Trend Micro becomes the first to offer detection and response capabilities integrated across email, network, endpoint, server and cloud workloads. This is designed to give enterprises broader visibility of a risk posture while connecting minor events from different security silos to detect more complex attacks that otherwise remain unnoticed.
ESG research shows that 55% of organizations use more than 25 individual cybersecurity technologies; despite this, attacks are increasing and bypassing existing controls. IT Security teams receive more than 10,000 security alerts daily, according to a 2018 SC Media Survey. The universal level of pain and inefficiency this causes is clear. According to the Verizon 2018 Data Breach Investigations Report, “the mean time to identify a breach increased to 197 days and containing a breach increased to 69 days,” leaving criminals nearly 9 months hiding in an organization and causing damage.
Connecting detections, telemetry, process data, and network metadata across email, network, endpoint and cloud workloads minimizes manual work and quickly correlates events that humans are unable to process given the onslaught of daily alerts across individual product silos. Trend Micro’s global threat intelligence adds further relevance and context around event data and is enhanced by specific detection rules from the company’s security experts that target the highest priority threats.
In Trend Micro’s XDR solution, the “X” refers to the most extensive sets of data from more protection points, which is critical to find hidden threats. The resulting detections are more accurate, are generated faster and provide better context than ever before. Having one version of the security truth and a standardized schema for interpreting alerts also makes life easier for stretched IT security teams.
The comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise, making faster connections to identify and stop attacks. In 2019, Trend Micro has identified a high number of attacks that utilized lateral movement, with most bypassing the endpoint altogether which illustrates the need for centralized visibility.