APRIL 25, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Heartbroken by Heartbleed

Security for Home Users
Spring Cleaning on Social Media

Security for Business
Why You Need Application Control



Security for Business

Why You Need Application Control

One of the worst things any company can face is a data breach. It’s actually one of the most damaging things that can happen to any business, regardless of size because not only does it leak company secrets and trademark information out but also damage its reputation.”



One of the worst things any company can face is a data breach. It’s actually one of the most damaging things that can happen to any business, regardless of size. It doesn’t only leak company secrets and trademark information out but also damage its reputation. No business is immune to data breaches. The bigger the target, the harder cybercriminals will try to get to it. We’ve seen enterprise giants fall prey to the most massive breaches of all time.

But there are ways to prevent such attacks, one of which is through application control. How does application control help? Data breaches heavily rely on finding bugs in certain software to succeed. While keeping software and devices patched and updated is a good practice, some vulnerabilities could long be exploited as part of attacks, especially targeted ones, before they’re discovered, rendering the practice moot when it comes to zero-day exploit attacks.

Application control stops data breaches by preventing vulnerable software from being installed on endpoints connected to an enterprise network. It also prevents the unauthorized installation of any malicious, unwanted, or nontrustworthy applications by endpoint users, protecting enterprises from data breaches that can come from within.

With certain widely used enterprise software like Windows® XP no longer being supported with vendor patches and fixes, companies need to look at alternative ways of hardening their networks against data breaches. Application control hardens endpoints by completely removing weak links rather than waiting for security patches and updates from software vendors.

For more information on how application control can benefit your company, take a look at “Empowering Endpoint Security: Application Control.”

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: