Trend Micro TDA Intranet Threat Assessment Solution

Source: Internet
Author: User
Tags dns spoofing radar

Bkjia.com integrated message: Yesterday, Wu of the Security Management Center worked overtime until early morning. For him, it has been earlier in these days to go home before. Xiao Wu discovered that the company had the Worm_Down worm. Although he had processed several computers, the infection still did not ease. Therefore, finding the source of the virus infection has become Xiao Wu's top priority. In addition to the difficulty in handling the Worm_Dowm virus, our colleagues frequently responded to a series of application problems such as slow computer operation and slow Internet access, this made Xiao Wu eager to understand what threats caused the abnormal state of the company's network? What other threats are there in the company? For a series of problems, Xiao Wu has no psychological foundation, and does not know when there will be an infection of high-risk events ......

I believe that the experience and feelings of Xiao Wu in the security management center are no stranger to all IT management personnel. To cope with the surge in network threats and a large enterprise network, you can grasp the network security status of the enterprise in real time and effectively, and process the virus source to become the dream of every IT manager. Recently, Trend Micro, the world's Internet Content Security leader, has launched a new concept of threat Detection System (TDS) to address the network security threat detection and security vulnerability monitoring needs of a large number of customers. The key component TDA In the TDS system can perform intelligent analysis on the enterprise's network security environment, and improve the management indicators of the existing anti-virus architecture to greatly improve the security factor of the network and data, to get twice the result with half the effort. In addition, another key component in the TDS is a 7x24 loyal guard, which converts the result analyzed by TDA into detailed handling measures and implements them.

Universal radar TDA provides 360 ° Security Scanning

For enterprise users, TDA is like a comprehensive radar. It not only receives smart analysis from all signals on the network, but also evaluates the security risks of Enterprise businesses, perform a comprehensive analysis on every corner of the enterprise network. This "trend radar" can perform in-depth association analysis on more than one hundred protocols of enterprises based on 2-7 layer network data through the overall analysis of the computer and enterprise network conditions of each terminal, like a magnifier, the system helps you discover known or unknown threats on the network, and build your own warning system based on your network conditions.

The head of the network department of a communication company has a deep understanding of the effect of using TDA: "For us, network security is extremely important for enterprises with large network systems and numerous customer data. Despite the large number of computer terminals and their distribution and dispersion, we must conduct regular security checks on the entire network. This time-consuming and labor-consuming solution utilizes the TDA smart centralized management solution, the detection work is much easier, and the standardized and efficient detection results have been unanimously recognized by us. Because TDA knows more about the root causes of Network Vulnerabilities and threats, our network security department can proactively plan security infrastructure to improve the visibility of the anti-virus system ."

Loyal sentinel cloud security 24x7 guard

Cloud security technology is a cross-era network security technology developed by Trend Micro. Cloud Security uses cloud computing technology to calculate network risks in the Internet, so as to effectively prevent risk intrusion. TDA integrates Trend Micro's industry-leading cloud security technology and combines behavior analysis, association analysis, and traditional virus code comparison technologies to quickly identify known and unknown network threats. TDA can also quickly detect Web attacks, cross-site scripting attacks, and phishing, and identify high-risk nodes and high-risk network communication behaviors, this includes Trojans that leak data to the outside world or receive commands from the botnet control center, which cannot be implemented by traditional security products based on code comparison.

 
Figure 1 TDA Topology

TDA not only effectively prevents external risks, but also prevents internal problems. Abuse of network resources by employees may not only cause network congestion, reduce the company's work efficiency, but also cause greater risks to the company's operations. In this situation, TDA's network content detection technology can be used. TDA can identify violations of security policies and discover network interruptions, high bandwidth consumption, or unauthorized applications and services. These applications and services include instant messaging Bittorrent, Kazaa, eDonkey, MSN, Yahoo Messenger), P2P file sharing, streaming media, and unauthorized services such as SMTP relay and DNS spoofing. TDA provides comprehensive information on daily, weekly, and monthly network threat reports. Enterprise administrators can formulate corresponding enterprise network security plans based on the report information collected by TDA.

 
Table 1

 
Figure 2 bots found on the network after a company applied TDA"

Global Command Center

Each battlefield has a command center. The command center is like a human brain. Although not involved in specific work, it plays a global role. The command center has many important missions, including program formulation, crisis warning, and division of labor. We must fully understand the weaknesses of the organization and actively demand defense measures to ensure that the party wins the war.

In the network security software of the entire enterprise, TDA is such a "command center ". It not only promptly detects security threats in the network environment, but also converts these threats into detailed measures for implementation. TDA can provide such detailed solutions to the entire team like the "command center". Thanks to the Trend Micro security engineer who serves silently in the background. Thanks to Trend Micro's Global Technical Service Center, every user of TDS can enjoy the world's top Network Security Service Assurance in the first time. This group of "command centers" in the network security world, combined with the TDS system composed by TDA, can ensure that enterprises invest more in behind-the-scenes heroes with half the effort.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.