Feeds

Trend Micro strengthens hybrid worm defences

Malicious attacks

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

ComputerWire: IT Industry Intelligence

Anti-virus vendor Trend Micro Inc is expanding its software and services portfolio on order to respond to hybrid worms and malicious code attacks such as Nimda. The company currently offers pattern file responses and scanning to enable customers to respond to malicious attacks, but it is now reacting to customer concerns to do more to predict and prevent attacks and clean up the aftermath.

Tokyo, Japan-based Trend Micro is adding virus response products with shielding technologies, designed to slow down known malicious attacks, as well as threat-based scanning to more efficiently clean up malicious and modified code.

The new products are part of the company's Enterprise Protection Strategy to manage the outbreak lifecycle, according to Trend Micro's executive vice president of global product and market development, David Rowe. They form the first of three of four releases from the company as it looks to re-architect its entire product portfolio.

"Nimda entered systems with entirely legitimate means of entry," he said. "The firewall didn't stop it and intrusion detection is too slow. It was a worm and not a virus and it changed files, which made clean-up very difficult. Also there wasn't enough information to prevent an attack. The company has to do something to predict worms and malicious code."

Specifically, that means responding to threats from the first moment that information is received by the company's TrendLabs team to post mortem reporting and performance analysis. The company will update its content scanning products to be able to accept policy updates on the fly, enabling users to block malicious content that exploits legitimate means of entry and to slow down attacks.

The OfficeScan system and desktop scanning products will also be enhanced to enable scanning and code clean-up based on attack profiles, improving the efficiency of code clean-up. OfficeScan will also include improved reporting functionality to track system damage, said Rowe. The company is also introducing Damage Cleanup server for LAN-based desktop cleaning and reporting.

New products available now include new versions of Control Manager, InterScan for Windows and ScanMail for Exchange, which both include integration with the company's eManager content security product. Also new is Outbreak Commander, which will enable the management of outbreaks through the central Control Manager. These products will be followed by new versions for InterScan for Unix, ScanMail for Lotus Notes, OfficeScan and Server Protect in October.

While the company is looking to improve its partnerships and integration with firewall and intrusion detection vendors, Rowe said that Trend Micro intends to stick to its position as a supplier of best of breed anti-virus products. "We're not a firewall company and we're not going to go out and buy a firewall company," he said.

© ComputerWire. All rights reserved.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.