Techworld

White Papers: Trend Micro


Sort by: Date | Company | Title


Delivering a Secure Cloud
By Trend Micro | 14/10/2013
In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.
Download this now


Global Cloud Security Software Market
By Trend Micro | 14/10/2013
Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.
Download this now


Helping Companies Fight Against Targeted Attacks
By Trend Micro | 23/9/2013
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Download this now


How Threat Actors Steal Your Data
By Trend Micro | 23/9/2013
Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem.
Download this now


Targeted Attack Campaigns
By Trend Micro | 23/9/2013
Advanced Persistent Threats (APTs) refer to a category of threats that aggressively pursue and chosen targets that over time attempt to get deeper into their network. For Enterprises, this is a high priority threat as human and systemic weaknesses can be mitigated with correct practices and solutions. In this report we look at targeted attack campaigns and how these can be mitigated.
Download this now


Local Government Finds Economies of Scale for Virtualised Environment and Secures Multiple Access Points
By Trend Micro | 1/8/2013
The City of Rockingham is the second largest city in Western Australia with more than 100,000 residents. They needed a cost effective solution to identify and take swift aversive action against cyber threats that enter their network or those that come-in via their growing number of Public Access Points – used by a myriad of wireless access devices. Download to find out how they met this business challenge.
Download this now


The 10-Step Security Action Plan
By Trend Micro | 1/8/2013
In this whitepaper, we look at ten essential steps in creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability to ward off a persistent attacker. For more, click to download
Download this now


Advanced Persistent Threats and Real-Time Threat Management
By Trend Micro | 13/3/2013
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Click to download!
Download this now


New Demands for Real-time Threat Management
By Trend Micro | 13/3/2013
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices. The first involves real-time risk management for day-to-day security adjustments and the second is real-time threat management to detect and address sophisticated, stealthy, and damaging security breaches. Download to find out how to tackle both!
Download this now


Trend Micro Deep Security: For Vulnerability Shielding
By Trend Micro | 20/2/2013
Countless software vulnerabilities leave the door open to data-stealing malware and other attacks. And IT teams can’t keep up—it’s virtually impossible to download, test, and deploy patches for all critical vulnerabilities before they are exploited. At the same time, emergency patching causes unacceptable downtime, overhead, and costs and other operational challenges. Given these challenges, there has never been a more urgent need for a virtual patching solution that complements existing patch management processes by shielding known and unknown vulnerabilities. Read more.
Download this now

Top Whitepapers

Twitter Feed

Featured Whitepapers