{"id":14464,"date":"2021-05-05T06:45:00","date_gmt":"2021-05-05T06:45:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/05\/05\/trend-micro-announces-next-generation-ics-endpoint-security-solution\/"},"modified":"2021-05-05T06:45:00","modified_gmt":"2021-05-05T06:45:00","slug":"trend-micro-announces-next-generation-ics-endpoint-security-solution","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/05\/05\/trend-micro-announces-next-generation-ics-endpoint-security-solution\/","title":{"rendered":"Trend Micro Announces Next Generation ICS Endpoint Security Solution"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Specially designed to provide cybersecurity without interruption to ICS environments                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211; 5 May 2021 &#8211; <a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, today announced a first-of-its-kind OT-native&#13;<br \/>\nendpoint security solution, provided as part of its total security solution for&#13;<br \/>\nsmart factories. Developed by TXOne Networks, TXOne StellarProtect<sup>TM<\/sup>&#13;<br \/>\nis designed to secure all OT endpoints, regardless of environmental conditions,&#13;<br \/>\nfor any mission-critical ICS environment.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The massive&#13;<br \/>\nnumber of ICS endpoints in these working environments provides a large variety&#13;<br \/>\nof attack surfaces, as they often include many unpatched or otherwise&#13;<br \/>\nvulnerable devices. Disruption of these endpoints causes significant problems&#13;<br \/>\nfor manufacturers and can jeopardize the entire operation. According to the&#13;<br \/>\nTrend Micro 2020 annual cybersecurity report, the manufacturing industry became&#13;<br \/>\na primary target for highly infectious ransomware attacks, making it more&#13;<br \/>\nimportant than ever to secure these assets with technologies tailored to their&#13;<br \/>\npurpose (<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report<\/a>).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;The ugly&#13;<br \/>\ntruth of ICS endpoint security is that there has not been any security solution&#13;<br \/>\nspecifically designed for the high-availability needs of modernized equipment&#13;<br \/>\nin the OT environment,&#8221; said Akihiko Omikawa, executive vice president of IoT&#13;<br \/>\nsecurity for Trend Micro and chairman of TXOne Networks. &#8220;Cybersecurity&#13;<br \/>\nsolutions for ICS endpoints must consider three elements to meet industry&#13;<br \/>\nexpectations: low impact to performance, zero interruption, and all-terrain&#13;<br \/>\nprotection.&#8221; <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The unique&#13;<br \/>\nneeds of the shop floor environment create challenges to finding protections&#13;<br \/>\nthat secure the work site while still giving the necessary priority to&#13;<br \/>\nperformance. Traditional solutions, such as signature-based antivirus, can&#13;<br \/>\nidentify known threats but require constant internet connectivity and frequent&#13;<br \/>\nupdates, which is simply not possible for mission critical assets. Advanced&#13;<br \/>\nmachine learning-based solutions are able to identify anomalies and unknown&#13;<br \/>\nthreats quickly, but have a high rate of producing false positives that can easily&#13;<br \/>\ninterfere with operations. While application control or lockdown-based&#13;<br \/>\nsolutions are more streamlined and their trust list makes deployment&#13;<br \/>\nstraightforward, they also rigidly limit a machine to a specific purpose and so&#13;<br \/>\nare only ideal for fixed-use systems. These single technology solutions serve&#13;<br \/>\nmany useful purposes, however are unable to provide the adaptivity necessary to&#13;<br \/>\nboth safeguard and accommodate the operational integrity of assets dedicated to&#13;<br \/>\nproduction.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>TXOne StellarProtect<sup>TM<\/sup>\u00a0 delivers uniquely ICS-native endpoint&#13;<br \/>\nprotection against both known and unknown malware via machine learning and ICS&#13;<br \/>\nroot of trust. To avoid redundant security scans and ensure minimal impact to&#13;<br \/>\nperformance, ICS root of trust collects over 1,000 ICS software certificates&#13;<br \/>\nand licenses and verifies them in advance. StellarProtect requires no internet&#13;<br \/>\nconnection to defend against malware-free attacks due to its least&#13;<br \/>\nprivilege-based policies. Operational interruption from malicious attacks or&#13;<br \/>\neven mis-operation by personnel is prevented by its built-in ICS application&#13;<br \/>\nbehavior learning engine.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;ICS endpoint security solutions must accommodate the&#13;<br \/>\nneeds of OT environments, not the other way around,&#8221; said Dr. Terence Liu,&#13;<br \/>\nGeneral Manager for TXOne Networks. &#8221; TXOne StellarProtect<sup>TM<\/sup>\u00a0 is setting a new milestone for endpoint&#13;<br \/>\nprotection in ICS security. We look forward to helping customers mitigate cyber&#13;<br \/>\nrisk in their environments without any disruption or adjustments.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>To find out more about Trend Micro&#8217;s security solutions&#13;<br \/>\nfor the smart factory, please visit: <a href=\"https:\/\/www.trendmicro.com\/en_hk\/business\/solutions\/iot\/smart-factory.html\">https:\/\/www.trendmicro.com\/en_hk\/business\/solutions\/iot\/smart-factory.html<\/a>. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>To find out more about TXOne StellarProtect<sup>TM<\/sup>,&#13;<br \/>\nplease visit: <a href=\"https:\/\/www.txone-networks.com\/en-global\/products\/index\/stellarprotect\">https:\/\/www.txone-networks.com\/en-global\/products\/index\/stellarprotect<\/a><\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-05-05\/76853\/trend-micro-announces-next-generation-ics-endpoint-security-solution\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Specially designed to provide cybersecurity without interruption to ICS environments HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211; 5 May 2021 &#8211; (;),&#13; a global&#13; cybersecurity leader, today announced a first-of-its-kind OT-native&#13; endpoint security solution, provided as part of its total security solution for&#13; smart factories. Developed by TXOne Networks, TXOne StellarProtectTM&#13; is designed to secure all OT &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14464"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=14464"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14464\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=14464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=14464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=14464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}