Cyber Crime
How smart do your security solutions need to be? Pt. 1
Smart security starts with global threat intelligence. Effective threat intelligence is not just the information on what global threats exist, it is the ability to apply the information in real-time within security solutions that are put in place.
In an earlier blog, we gave you a laundry list of security requirements to think about when deploying your cloud environment, don’t let the list daunt you – security solutions with the right smarts can ensure you have all your security angles covered…regardless of where and how you deploy.
Can it act immediately on threats that are out there?
Smart security starts with global threat intelligence. Effective threat intelligence is not just the information on what global threats are out there – it is the ability to apply that information in real-time within the security solutions that you have put in place.
Since 2008 Trend Micro has delivered cloud-based threat intelligence – called the Smart Protection Network. The Smart Protection Network collects massive amounts of data – information on URLs, vulnerabilities, mobile apps, cyber criminals, exploit kits and more. It’s BIG DATA: 1.15 B threat samples, including 10 billion URL queries each and every single day. Plus it’s BIG RESULTs: more than 200 million threats are blocked a day. We believe it’s what you do with the data that matters – the Smart Protection Network powers all our security solutions, providing immediate protection once a threat has been identified.
What about defending against targeted attacks?
I’ve said it before and I’ll say it again – today’s attacks are social, sophisticated and stealth. Attackers use social media to gather information about organizations and then target individuals. Once they have gained access to the organization, they move within the network until valuable data is found and then extract that data for potentially months before it is detected. It’s your data – this makes things personal!
Speaking of personal, I’ll be talking more about smart security and how you really need it in my next post…stay tuned!
Earlier Blog Article:
(http://blog.trendmicro.com/are-you-practicing-the-safest-esx-you-can/)