Trend Micro sales representative. You can obtain Trend Micro contact details at www.trendmicro.com. Q: How do I get pricing information? A: Please contact a channel partner or sales representative in your region for specific pricing. Trend Micro contact information can be found on our website at www.trendmicro.com. Management Services page 3 of 5

Q: Can I purchase Management Services through my preferred channel partner? A: Yes. Management Services can be purchased through your channel partner, provided they have a channel partner contract with Trend Micro. If you would like to find a certified Trend Micro partner, please visit our website at http://channelpartner.trendmicro.com/index.htm. Discovery Services Package Q: How does the underlying technology of Discovery Services work? A: The Discovery Appliance is deployed at the network layer on the core switch, where it is immune to most of the stealth techniques being used by modern malware to evade desktopbased antivirus such as rootkits, disabling antivirus, and host redirection. The appliance therefore provides maximum visibility of outbound traffic from endpoints to the Internet. Capable of analyzing traffic up to the application layer, the Discovery Appliance detects malware as it utilizes the internet for malicious activities such as propagation, downloading additional components and updates, receiving commands, and transferring stolen information. It not only detects malware but also the vectors and mechanisms used by malware to propagate and communicate including malicious emails, web threats, and exploits. Traffic received by the Discovery Appliance is analyzed using a combination of Trend Micro s most powerful scanning engines and technologies: Trend Micro s file scanning engine determines if a file is known or new malware The Trend Micro Web Reputation database identifies malicious URLs The Trend Micro Virus Scanning Engine checks the traffic stream for exploits and network worms If all these checks fail to detect anything malicious, the Trend Micro Network Content Inspection Engine will correlate the different attributes of the network traffic to identify potentially malicious characteristics and behavior. The Discovery Appliance works in collaboration with in-the-cloud servers to perform advanced correlation on information from multiple sessions. By integrating with Trend Micro Smart Protection Network, the most up-to-date threat data is analyzed for superior threat detection. Remediation Services Package Q: Who are the Trend Micro Management Advisors? A: The Remediation Services and Lifecycle Management Services feature additional value provided by the expertise of Trend Micro Management Advisors who will help you manage your threat infections as well as provide proactive security planning. The Management Advisors have a wealth of security expertise based on Trend Micro s 20+ years in the security industry. Q: How can I access my Trend Micro Management Advisor? A: As part of the process to set up your new network security overwatch service, you will be provided contact details for the Management Advisors. This team of professionals is staffed around the globe to provide you 24x7 assistance. Q: How do the threat monitoring and early warning notifications work? A: Trend Micro Remediation Services offers the added benefits of knowing that Trend Micro is helping to monitor your network for infections. With assistance from the security experts Management Services page 4 of 5

at TrendLabs, we are able to comprehensively monitor the wider threat landscape for emerging threats on a 24-hour basis, providing you with early warning notifications as outbreaks occur. Q: How will Trend Micro help me with remediation advisory services? A: Whether you are an existing Trend customer or a new customer strengthening your security with Management Services, you will gain the additional resource support of Management Advisors helping you remediate your network from the infections found through the Discovery Technology. By reviewing the details of the Discovery Services reports that are sent to the Management Advisors, your specialized Advisor can help you contain the outbreak, investigate the root cause (including where it has spread within the network), and assist with remediation. Lifecycle Management Services Package Q: I understand that Lifecycle Management Services introduces a technology that does more automated infection remediation. How does it work? A: With the introduction of revolutionary root-cause analysis based on known malware behavior, the Migitator technology available in the Lifecycle Management Services package helps reduce the complexity of managing malware infection remediation. infection rootcause analysis helps customers understand why the infection happened, ensures that the infection chain is broken, and enables enterprises to make security adjustments based on behaviors leading to infections. The Mitigator s pattern-free cleanup helps ensure faster and more effective remediation with less complexity providing your organization with a more cost-effective way to respond to infections. Q: How does Lifecycle Management Services help me with more proactive security planning? A: The Lifecycle Management Services introduces additional security services provided by Management Advisors, including the creation of an annual threat lifecycle management plan, bi-annual outbreak drills, and recommendations on best practices. The Lifecycle Management Services security services are customized to your specific business environment and include quarterly security infrastructure briefings with your Management Advisor. These quarterly briefings are designed to provide deeper analysis of your threat infections and greater insight into proactive measures that can be taken to close any existing infection entrypoints. Q: What are the outbreak drills? A: When a malware outbreak takes place, organizations can potentially go into a fire drill mode without a clear understanding of who they should notify or how to proceed. Likewise, the process of determining if your customers need to be notified can also be quite extensive and unclear. With the introduction of bi-annual outbreak drills to your security planning, Management Advisors will help your enterprise build a clearly outlined and detailed process to follow when there is an infection. The outbreak process will be customized for your organization, and we will begin the process by drafting a plan with your team. Following the plan creation, we will support you in training your team and corporate sponsors on the process. Following the training, our TMAs will help you conduct live outbreak drills twice a year to measure the effectiveness of the drill as well as help analyze any adjustments that may be necessary. Management Services page 5 of 5