Trend Micro Secure Cloud security 6 secrets

Source: Internet
Author: User



Bkjia.com Comprehensive Report]

Web reputation Service

With one of the world's largest domain reputation databases, Trend Micro's Web reputation Service specifies credit scores based on factors such as website pages, historical location changes, and signs of suspicious activities discovered by malware behavior analysis, to track the credibility of the web page. This technology will then be used to continue scanning websites and prevent users from accessing infected websites. To improve accuracy and reduce false positive rate, Trend Micro Web reputation Service specifies a credit score for a website's specific webpage or link, rather than classifying or blocking the entire website, generally, only a portion of valid websites are under attack, and their credibility can change over time.

By comparing credit scores, you can know the potential risk level of a website. When a user accesses a website with potential risks, the user can receive a system reminder or block it in time to help the user quickly confirm the security of the target website. The Web reputation service can prevent malicious program sources. The zero-day attack prevention is based on the credibility of the website, rather than the actual content. Therefore, it can effectively prevent initial downloads of malware and users can obtain protection capabilities before they enter the network.

To help defend against ever-changing Web attacks, Trend Micro provides your innovative Web threat defense tool, which allows you to download and use Web threat protection tools for free, whether or not you are a Trend Micro enterprise or individual user. The tool built-in Web reputation Service (WRS), after installation can intercept malicious links, effective and complete against zero time difference Web attacks, while the tool also provides and BOT program monitoring functions: http://www.trendmicro.com.cn/sp/smb/wpao/download

Email credit service

Trend Micro's email reputation Service Checks IP addresses based on known spam source reputation databases and verifies IP addresses using dynamic services that can evaluate the reputation of email senders in real time. The credit rating is refined by constantly analyzing the IP address's "behavior", "activity scope", and previous history. Malicious email is intercepted in the cloud according to the sender's IP address, so as to prevent web threats such as botnets from reaching the network or users' computers.

File reputation Service

Currently, Trend Micro cloud security will include the file reputation service technology, which can check the credibility of each file at the endpoint, server, or gateway. The basis for the check includes a list of known benign files and a list of known malignant files, which are now known as anti-virus signatures. High-performance content delivery networks and local buffer servers will ensure that latency is minimized during the check process. Because malicious information is stored in the cloud, it can immediately reach all users on the network. In addition, this method reduces the consumption of the endpoint memory and system compared with the download of the traditional anti-virus pattern file that occupies the endpoint space.

Behavior Association Analysis Technology

Trend Micro cloud security uses the "correlation technology" of Behavior Analysis to comprehensively link threat activities to determine whether they are malicious. A single Web threat activity does not seem to have any harm, but if multiple activities are carried out at the same time, it may cause malicious results. Therefore, it is necessary to determine whether there are actual threats from a heuristic perspective, and check the relationship between different components with potential threats. By associating different parts of a threat and constantly updating its threat database, Trend Micro is able to respond in real time with outstanding advantages, provides timely and automatic protection against email and Web threats.

Automatic Feedback Mechanism

Another important component of Trend Micro cloud security is the automatic feedback mechanism, which enables uninterrupted communication between Trend Micro products and the company's all-weather Threat Research Centers and technologies in a two-way update stream mode. By checking the routing credibility of a single customer to identify various new threats, Trend Micro's extensive global automatic feedback mechanism features much like the "neighborhood supervision" approach adopted by many communities today, real-Time Detection and timely "common intelligence" protection will help to establish a comprehensive and up-to-date threat index. Each new threat detected by a customer's regular reputation check automatically updates all threat databases of Trend Micro around the world to prevent future customers from encountering discovered threats.

Because the threat information will be collected based on the credibility of the Communication source rather than the specific communication content, there is no delay problem, and the privacy of the customer's personal or commercial information is also protected.

Threat information Summary

Researchers from the United States, the Philippines, Japan, France, Germany and China will supplement Trend Micro's feedback and submissions. At Trend Micro Anti-Virus R & D and Technical Support Center TrendLabs, employees in various languages will provide real-time response, 24/7 around the clock threat monitoring and attack defense to detect, prevent and clear attacks.

Trend Micro integrates various technologies and  methods-including Honeypot, web crawler, customer and partner content submission, feedback loop, and TrendLabs Threat Research-Trend Micro is able to get intelligence on the latest threats. Threat data is analyzed through the malware database in Trend Micro cloud security and the TrendLabs research, service, and support center.

Related Articles]

  • Cloud security technology topics: cloud security
  • Trend Micro Secure Cloud security network protection solution White Paper





Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.