Trend Micro Inc. is a global security software company founded in California, USA. It is headquartered in Tokyo, Japan and markets Trend Micro Internet Security, Trend Micro Deep Security, Trend Micro Worry-Free Business Security, OfficeScan, and other related security products and services. Eva Chen has been CEO for the company since 2005 succeeding Steve Chang, who is now Chairman. In September 2014, Trend Micro announced a three-year agreement with INTERPOL to help support the international police organization and its 190 member countries with additional knowledge, resources and tactics to decrease cybercrime on a global scale.Trend Micro competes in the threat and breach detection industry against FireEye, Sourcefire and Palo Alto. TrendLabs Trend Micro creates cloud security solutions for customers of VMware, AWS, Microsoft Azure and Microsoft Office 365. In the antivirus industry Trend Micro competes against Avira, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.Trend Micro is also a certificate authority and member of the CA/Browser Forum. Wikipedia.
Trend Micro | Date: 2016-10-31
A load distribution for data units received by a particular packet inspection device that is part of a collection of packet inspection devices is determined, where the packet inspection devices in the collection are to examine content of corresponding received data units. For corresponding data units received by the particular packet inspection device, the determined load distribution favors keeping the corresponding data units at the particular packet inspection device. Based on metric information regarding utilization of at least the particular packet inspection device, the load distribution is dynamically modified.
Trend Micro | Date: 2015-07-31
Methods and apparatus for ransonnware remediation are disclosed. Network traffic for at least one network user is monitored. A data signature is detected, indicating that one network user has been infected by a ransonnware application. An encryption key is extracted from the detected data signature. The encryption key is stored with an identifier of the network user. The encryption key is used to decrypt one or more files of the network user.
Trend Micro | Date: 2016-10-13
According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.
Trend Micro | Date: 2015-08-06
Examples herein disclose packet size information collected over an encrypted tunnel. The examples identify an application communicated via the encrypted tunnel based on the packet size information.
Trend Micro | Date: 2016-11-18
Various apparatuses and methods are usable to identify an Advanced Persistent Threat (APT). Various network packets may be subjected to a suitable behavioral analysis to identify such APTs. Upon identifying an APT, a response is initiated which may include sending attack messages to various devices in the network.
Trend Micro | Date: 2016-12-22
In one implementation, a risk assessment of an asset is compared to a risk level of a security policy and network traffic associated with the asset is assigned to a group associated with the security policy when the risk assessment achieves the risk level of the security policy.
Trend Micro | Date: 2015-10-22
A system for detecting phishing includes a phishing detection system that generates census of login pages received in different computers of different end users. An end user computer receives a login page and retrieves census information of the login page, such as from the phishing detection system. The census information indicates a number of different end users who employed the login page to log into their respective online accounts. The end user computer reports the census information to the end user of the end user computer. The end user computer reports the census information in numerical, graphical, or other format. The census information of the login page allows the end user to make an informed decision on whether or not to use the login page.
Trend Micro | Date: 2015-10-02
A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization. Access events may be stored in an event log as event data. Access events indicated in the event log may be correlated using a set of alert rules to identify an APT attack.
Trend Micro | Date: 2016-09-02
Example embodiments disclosed herein relate to providing network security. A network security device parses an initial handshake or communication to establish an encrypted channel between two endpoints. The network security device validates a certificate chain between the two endpoints and determines a reputation for each of one or more signers of a respective one or more certificates of the certificate chain. The network security device determines a certificate reputation for the certificate chain.
Trend Micro | Date: 2016-10-03
A method and a system for efficient search of string patterns characterized by positional relationships in a character stream are disclosed. The method is based on grouping string patterns of a dictionary into at least two string sets and performing string search processes of a text of the character stream based on individual string sets with the outcome of a search process influencing a subsequent search process. A system implementing the method comprises a dictionary processor for generating string sets with corresponding text actions and search actions, a conditional search engine for locating string patterns belonging to at least one string set in a text according to a current search state, a text operator for producing an output text according to search results, and a search operator for determining a subsequent search state.