Anti-malware and Advanced Threat Protection

Protect against the known, unknown, and undisclosed

The optimal blend of protection techniques

Today’s sophisticated threats require a new approach to protecting users, networks, and data centers. This approach needs to use a blend of cross generational threat protection techniques that uses the right technique at the right time. Trend Micro XGen™ security provides that optimal blend of techniques.

Efficient, known
threat detection

malware protection

Even though a threat is known, it doesn’t mean it’s less dangerous—it just means there is protection that already exists. This can come in the way of static analysis, signatures, or file and web databases. Known threat detection is considered the first phase of protection, and extremely critical. With a large number of attacks taking place on systems with unpatched software, known malware that is over 10 years old is still effectively being used today.
 

Detecting unknown
threats

Today, many advanced threats are designed specifically to bypass traditional security defenses and remain hidden while stealing your corporate data or encrypting devices for ransom. Non-signature based detection methods are designed to detect these kinds of attacks. These XGen™ security techniques include, but are not limited to, custom sandboxing, behavioral analysis, intrusion and exploit prevention, investigation and forensics, memory inspection, prevalence/maturity checks, and application control.

The importance of undisclosed vulnerabilities

The grey area between known and unknown is called undisclosed. These are software vulnerabilities that are only known by a small set of people (usually security researcher, security vendor, and impacted software vendor). Like an unknown hole in a fence, these vulnerabilities, if left unpatched, are potential targets for attacks. We offer ongoing threat prevention against emerging vulnerabilities through our Digital Vaccine service, often months before the vulnerability can be exploited by a threat.

Protect your users

 

Maximum protection for your users and their data, across endpoint, email, web and SaaS applications.

Protect your network

 

Detect and block network-based threats.

Protect servers
and cloud-based
workloads

Optimized protection for physical, virtual, and cloud-based servers.