{"id":15572,"date":"2021-06-16T07:00:00","date_gmt":"2021-06-16T07:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/06\/16\/trend-micro-offers-industrys-broadest-zero-trust-solution-with-the-unique-risk-insights-organizations-need\/"},"modified":"2021-06-16T07:00:00","modified_gmt":"2021-06-16T07:00:00","slug":"trend-micro-offers-industrys-broadest-zero-trust-solution-with-the-unique-risk-insights-organizations-need","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/06\/16\/trend-micro-offers-industrys-broadest-zero-trust-solution-with-the-unique-risk-insights-organizations-need\/","title":{"rendered":"Trend Micro Offers Industry&#8217;s Broadest Zero Trust Solution with the Unique Risk Insights Organizations Need"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Security leader expands vision to support and secure the post-pandemic workforce                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211; 16 June 2021 &#8211;<b>\u00a0<\/b><a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, offers comprehensive visibility into identity&#13;<br \/>\nand device security health based on the industry&#8217;s most comprehensive risk&#13;<br \/>\ninsights. This is critical for customers to successfully achieve true Zero&#13;<br \/>\nTrust security.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b><i>To find out more about Trend Micro&#8217;s approach&#13;<br \/>\nto Zero Trust, please visit: <\/i><\/b><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/an-expert-discussion-on-zero-trust.html\"><i>www.trendmicro.com\/en_us\/research\/21\/f\/an-expert-discussion-on-zero-trust.html<\/i><\/a><i> .<b\/><\/i><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>According to Forrester<a name=\"_ftnref1\" title=\"\">[1]<\/a>,&#13;<br \/>\n&#8220;Zero Trust Network Access (ZTNA) is the signature security technology of the&#13;<br \/>\npandemic. While modestly unchaining users from their antiquated VPN technology,&#13;<br \/>\nit has inspired organizations to reimagine how security (and networking) can be&#13;<br \/>\nconsumed both today and in the future.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>With a dispersed workforce using a variety of devices to&#13;<br \/>\naccess corporate resources hosted in a range of locations, from the corporate&#13;<br \/>\ndata center to cloud or SaaS applications, companies can no longer assume&#13;<br \/>\nverified or trusted devices and individual identities are secure. Zero Trust is&#13;<br \/>\nthe key strategy to enhance the security of critical data and systems. It is&#13;<br \/>\nthe way forward to secure the always changing hybrid workplace in a more agile,&#13;<br \/>\neffective manner than legacy security architectures can deliver.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>However, the market is rife with confusion. Trust and&#13;<br \/>\naccess decisions are being made without the appropriate context or a complete&#13;<br \/>\nunderstanding of risk based on so-called Zero Trust solutions.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;For years vendors have been claiming &#8216;Zero Trust&#8217; by&#13;<br \/>\nslapping the label on any and all types of solutions without understanding how&#13;<br \/>\nto actually measure trust,&#8221; said Kevin Simzer, chief operations officer for&#13;<br \/>\nTrend Micro. &#8220;Trend Micro is uniquely positioned to provide critical insight&#13;<br \/>\ninto identity and device health with its comprehensive XDR and visibility into&#13;<br \/>\nemail risk, which is foundational for building a successful Zero Trust&#13;<br \/>\nstrategy.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro&#8217;s Zero Trust strategy crucially leverages&#13;<br \/>\nTrend Micro Vision One&#8217;s capabilities\u2014delivering insight with the&#13;<br \/>\nbroadest XDR solution to cover telemetry across email, cloud, networks and SaaS&#13;<br \/>\napplications. The strategy provides continuous security posture&#13;<br \/>\nassessment and complete insights so teams can make informed decisions.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Key highlights for businesses include:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ul>\n<li>Risk&#13;<br \/>\nand security health based on a continuous&#13;<br \/>\nassessment of the user, device, app and content. This supports automated access&#13;<br \/>\ncontrol, flags incidents for alert investigations and creates dashboards for&#13;<br \/>\nCISOs and SOC teams to make informed decisions. <\/li>\n<li>A secure connection is established based on&#13;<br \/>\nthe health assessment each time a device or user attempts to access the&#13;<br \/>\ncorporate resource. This includes a Cloud Access Security Broker (CASB) API&#13;<br \/>\nintegration to SaaS apps, network enforcement points in front of&#13;<br \/>\ncompany resources and support for blocking access to specific&#13;<br \/>\napplications using existing endpoint agents.<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Visibility for SOC teams&#13;<br \/>\ninto email usage is particularly key as phishing activity from internal users&#13;<br \/>\ncould indicate that user identities have been compromised\u2014a common early sign&#13;<br \/>\nof an ongoing ransomware attack.<\/p>\n<p><span style=\"font-size: 1rem\">Customers can leverage Trend Micro&#8217;s risk scores for&#13;<br \/>\nZero Trust to feed third-party SASE and other solutions via APIs\u2014driving&#13;<br \/>\nadditional value. Senior decision-makers can leverage the insights and&#13;<br \/>\ndashboard to better understand how their organization&#8217;s security posture is&#13;<br \/>\ntrending over time.<\/span><\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\"\/>\n<div id=\"ftn1\">\n<p><a name=\"_ftn1\" title=\"\"><sup><sup>[1]<\/sup><\/sup><\/a> Forrester, New Tech:&#13;<br \/>\nZero Trust Network Access, Q2 2021(David Holmes, April 2021)<\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/div><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-06-16\/82124\/trend-micro-offers-industrys-broadest-zero-trust-solution-with-the-unique-risk-insights-organizations-need\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security leader expands vision to support and secure the post-pandemic workforce HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211; 16 June 2021 &#8211;\u00a0 (;),&#13; a global&#13; cybersecurity leader, offers comprehensive visibility into identity&#13; and device security health based on the industry&#8217;s most comprehensive risk&#13; insights. This is critical for customers to successfully achieve true Zero&#13; Trust security. &#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15572"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=15572"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15572\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=15572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=15572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=15572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}