The Attacker finally in your sights- Trend Micro: Exposing the Invisible Enemy

Custom Defense enables customers to Detect, Analyse, Adapt and Respond to attacks 


Marlow, UK – 8th October 2012 --Trend Micro today announced “Custom Defense” – a comprehensive bundle of our latest technologies armed with advanced threat detection and analysis to combat the growing menace of targeted attacks.

Anchored by that latest version of Trend Micro’s very own Deep Discovery, Custom Defense features improved messaging and attack response tools, as well as an enhanced information portal for an even more comprehensive display of the latest threats.

“We have enhanced our Deep Discovery attack detection and analysis solution and now extended our protection solutions to better detect and adapt to targeted attacks”, said Andy Dancer, CTO for EMEA at Trend Micro. “By closing the detection-response loop and tailoring the focus to each specific customer environment, we’ve created a true defense against the attacks happening to organisations today.”

Targeted attacks, also often referred to as Advanced Persistent Threats (APTs), are some of the most insidious and persistent threats facing organisations today. No longer the preserve of state-sponsored attackers, these attacks are a genuine threat to any company’s IP and specifically designed to lay hidden inside the corporate network once infiltrated, typically feeding information back to the attacker over months or even years.

Trend Micro’s Custom Defense approach is to detect, analyse, adapt and rapidly respond. Here’s what’s new to help us do this:

Deep Discovery
Our real-time threat detection and analysis tool is the cornerstone of Custom Defense and now includes:

Deep Discovery Advisor
This new solution provides advanced threat detection and sandboxing, network-wide log collection, and deep threat analysis in a unified intelligence platform.

The Trend Micro Smart Protection Network cloud security infrastructure can rapidly and accurately identify new threats, delivering global threat intelligence to secure data wherever it resides. We look in more places for threat data, and use big data analytics to deliver actionable threat intelligence across mobile, physical, virtual and cloud environments.

The Threat Connect information portal has been enhanced and expanded to provide the full breadth of relevant Trend Micro intelligence on a specific threat, boosting assessment, containment and remediation efforts. This information includes:

Messaging Security
ScanMail™Suite for Microsoft® Exchange™, ScanMail™ Suite for IBM® Lotus® Domino™, and Trend Micro InterScan Messaging Security feature a new exploit detection engine that identifies email attachments which contain exploits for vulnerabilities in major Adobe, Microsoft Office and other programs and blocks or quarantines them.

Attack Response Tools
New tools developed by Trend Micro’s CoreTech Engineering Team enable service partners and Trend Micro Tech Support Engineers to identify and remediate targeted attacks - specifically advanced malware in mail stores, recorded network traffic and log files. Already employed by Trend Micro engineers for incident response and forensics, these tools will now be available to Trend Micro partners.

Other Trend Micro Enterprise Security Products
All Trend Micro protection products will integrate with the adaptive updates of Deep Discovery. Additional product integrations with the Deep Discovery Advisor sandbox analyser are planned and will be announced at a later date.

Find out more about targeted attacks
Rik Ferguson, Director of security research & communications talks through targeted attacks [video]

About Trend Micro
Trend Micro Incorporated (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, Trend Micro™ Smart Protection Network™ provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

All of solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe.

For more information, visit Or follow our news on Twitter at @TrendMicroUK.