The Evolving Threat Environment – Trend Micro Total Web Threat Protection

Total Page:16

File Type:pdf, Size:1020Kb

The Evolving Threat Environment – Trend Micro Total Web Threat Protection The Evolving Threat Environment – Trend Micro Total Web Threat Protection Veli-Pekka Kusmin Trend Micro Channel Confidential Pre-Sales Engineer March 2008 Threat Environment Evolution to Crimeware Web Based Crimeware Malware Attacks Intelligent Botnets ? Spyware Spam •Multi-Vector •Multi-Component Mass Mailers •Web Polymorphic Complexity Vulnerabilities •Rapid Variants Worm/Outbreaks •Single Instance •Single Target •Regional Attacks •Silent, Hidden •Hard to Clean •Botnet Enabled 20012003 2004 2005 2007 Trend Micro Channel Confidential Mar-2008 2 Copyright 2008 - Trend Micro Inc. BOTNETS! DEFINITIONS • Bot: – Software robot – Allows a system to be controlled remotely without user’s knowledge • Zombie – System controlled by a Bot • Botnet: – Network (group) of zombie systems controlled by the Botherder (Botnet owner) Trend Micro Channel Confidential Mar-2008 3 Copyright 2008 - Trend Micro Inc. Money – Money – Money! The Security Industry struggles! Security companies were founded in a time where hackers and malware writers released their creations in the wild to 1. Have fun 2. Show off 3. Highlight Security issues 4. Combat the Evil Commerce aka Microsoft Now the security industry struggles with organized cybercriminals who WANT TO MAKE MONEY Trend Micro Channel Confidential Mar-2008 4 Copyright 2008 - Trend Micro Inc. Malware for Profit is driving Web Threats SophisticatedHackedBlendedMalicious fast-growing legitimate sequential sponsored malicious websites attacks links websites Trend Micro Channel Confidential Mar-2008 5 Copyright 2008 - Trend Micro Inc. Web Threats - Revisited Uses the Internet to facilitate Cybercrimes 1. Internet Infection Vector (Web, E-Mail, Vulnerabilities...) 2. Host Infection via Malicious Programs 3. Updates and possible propagation via the Internet 4. Hidden Payload delivered without users knowledge or Permission Note: Cycle 3 has to be present for a web threat Trend Micro Channel Confidential Mar-2008 6 Copyright 2008 - Trend Micro Inc. Key Web Threat Examples • Spyware that was installed upon visiting a website • Bot that receives commands via IRC or thru web pages • Adware that was installed after downloading a cool program from the Internet • Trojan that was installed from a JPEG exploit upon visiting a website that was clicked from an email received • Virus that was spread from a program downloaded from the internet • Worm that started blasting copies of itself after disguising itself as a downloadable widget for golfers Trend Micro Channel Confidential Mar-2008 7 Copyright 2008 - Trend Micro Inc. Example: Haxdoor 1. Your boss asks you to develop a corporate travel policy 2. You begin with a Google search on travel policy First result is a .gov site Second result looks like a good choice Oct 7, 2006 Trend Micro Channel Confidential Mar-2008 8 Copyright 2008 - Trend Micro Inc. Example: Haxdoor 1. You click on the second search result 2. You wait…the site appears to be downloading images and content…you wait…and you wait… 3. Finally you close the browser window…you’ll find another site Trend Micro Channel Confidential Mar-2008 9 Copyright 2008 - Trend Micro Inc. Example: Haxdoor Unbeknownst to you… 1. The IFRAME at the top of the page leads you to an index.html file 2. This file includes a script that exploits the MS Internet Explorer (MDAC) Remote Code Execution Exploit (MS06-014) – The original exploit code has been modified to try to bypass AV scanners that detect the original exploit 3. An executable file (win.exe) is downloaded to your system and executed 4. You now have a backdoor with rootkit features—a variant of the notorious family of backdoor rootkits known as Haxdoor ! Trend Micro Channel Confidential Mar-2008 10 Copyright 2008 - Trend Micro Inc. The Major Threat Vectors are Business Critical EXTERNAL THREATS DNS Viruses & Worms Spyware & Adware Mail Spam & Phishing Server End Point MTA Port 25 Internet Port 80 Servers Proxy Applications Storage Off Network INTERNAL THREATS Information Leaks Compliance Vulnerabilities Trend Micro Channel Confidential Mar-2008 11 Copyright 2008 - Trend Micro Inc. Threat landscape is shifting to Web-borne attacks Web Threats: Total Growth Since 2005 1800% 1600% 1564% 1400% 1314% 1200% 1092% 1000% 800% 824% 645% 600% 532% 400% 431% 337% 247% 200% 192% 161% 100% 0% Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2005 2006 2007 Trend Micro Channel Confidential Mar-2008 12 Copyright 2008 - Trend Micro Inc. Total Web Threat Protection: A multi-layered, multi-threat solution Gateway End-Point In-the-Cloud (Web Reputation) Trend Micro Channel Confidential Mar-2008 13 Copyright 2008 - Trend Micro Inc. Total Web Threat Protection: Web reputation is unique! Trend Core Technology Trend Global DNS Network Domain 2 Billion Hits/Day Reputation 99.999% Availability Database Zone Files URL Filtering Security Rating Email Reputation Database DNS Total Web Threat Protection Content= of the Reputation Database: Web SecurityDomain Rating reputation + URLURL Filtering Filtering Malware+ URL blocking (includes scanner feedback!) Malware URL Blocking Spam+ correlation Spam Correlation The most comprehensive reputation database Trend Micro Channel Confidential Mar-2008 14 Copyright 2008 - Trend Micro Inc. Total Web Threat Protection: Web reputation is unique! Trend Core Technology Trend Global DNS Network Domain 2 Billion Hits/Day Reputation 99.999% Availability Database Zone Files URL Filtering Security Rating Email Reputation Database DNS Total Web Threat Protection = RealWeb -SecurityTime Ratingaccess to database: Web+ Reputation is accessible `in -the -cloud ´ URL Filtering High+ Availability servers MalwareThreat URL Blocking information always updated! + Spam Correlation No more risks due to missed updates! Trend Micro Channel Confidential Mar-2008 15 Copyright 2008 - Trend Micro Inc. Why Different from URL Filtering Alone? • URL filtering as a Web security solution is like capturing criminals by sending out “WANTED” posters • Not always up to date Bad • Only known offenders with previous URL convictions are listed • No way to recognize potential new offenders Trend Micro Channel Confidential Mar-2008 16 Copyright 2008 - Trend Micro Inc. Web Reputation is the 21 st Century Solution • Exhaustive databases with full profiles on: – Known offenders – Suspected offenders – Possible future offenders • Constantly updated with input from all over the world • Instantly accessible by any special agent (Trend product) • Protect unknown malware and sequential attacks through in-the- cloud Web security rating service • Web Reputation comprised of 50-plus web site characteristics – Static characteristics – Historic characteristics – Community characteristics – Geographic characteristics – Web Pages/contents characteristics – IP characteristics Trend Micro Channel Confidential Mar-2008 17 Copyright 2008 - Trend Micro Inc. OfficeScan 8: End-point Web Protection Mobile Computers On and Off the Network Web Reputation Domain URL Query Customer Policy Web Threat Protection Web Threat Off Portal Network (Policy Customer A) (Policy Customer B) On Network OfficeScan Gateway HTTP Internet HTTP HTTP End Point Web Threat Protection Trend Micro Channel Confidential Mar-2008 18 Copyright 2008 - Trend Micro Inc. OfficeScan 8: Adjustable Sensitivity Level • Administrators are allowed to set the protection level based on the query results from Web Reputation • Actions can be taken upon violation – Block, pass but report Management Console • Web Reputation overrides URL filtering policies Trend Micro Channel Confidential Mar-2008 19 Copyright 2008 - Trend Micro Inc. OfficeScan 8: What the IT Admin Sees Trend Micro Channel Confidential Mar-2008 20 Copyright 2008 - Trend Micro Inc. OfficeScan 8: What the End-user Sees Browser: Client popup: Trend Micro Channel Confidential Mar-2008 21 Copyright 2008 - Trend Micro Inc. Real-time stats on web reputation http://www.am-i-ok.com Trend Micro Channel Confidential Mar-2008 22 Copyright 2008 - Trend Micro Inc. Total Web Threat Protection - Summary Malware writers are motivated by profit not fame New malware is: − Constantly changing − Aimed to be undetectable − Intended to reap information for profit (botnets) Pattern matching is less and less viable: − Constantly changing malware signatures − High volume of patterns leading to HUGE pattern files − Rate of pattern updates required is untenable You need total web threat protection from Trend Micro Trend Micro Channel Confidential Mar-2008 23 Copyright 2008 - Trend Micro Inc. Total web threat protection Instant Multi-layer, dynamic, Available to all multi-threat Trend Micro Always solution up-to-date Customers protection Trend Micro Channel Confidential Mar-2008 24 Copyright 2008 - Trend Micro Inc. Trend Micro Securing Your Web World Copyright 2008 - Trend Micro Inc. Veli -Pekka Kusmin Pre -Sales Engineer Trend Micro Baltics & Finland Pakkalakuja 7, 3 rd floor FI -01510 Vantaa Finland Telephone +358 9 4730 8300 Direct +358 9 4730 8302 Fax +358 9 4730 8999 Mobile +358 40 596 7181 veli [email protected] http://fi.trendmicro -europe.com Trend Micro Channel Confidential June 2007 26 Copyright 2008 - Trend Micro Inc..
Recommended publications
  • 3/16/2020 Testout Labsim
    3/16/2020 TestOut LabSim 8.4 Web Application Attacks As you study this section, answer the following questions: What are two ways that drive-by download attacks occur? Which countermeasures can be used to eliminate buffer overflow attacks? How can cross-site scripting (XSS) be used to breach the security of a web user? What is the best method for preventing SQL injection attacks? What are some types of header manipulation? Which mitigation practices help to protect internet-based activities from web application attacks? In this section, you will learn to: Prevent cross-site scripting Key terms for this section include the following: Term Definition Drive-By Download An attack where software or malware is downloaded and installed without explicit consent from the user. Typosquatting/URL Hijacking An attack that occurs when an attacker registers domain names that correlate to common typographical errors made by users when trying to access a legitimate website. Buffer Overflow An attack that exploits an operating system or an application that does not properly enforce boundaries for how much and what type of data can be inputted. An attack that exploits a computational operation by a running process that results in a numeric value that exceeds the maximum size of the integer type used to store it in Integer Overflow memory. Cross-Site Scripting (XSS) An attack that injects scripts into webpages. Cross-Site Request Forgery A type of malicious exploit whereby unauthorized commands are transmitted from the user to a website that currently trusts the user by way of authentication, cookies, etc. (CSRF/XSRF) LDAP Injection An attack that uses LDAP statements with arbitrary commands to exploit web-based applications with access to a directory service.
    [Show full text]
  • Lakeridge Health Uses Trend Micro™ Messaging and Web Security for Comprehensive Gateway Web Threat Protection
    Securing Your Web World Lakeridge Health Uses Trend Micro™ Messaging and Web Security for Comprehensive Gateway Web Threat Protection Lakeridge Health (LH) serves a community of more than 500,000 residents within an area of 19,000 square kilometers in Ontario. IT must build in security to protect the mission-critical infrastructure that spans the 25 hospitals, clinics, and administrative sites. A recent escalation in web threats, including web-based phishing and malware as well as the spam emails that deliver links to these threats, called for a combination of Trend Micro messaging and web solutions supported by the Trend Micro Smart Protection Network. ESCALATING WEB THREATS “ Trend Micro messaging and Over the years, LH has tried many web security builds up our alternatives in its search for the best possible security. When web threats began defenses where they can to increase, LH’s user help desk was flooded do the most good—right at with complaints about spyware and other the edge of our network. infections. Unsatisfied with its previously These solutions have proven deployed products and lack of support from the vendor, LH evaluated four other security invaluable for fighting the vendors including Trend Micro. constantly evolving web After identifying Trend Micro as the winner of its security “bake off,” LH deployed multiple threats.” layers of Trend Micro protection. Trend Micro gateway protection blocks web-based threats by introducing messaging and web defense right at the network perimeter: — Peter Hastie, IT Systems Consultant • Trend Micro InterScan™ Messaging Security blocks emails threats, including spam, Lakeridge Health (LH), phishing, and malware, and offers content filtering to enforce compliance and prevent Ontario, Canada data leaks.
    [Show full text]
  • Search Engines and Cyber Hygiene Exercise - 11
    IT WORKSHOP LAB MANUAL Search Engines and Cyber Hygiene Exercise - 11 Aim: Working of search engine, Awareness of various threats on Internet, types of attacks and how to overcome. Installation of antivirus software, configuration of personal firewall and Windows update on computers. 11.1 Introduction Search Engine refers to a huge database of internet resources such as web pages, newsgroups, programs, images etc. It helps to locate information on World Wide Web. User can search for any information by passing query in form of keywords or phrase. It then searches for relevant information in its database and return to the user. Fig. 1. Windows explorer 198 Prepared by: APPROVED BY : Ms.K.NIRMALA Dr.K.RAMANI Mr.V.S.V.S.S.S.M.CHAKRADHAR HOD, IT IT WORKSHOP LAB MANUAL Search Engine Components Generally there are three basic components of a search engine as listed below: 1. Web Crawler 2. Database 3. Search Interfaces Web crawler It is also known as spider or bots. It is a software component that traverses the web to gather information. Database All the information on the web is stored in database. It consists of huge web resources. Search Interfaces This component is an interface between user and the database. It helps the user to search through the database. Search Engine Working Web crawler, database and the search interface are the major component of a search engine that actually makes search engine to work. Search engines make use of Boolean expression AND, OR, NOT to restrict and widen the results of a search. Following are the steps that are performed by the search engine: The search engine looks for the keyword in the index for predefined database instead of going directly to the web to search for the keyword.
    [Show full text]
  • The Four Rules of Complete Web Protection
    The four rules of complete web protection By Chris McCormack, Product Marketing Manager As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money. The four rules of complete web protection Why the web is a scary place Your users are working on the web more than ever, reaping its benefits for increased mobility and easy access to the tools they need. But the web is also a dangerous place. Cybercriminals constantly launch attacks designed to penetrate your digital defenses and steal sensitive data. During the first half of 2011, we saw an average of 19,000 new malicious URLs every day at SophosLabs—that's one every 4.5 seconds. In a recent study of 50 organizations, 64% of those companies were victim to a web-based attack during a four week period.1 And web-based attacks are the second most costly type of attack, topped only by denial of service attacks.2 This type of cybercrime exposes you to enormous risks, including financial losses, regulatory and compliance issues, data breach liabilities, damage to brand and reputation, and loss of customer confidence. In this whitepaper we’ll discuss the types of threats and explain how these four rules can help you build a better web protection strategy.
    [Show full text]
  • ESET THREAT REPORT Q3 2020 | 2 ESET Researchers Reveal That Bugs Similar to Krøøk Affect More Chip Brands Than Previously Thought
    THREAT REPORT Q3 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contents Foreword Welcome to the Q3 2020 issue of the ESET Threat Report! 3 FEATURED STORY As the world braces for a pandemic-ridden winter, COVID-19 appears to be losing steam at least in the cybercrime arena. With coronavirus-related lures played out, crooks seem to 5 NEWS FROM THE LAB have gone “back to basics” in Q3 2020. An area where the effects of the pandemic persist, however, is remote work with its many security challenges. 9 APT GROUP ACTIVITY This is especially true for attacks targeting Remote Desktop Protocol (RDP), which grew throughout all H1. In Q3, RDP attack attempts climbed by a further 37% in terms of unique 13 STATISTICS & TRENDS clients targeted — likely a result of the growing number of poorly secured systems connected to the internet during the pandemic, and possibly other criminals taking inspiration from 14 Top 10 malware detections ransomware gangs in targeting RDP. 15 Downloaders The ransomware scene, closely tracked by ESET specialists, saw a first this quarter — an attack investigated as a homicide after the death of a patient at a ransomware-struck 17 Banking malware hospital. Another surprising twist was the revival of cryptominers, which had been declining for seven consecutive quarters. There was a lot more happening in Q3: Emotet returning 18 Ransomware to the scene, Android banking malware surging, new waves of emails impersonating major delivery and logistics companies…. 20 Cryptominers This quarter’s research findings were equally as rich, with ESET researchers: uncovering 21 Spyware & backdoors more Wi-Fi chips vulnerable to KrØØk-like bugs, exposing Mac malware bundled with a cryptocurrency trading application, discovering CDRThief targeting Linux VoIP softswitches, 22 Exploits and delving into KryptoCibule, a triple threat in regard to cryptocurrencies.
    [Show full text]
  • Rsa® Web Threat Detection Identifying Even the Most Sophisticated Fraud Data Sheet
    DATA SHEET RSA® WEB THREAT DETECTION IDENTIFYING EVEN THE MOST SOPHISTICATED FRAUD DATA SHEET WTD – DETECTING The ever evolving fraud landscape makes it difficult for organizations to identify EVEN THE MOST and respond to fraud until account takeover or other loss occurs. New and SOPHISTICATED increasingly sophisticated ways to perpetrate fraud are constantly being developed FRAUD and deployed, making it extremely difficult to keep pace with the individual fraud attempts targeting an organization’s website. In addition, these malicious activities Web Threat Detection is an incredibly versatile platform are occurring right alongside legitimate web traffic, making it easy for fraudsters that can identify even the most to mask their activities. Adding to this burden is the fact that site users have little sophisticated fraud and other forms of disruptive online behavior. tolerance for any security measure that negatively impacts their online experience. Online frauds that our customers FRAUD DETECTION THROUGH have used WTD to detect include: BEHAVIORAL INTELLIGENCE • Account takeover • Fraudulent money movement Web Threat Detection (WTD) is an fraud detection platform that helps • Password guessing – horizontal organizations identify in real time and respond on the fly to even the most • Password guessing – vertical • Fraudulent account set up sophisticated (and newest) fraud – without discouraging legitimate users from • Credential harvesting using your site. WTD’s Behavioral Intelligence drives a feedback loop that • Credential testing • Mobile and web session hijacking continuously improves threat detection capabilities. • Account used to accept proceeds • Detect: Web Threat Detection includes out of the box fraud detection from fraudulent rewards scheme • Money order fraud – malware capabilities that deliver immediate time to value.
    [Show full text]
  • (IN)SECURE Magazine Contacts
    It’s February and the perfect time for another issue of (IN)SECURE. This time around we bring you the opinions of some of the most important people in the anti-malware industry, a fresh outlook on social engineering, fraud mitigation, security visualization, insider threat and much more. We’ll be attending InfosecWorld in Orlando, Black Hat in Amsterdam and the RSA Conference in San Francisco. In case you want to show us your products or just grab a drink do get in touch. Expect coverage from these events in the April issue. I’m happy to report that since issue 14 was released we’ve had many new subscribers and that clearly means that we’re headed in the right direction. We’re always on the lookout for new material so if you’d like to present yourself to a large audience drop me an e-mail. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2008. www.insecuremag.com Qualys releases QualysGuard PCI 2.0 Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds new capabilities for large corporations to facilitate PCI compliance on a global scale.
    [Show full text]
  • The Malware Book 2016
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/305469492 Handbook of Malware 2016 - A Wikipedia Book Book · July 2016 DOI: 10.13140/RG.2.1.5039.5122 CITATIONS READS 0 13,014 2 authors, including: Reiner Creutzburg Brandenburg University of Applied Sciences 489 PUBLICATIONS 472 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: NDT CE – Assessment of structures || ZfPBau – ZfPStatik View project 14. Nachwuchswissenschaftlerkonferenz Ost- und Mitteldeutscher Fachhochschulen (NWK 14) View project All content following this page was uploaded by Reiner Creutzburg on 20 July 2016. The user has requested enhancement of the downloaded file. Handbook of Malware 2016 A Wikipedia Book By Wikipedians Edited by: Reiner Creutzburg Technische Hochschule Brandenburg Fachbereich Informatik und Medien PF 2132 D-14737 Brandenburg Germany Email: [email protected] Contents 1 Malware - Introduction 1 1.1 Malware .................................................. 1 1.1.1 Purposes ............................................. 1 1.1.2 Proliferation ........................................... 2 1.1.3 Infectious malware: viruses and worms ............................. 3 1.1.4 Concealment: Viruses, trojan horses, rootkits, backdoors and evasion .............. 3 1.1.5 Vulnerability to malware ..................................... 4 1.1.6 Anti-malware strategies ..................................... 5 1.1.7 Grayware ............................................
    [Show full text]
  • The Next Generation of Web Security IDC OPINION
    W H I T E P A P E R W e b S e c u r i t y S a a S : T h e N ext Generation of Web Security Sponsored by: Webroot Software Christian A. Christiansen Brian E. Burke Gerry Pintal April 2008 IDC OPINION The demand for more comprehensive Web security solutions has been fueled by the increasing sophistication of Web-based threats that reach far beyond productivity, bandwidth, and liability issues. The Web has become the new threat vector of choice for hackers and cybercriminals to distribute malware and perpetrate identity theft, financial fraud, and corporate espionage. As most organizations are now reasonably protected against traditional email-borne malware, the Web has become the latest target for hackers to launch various types of malware attacks. As a growing number of Web 2.0 applications make their way into the enterprise, they bring with them even more security concerns and attack vectors. A recent IDC study found that two-thirds of organizations are currently using at least one Web 2.0 application (source: Web 2.0 Applications Are Already in the Enterprise: Key Findings from IDC's AppStats Survey, IDC #208944, October 2007). Organizations of all sizes would agree that effective security requires a multilayered defense. However, the resources required to manage multiple security products can often overwhelm an IT department in the small and medium-sized business (SMB) environment. Many SMB organizations lack the in-house capabilities to keep up with the evolving threat landscape. These factors are driving the growing interest in software as a service (SaaS) security.
    [Show full text]
  • A Multidimensional Analysis of Malicious and Compromised Websites Davide Canali
    A multidimensional analysis of malicious and compromised websites Davide Canali To cite this version: Davide Canali. A multidimensional analysis of malicious and compromised websites. Cryptography and Security [cs.CR]. Télécom ParisTech, 2014. English. NNT : 2014ENST0009. tel-01361433 HAL Id: tel-01361433 https://pastel.archives-ouvertes.fr/tel-01361433 Submitted on 7 Sep 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 2014-ENST-0009 EDITE - ED 130 Doctorat ParisTech T H È S E pour obtenir le grade de docteur délivré par TELECOM ParisTech Spécialité « Informatique et Réseaux » présentée et soutenue publiquement par Davide CANALI le 12 Février 2014 Plusieurs Axes d’Analyse de sites web compromis et malicieux Directeur de thèse : Davide BALZAROTTI Jury M. Levente BUTTYÁN , Professeur, CrySyS Lab, Budapest University of Technology and Economics Rapporteur M. Michael Donald BAILEY , Professeur, Network and Security Research Group, University of Michigan Rapporteur M. Guillaume URVOY-KELLER , Professeur, Laboratoire I3S, Université de Nice Examinateur M. Marc DACIER , Professeur Associé, Département Réseaux et Sécurité, EURECOM Examinateur M. William ROBERTSON , Maitre de Conferences, Systems Security Lab, Northeastern University Examinateur M. Refik MOLVA , Professeur, Département Réseaux et Sécurité, EURECOM Examinateur TELECOM ParisTech école de l’Institut Télécom - membre de ParisTech 2014-ENST-0009 EDITE - ED 130 ParisTech Ph.D.
    [Show full text]
  • PG - TM Antivirus 2021 for Mac - Product Guide V1.0 Document Release Date: October 21, 2020 Team: Consumer Technical Product Marketing
    Trend Micro™ Antivirus 2021 for Mac® Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com Trend Micro™ Antivirus 2021 for Mac® - Product Guide v1.0 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Antivirus for Mac are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2020 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro™ Antivirus 2021 for Mac® - Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Antivirus for Mac. This product guide can be read in conjunction with its companion guides, which can be accessed from the Home Support/Product Support dropdown menu, as well as the individual links below: • Trend Micro™ Security for Windows Product Guide • Trend Micro™ Mobile Security for Android Product Guide • Trend Micro™ Mobile Security for iOS Product Guide • Trend Micro™ Password Manager for Windows and Android Product Guide • Trend Micro™ Password Manager for Mac and iOS Product Guide DOCUMENT PROFILE: Product Name: Trend Micro™ Antivirus 2021 for Mac® (v11) Document Title: Trend Micro™ Antivirus 2021 for Mac® - Product Guide Document Filename: PG - TM Antivirus 2021 for Mac - Product Guide v1.0 Document Release Date: October 21, 2020 Team: Consumer Technical Product Marketing 2 Trend Micro™ Antivirus 2021 for Mac® - Product Guide v1.0 Table of Contents Chapter 1: Introducing Trend Micro™ Antivirus for Mac .............................................................
    [Show full text]
  • Advanced Threat Protection Suite
    cyberhound Advanced Threat Protection Suite CYBERHOUND Advanced Threat Protection for Schools Protecting School Networks Superloop’s CyberHound has invested This platform now sets the benchmark millions of dollars in developing a for K12 security coupled with the unique K12 solution for schools. Every extensive set of additional features aspect of our solution and service has within the Unified Threat Management been designed to meet the specific or Secure Web Gateway solutions. needs of the K12 market. These are all supported and updated by CyberHound has developed one of the CyberHound’s Managed Security Cloud most advanced sets of multi-layered Services - all delivered securely from the ‘defence in depth’ security platforms most secure data centres in Australia. to deliver reliable cybersecurity for schools. 9 Layers of Security Next Generation Firewall Automated Policy Enforcement Network Anomaly Detection DPI Application Control Web Threat Prevention XGEN Reporting Analytics Intrusion Prevention System Virus Malware Detection Appliance Security Superloop CyberHound Managed Security Cloud Services Firewall Virus & Malware Protection Next Generation Firewall delivers Next generation technology identifies application aware firewalling to the new threats with highly accurate enterprise with inbuilt controls for the detection and prevention of malware identification and control of evasive pre-execution. This provides protection technologies such as anonymisers, VPNs, from system and memory based proxies and more. attacks as well as scripting, spear phishing and malicious programs. This mature and evolving core capability of the CyberHound platform boasts Traffic is scanned using the latest virus flexible configuration for network, port, and malware signatures available that application, protocol, time of day, group are updated daily, ensuring the best and custom date range.
    [Show full text]