Feeds

Trend Micro strengthens hybrid worm defences

Malicious attacks

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

ComputerWire: IT Industry Intelligence

Anti-virus vendor Trend Micro Inc is expanding its software and services portfolio on order to respond to hybrid worms and malicious code attacks such as Nimda. The company currently offers pattern file responses and scanning to enable customers to respond to malicious attacks, but it is now reacting to customer concerns to do more to predict and prevent attacks and clean up the aftermath.

Tokyo, Japan-based Trend Micro is adding virus response products with shielding technologies, designed to slow down known malicious attacks, as well as threat-based scanning to more efficiently clean up malicious and modified code.

The new products are part of the company's Enterprise Protection Strategy to manage the outbreak lifecycle, according to Trend Micro's executive vice president of global product and market development, David Rowe. They form the first of three of four releases from the company as it looks to re-architect its entire product portfolio.

"Nimda entered systems with entirely legitimate means of entry," he said. "The firewall didn't stop it and intrusion detection is too slow. It was a worm and not a virus and it changed files, which made clean-up very difficult. Also there wasn't enough information to prevent an attack. The company has to do something to predict worms and malicious code."

Specifically, that means responding to threats from the first moment that information is received by the company's TrendLabs team to post mortem reporting and performance analysis. The company will update its content scanning products to be able to accept policy updates on the fly, enabling users to block malicious content that exploits legitimate means of entry and to slow down attacks.

The OfficeScan system and desktop scanning products will also be enhanced to enable scanning and code clean-up based on attack profiles, improving the efficiency of code clean-up. OfficeScan will also include improved reporting functionality to track system damage, said Rowe. The company is also introducing Damage Cleanup server for LAN-based desktop cleaning and reporting.

New products available now include new versions of Control Manager, InterScan for Windows and ScanMail for Exchange, which both include integration with the company's eManager content security product. Also new is Outbreak Commander, which will enable the management of outbreaks through the central Control Manager. These products will be followed by new versions for InterScan for Unix, ScanMail for Lotus Notes, OfficeScan and Server Protect in October.

While the company is looking to improve its partnerships and integration with firewall and intrusion detection vendors, Rowe said that Trend Micro intends to stick to its position as a supplier of best of breed anti-virus products. "We're not a firewall company and we're not going to go out and buy a firewall company," he said.

© ComputerWire. All rights reserved.

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.