Trend Micro

Displaying 1-40 of 109 results

  • White Papers // Sep 2014

    5 Things Every Small Business Should Know About MAC Security

    Some Macs that make it to workplaces are personally owned, thanks to the bring-your-own-device (BYOD) trend, which allows employees to use their own devices for work. Naturally, security concerns arise because confidential business data is freely transferred from office-issued to personally owned devices. IT departments’ struggle to manage and support...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Mitigating Targeted Attacks Requires Integrated Solutions

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organisations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    NSS Lab Comparative Analysis Report (Security Effectiveness)

    Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall security effectiveness of the solution. These should be considered over the course of the useful life of the solution, and include Detection rate and Device stability and reliability. In order to determine the...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    5 Reasons Why your Antivirus Software Is Not Enough

    The vast amount of data small and medium-sized businesses (SMBs) hold, as well as their lack of sufficient security practices, makes them prime targets for attackers. As a result, SMBs believe it is necessary to invest in storage security for their critical data, such as email messages, financial documents, and...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Harvard Business Review: Using Frameworks to Defend Against Cyber Attacks

    IT and Business Managers are scared of targeted attacks on their data and systems, but the fact that senior decision makers are unsure or sceptical of the exact business risks and impacts of such attacks makes it harder to secure funding to be prepared and fight them.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Osterman: Why a New Business Model is needed for SSL Certificates

    This Osterman research paper discusses why there are three fundamental problems with the current state of SSL; SSL is underutilised as a way to increase security and business, there have been numerous security breaches, the current certificate acquisition model is fuelling the problem and focuses on why a new business...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Evolving Data Centres: Defending Against Data Breach Attacks

    Enterprises transform IT structures to include virtualisation and cloud computing because they reduce company costs and optimise resource utilisation. Adopting these new platforms, however, opens new windows of exposure that attackers may leverage in data breach attacks.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Researchers predict cloud security will become one of the primary drivers for adopting cloud computing. The Gartner Global IT Council for Cloud Services Report revealed that over 50% companies cited security as their top concern for transitioning to the cloud.This paper will discuss what part of the shared responsibility equation...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    5 Mobile Security Risks Every Small Business Should Know About

    The advent of BYOD (Bring Your Own Device) opens up companies to threats that may slip through the network cracks because of employee negligence and its tide is continuously gaining strength. Given this, what should small and medium-sized businesses (SMBs) know about the security risks of BYOD and going mobile?...

    Sponsored By Trend Micro

  • White Papers // May 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2014

    Trend Micro Deep Security + VMware vSphere with Operations Management

    VMware and Trend Micro have partnered to deliver the first security and operations management bundle designed for virtualized environments within midsize businesses.

    Provided By Trend Micro

  • White Papers // May 2014

    Why a New Business Model is Needed for SSL Certificates

    The de facto Internet communication security protocol in use today is Secure Sockets Layer (SSL), used most commonly for browser-to-Web server communications, but increasingly for connections between applications when transferring critical business content.

    Provided By Trend Micro

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    Trend Micro InterScan Messaging Security Virtual Appliance Adds In-the-Cloud Pre-Filter for Resource Efficiency and Proactive, Up-to-the-Minute Security

    The local Dane County government agencies serve more 450,000 citizens in more than 60 cities, towns, and villages. Dane County wanted to minimize gateway appliance overhead, to maximize the benefits of virtualization and also wanted to maximize the availability of mission-critical email with a resilient security solution. To master these...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Botnet Chronicles: A Journey to Infamy

    Botnets are considered one of the most prevalent and dangerous threats lurking on the Web today. The damage they cause can range from information theft and malware infection to fraud and other crimes. A botnet refers to a network of bots or zombie computers widely used for malicious criminal activities...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Dark Side of Trusting Web Searches: From Blackhat SEO to System Infection

    This paper will explain how cybercriminals leverage blackhat SEO to compromise systems. It will share the observations regarding various sites that have been compromised and on doorway pages that have been specially crafted for use in blackhat SEO attacks. It will also identify the techniques that cybercriminals use to mask...

    Provided By Trend Micro

  • White Papers // Jul 2010

    Addressing Data Security Challenges in the Cloud

    Enterprises increasingly recognize cloud computing compelling economic and operational benefits. Vitalizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by cloud computing. Deploying...

    Provided By Trend Micro

  • Case Studies // Jun 2010

    Trend Micro Worry-Free Business Security Aces the Test

    The professionals at Real Time Consultants provide technology expertise and IT services to a diverse range of small and medium businesses. They wanted to block emerging threats including the latest spyware, web threats, and cybercrime attack and also they wanted protection from the latest emerging threats. And Simplify security for...

    Provided By Trend Micro

  • White Papers // Jun 2010

    Unmasking FAKEAV

    This white paper aims to educate companies' IT department staff on how rogue antivirus or FAKEAV applications arrive on systems. It aims to arm them with the right Trend Micro solutions that can help them combat these threats. FAKEAV threats have been rampant in the past few years and are...

    Provided By Trend Micro

  • White Papers // May 2010

    Trend Micro Deep Security: Similarities and Differences With Cisco CSA

    Your enterprise invested in Cisco Security Agent (CSA) because it understands the importance of a defense-in-depth strategy for protecting servers, desktop and laptop computers from threats that can bypass perimeter security. However, with the recent announcement of Cisco's End-of-Life plans for CSA, one needs to explore alternatives that will continue...

    Provided By Trend Micro

  • White Papers // May 2010

    Making Virtual Machines Cloud-Ready

    Cloud computing has been compared to the early proliferation of electricity. Homes, businesses and towns did not want to produce or rely on their own source of power. They began connecting into a greater power grid, supported and controlled by power utilities. Along with this utility connection came time and...

    Provided By Trend Micro

  • White Papers // Apr 2010

    ZeuS: A Persistent Criminal Enterprise

    After the Kneber botnet incident earlier this year, the ZeuS botnet was thrown into the limelight of notorious cybercriminal campaigns that the general public is currently talking about. ZeuS, however, has been in the wild for years and has gone through continual improvements, making it one of the most effective...

    Provided By Trend Micro

  • White Papers // Mar 2010

    SK-KEM Sakai Kasahara Key Exchange Mechanism

    SK-KEM is a third generation crypto system that solves the key exchange problem without adding complexity to the user. Implementations of SK-KEM will see users able to add encryption to their email with a single click, or even set an option in their email program to encrypt every message in...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Trend Micro Data Protection: Solutions for Privacy, Disclosure and Encryption

    Enterprises are faced with addressing several common compliance requirements across multiple geographies and industries. These include protecting confidential data in common usage scenarios, notifying relevant parties when this data is disclosed, and securing this information with data loss prevention and encryption technologies. Factors - such as finding accurate, usable, and...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Expanded AV Product Testing to Include Blocking by Source Reputation

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • White Papers // Mar 2010

    The Business of Cybercrime: A Complex Business Model

    As online crime has grown more prevalent, consumer confidence has plummeted. Unlike the old days when hackers created viruses to be mischievous, modern-day malware authors create threats primarily to make a profit. As the ?Underground Economy has grown and flourished, cybercriminals have developed new methods for tricking victims into downloading...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How It Works: Trend Micro Hosted Email Security

    As spam continues to grow at these dramatic rates, traditional on-premise email security products are failing to keep up. These products often suffer from inherent hardware capacity limits, rendering them unable to handle large spam volumes. Once the amount of spam exceeds the limit, these solutions rapidly become overloaded, significantly...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How Hosted Email Security - Inbound Filtering Adds Value to Your Existing Environment

    As spam continues to grow at these dramatic rates, many traditional, on-premise email security products are being supplemented with hosted email security. That's because most security products require sustained maintenance over time to stay effective. Too often, however, maintenance can be delayed as other critical business projects take priority. Businesses...

    Provided By Trend Micro

  • Webcasts // Feb 2010

    Data Classification and Working with Data Stakeholders

    Understanding business processes for the many departments within large organizations poses one of the largest challenges that information security professionals face when implementing a DLP solution. Most information security professionals know the primary business of their organization, but they may be unfamiliar with some of the details or lack specific...

    Provided By Trend Micro

  • White Papers // Feb 2010

    Email Privacy 101

    The most fundamental principle of encryption is the secure exchange of secret keys between sender and receiver. This has been a challenge since the earliest systems invented by Julius Caesar and even more recently developed systems have struggled to overcome it elegantly. The key exchange has cracked this challenge. It...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    School District Switches to Trend Micro Enterprise Security

    The administration and faculty in the Camden County School System strive to graduate students that are prepared to achieve lifelong goals and to contribute to society. Camden County Schools wanted to protect the learning environment for K-12 students by reducing spam and other threats to faculty and staff productivity. To...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    Wichita Switches to Trend Micro InterScan Messaging and Web Security Virtual Appliances for Simplicity and Efficiency

    The City of Wichita is the largest municipal organization in Kansas, distinguished by a long tradition of professional government and committed to providing efficient, high-quality services to its citizens. The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization....

    Provided By Trend Micro

  • White Papers // Jan 2010

    When Encryption Isn't Enough

    It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these data loss threats, many enterprises have successfully deployed or are in the process of deploying an...

    Provided By Trend Micro

  • White Papers // Jan 2010

    Trend Micro Data Loss Prevention: Leveraging Data Loss Prevention Technology to Secure Corporate Assets

    In today's virtual enterprise, it's rarely practical or cost-effective to search employees for iPods or other USB devices. A more comprehensive, effective system for preventing data leaks is required at every port, on every endpoint in the enterprise, and on any network whether corporate, public, or WAN. To protect sensitive...

    Provided By Trend Micro

  • White Papers // Dec 2009

    Protecting the Microsoft Exchange 2007 and 2010 Environment

    Since its debut in 1996, Trend Micro Scan Mail for Microsoft Exchange has seen many changes in email threats and scanning technologies. Scan Mail scanning software has always provided customers with a high-performance, low-administration solution that effectively keeps critical organizational email free of unwanted and malicious content in the face...

    Provided By Trend Micro

  • White Papers // Dec 2009

    SDBOT IRC Botnet Continues to Make Waves

    In this paper, the researcher focused on SDBOT variants and their final payload - the installation of pay-per-install programs. The contents of this paper are targeted at security analysts and specialists. It includes an in-depth technical analysis of the SDBOT threat and takes a look behind the scenes at the...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Network Security Overwatch Layer: Smarter Protection for the Enterprise

    Even though most of the businesses make use of the best security options available, but none of them can be sure if that security is good enough. Despite continuous efforts IT professionals have not been successful in building a security system that is always effective, this is probably because of...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Trend Micro Enterprise Security for the Healthcare Industry

    The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems, increasing security regulations, and greater compliance scrutiny and punitive actions. While EHR systems will ultimately lead to more efficient and effective patient care, they also increase the criminal appeal of attack and an...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Server Security for Healthcare

    Healthcare organizations are facing increasing scrutiny from regulators, practitioners, and patients to ensure the integrity, security, and confidentiality of healthcare information. Financially motivated attackers develop new threats daily with the intent to steal and sell valuable data - including identities and computing resources. Cybercriminals are able to bypass most perimeter...

    Provided By Trend Micro

  • White Papers // Sep 2014

    5 Things Every Small Business Should Know About MAC Security

    Some Macs that make it to workplaces are personally owned, thanks to the bring-your-own-device (BYOD) trend, which allows employees to use their own devices for work. Naturally, security concerns arise because confidential business data is freely transferred from office-issued to personally owned devices. IT departments’ struggle to manage and support...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Mitigating Targeted Attacks Requires Integrated Solutions

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organisations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    NSS Lab Comparative Analysis Report (Security Effectiveness)

    Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall security effectiveness of the solution. These should be considered over the course of the useful life of the solution, and include Detection rate and Device stability and reliability. In order to determine the...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    5 Reasons Why your Antivirus Software Is Not Enough

    The vast amount of data small and medium-sized businesses (SMBs) hold, as well as their lack of sufficient security practices, makes them prime targets for attackers. As a result, SMBs believe it is necessary to invest in storage security for their critical data, such as email messages, financial documents, and...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Harvard Business Review: Using Frameworks to Defend Against Cyber Attacks

    IT and Business Managers are scared of targeted attacks on their data and systems, but the fact that senior decision makers are unsure or sceptical of the exact business risks and impacts of such attacks makes it harder to secure funding to be prepared and fight them.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Osterman: Why a New Business Model is needed for SSL Certificates

    This Osterman research paper discusses why there are three fundamental problems with the current state of SSL; SSL is underutilised as a way to increase security and business, there have been numerous security breaches, the current certificate acquisition model is fuelling the problem and focuses on why a new business...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Evolving Data Centres: Defending Against Data Breach Attacks

    Enterprises transform IT structures to include virtualisation and cloud computing because they reduce company costs and optimise resource utilisation. Adopting these new platforms, however, opens new windows of exposure that attackers may leverage in data breach attacks.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Researchers predict cloud security will become one of the primary drivers for adopting cloud computing. The Gartner Global IT Council for Cloud Services Report revealed that over 50% companies cited security as their top concern for transitioning to the cloud.This paper will discuss what part of the shared responsibility equation...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    5 Mobile Security Risks Every Small Business Should Know About

    The advent of BYOD (Bring Your Own Device) opens up companies to threats that may slip through the network cracks because of employee negligence and its tide is continuously gaining strength. Given this, what should small and medium-sized businesses (SMBs) know about the security risks of BYOD and going mobile?...

    Sponsored By Trend Micro

  • White Papers // Jun 2009

    Infiltrating WALEDAC Botnet's Covert Operations: Effective Social Engineering, Encrypted HTTP2P Communications, and Fast-Fluxing Network

    The WALEDAC botnet has been involved in an almost continuous spate of spam runs since researchers discovered it in December 2008. Their creators routinely take advantage of various real-world events and occasions, using them as social engineering ploys to trick users into performing certain actions. This botnet has the ability...

    Provided By Trend Micro

  • White Papers // Feb 2009

    Email Encryption for InterScan Messaging Hosted Security

    With policy-based encryption, organizations avoid relying on individual users to secure important content. Conveniently, encryption is automatically applied when content filtering rules are triggered, helping to ensure that confidentiality and privacy requirements are met. Trend Micro provides a policy-based email encryption solution that seamlessly integrates with the content filtering capabilities...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Regulatory Compliance: Protecting Sensitive Information in an Increasingly Leaky World

    Information Technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Trend Micro Endpoint Security: High Performance for Everyday Usage Scenarios as Tested by NSS Labs

    An exponential growth in malware is driving the need to add more technology to endpoint security to protect users from complex threats. This has resulted in many endpoint security products having an increasing impact on user productivity. Endpoint security can affect the performance of several everyday operations, including opening and...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Email Encryption for InterScan Messaging Hosted Security: An Overview of the Email Encryption Add-On Service for Trend Micro's Hosted Email Security

    Trend Micro offers Email Encryption as an add-on service to InterScan Messaging Hosted Security. It integrates seamlessly with the content filtering capabilities of Trend Micro's hosted email security service that protects against spam, viruses and inappropriate content. Trend Micro Email Encryption leverages Identity-Based Encryption (IBE) to efficiently secure email addressed...

    Provided By Trend Micro

  • White Papers // Jan 2009

    Microsoft SharePoint Use Models and Security Risks

    Microsoft SharePoint 2007 is the latest version of server-based collaboration software from Microsoft, promising to connect people, processes, and information. It comprises two main components: 1) the core Windows SharePoint Services (WSS 3.0), which include the content repository, libraries, and services, making it accessible to a distributed user population and...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Improving Quality, Safety and Efficiency of Healthcare: Security Best Practices for Health Information Exchange

    Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Healthcare delivery networks are now faced with the challenge of deploying HIE solutions in community and enterprise environments. These care delivery networks need to achieve interoperability across the landscape of diverse stakeholders...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Virtualizing Email Gateway Security: Flexible, Cost-Effective Protection at the Email Gateway

    Virtualization initiatives have gained momentum as businesses seek ways to reduce operations costs and complexity in the face of a weak economy and rising power costs. Green IT initiatives are being launched in many organizations to help reduce the impact of rising costs on the overall enterprise bottom line. At...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Trend Micro Web Gateway Security Web Security: Faster Protection, Greater Flexibility, Lower Total Cost

    As one continues to integrate the Internet into business processes - and as malware becomes more and more web-based - security has become the top priority for defending the web gateway. Relying on URL filtering products alone leaves exposed to today's sophisticated web threats, but deploying more point solutions increases...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Meeting the Challenges of Virtualization Security

    Virtualization enables the organization to attain significant gains in efficiency and cost-effectiveness, along with the additional benefits of a greener consolidated datacenter, increased scalability and improved time to resource fulfillment. Unfortunately, the advantages of virtualization are balanced by increased risk exposure as virtual systems in the datacenter face many of...

    Provided By Trend Micro

  • White Papers // May 2009

    Pushdo Cutwail: A Study of the Pushdo Cutwail Botnet

    The Pushdo botnet has been with around since January 20071. The botnet is also known as Pandex or Cutwail. While it does not grab as many headlines as its attention-seeking peers such as Storm or Conficker, according to recent reports it is the 2nd largest SPAM botnet on the planet2...

    Provided By Trend Micro

  • White Papers // Jun 2009

    Data-Stealing Malware on the Rise - Solutions to Keep Businesses and Consumers Safe

    The Data-stealing Malware Report is the inaugural report in a new series of quarterly focus reports published by Trend Micro to address the rapidly changing, ever evolving threat environment. The Focus Report Series is based on data from TrendLabs, Trend Micro's global network of research, service, and support centers committed...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Trend Micro Deep Security: Protecting the Dynamic Datacenter

    The purpose of IT security is to enable the business, not impede it, but the challenges and complexity one face for the IT security grow every day. Compliance requirements impose security standards for data and applications on servers. Physical servers are replaced with virtual machines to save money, be green,...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Meeting the Challenges of Virtualization Security: Server Defenses for Virtual Machines

    Virtualization enables the organization to attain significant gains in efficiency and cost-effectiveness, along with the additional benefits of a greener consolidated datacenter, increased scalability and improved time to resource fulfillment. Unfortunately, the advantages of virtualization are balanced by increased risk exposure as virtual systems in the datacenter face many of...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Cloud Computing Security: Making Virtual Machines Cloud Ready

    Cloud computing has been compared to the early proliferation of electricity. Homes, businesses and towns did not want to produce or rely on their own source of power. They began connecting into a greater power grid, supported and controlled by power utilities. Along with this utility connection came time and...

    Provided By Trend Micro

  • White Papers // Feb 2009

    Server and Application Protection: Behind the Lines

    Cyber attacks can bypass or penetrate even top-of-the-line perimeter security, and it's increasingly recognized as a security best practice to provide server and application protection to detect and prevent these attacks as an integral part of a defense-in-depth strategy. A comprehensive server and application protection system will include: firewall, IDS/IPS,...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Payment Card Industry (PCI) Data Security Standard: Meeting Stringent Requirements

    The prescriptive, multifaceted PCI Data Security Standard (PCI DSS) includes requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures. The PCI DSS is intended to help to proactively protect the payment transaction systems to prevent identity theft and fraud using customer account data. These...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Server Security for Healthcare

    Healthcare organizations are facing increasing scrutiny from regulators, practitioners, and patients to ensure the integrity, security, and confidentiality of healthcare information. Financially motivated attackers develop new threats daily with the intent to steal and sell valuable data - including identities and computing resources. Cybercriminals are able to bypass most perimeter...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Trend Micro: Cost-Effective Virtualization Security

    Virtualization can help the organization achieve significant datacenter operations savings - one can reduce hardware costs and energy demands and achieve greater flexibility in deploying mission-critical software applications. Organizations have leveraged consolidation to attain deployment of 10 or more Virtual Machines (VMs) for each physical server in their IT infrastructure...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Network Security Overwatch Layer: Smarter Protection for the Enterprise

    Even though most of the businesses make use of the best security options available, but none of them can be sure if that security is good enough. Despite continuous efforts IT professionals have not been successful in building a security system that is always effective, this is probably because of...

    Provided By Trend Micro

  • White Papers // Dec 2009

    Protecting the Microsoft Exchange 2007 and 2010 Environment

    Since its debut in 1996, Trend Micro Scan Mail for Microsoft Exchange has seen many changes in email threats and scanning technologies. Scan Mail scanning software has always provided customers with a high-performance, low-administration solution that effectively keeps critical organizational email free of unwanted and malicious content in the face...

    Provided By Trend Micro

  • White Papers // Feb 2009

    Server and Application Protection

    Cyber attacks can bypass or penetrate even top-of-the-line perimeter security, and it's increasingly recognized as a security best practice to provide server and application protection to detect and prevent these attacks as an integral part of a defense-in-depth strategy. A comprehensive server and application protection system will include: firewall, IDS/IPS,...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Security Best Practices For Health Information Exchange

    Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Healthcare delivery networks are now faced with the challenge of deploying HIE solutions in community and enterprise environments. These care delivery networks need to achieve interoperability across the landscape of diverse stakeholders...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Botnet Chronicles: A Journey to Infamy

    Botnets are considered one of the most prevalent and dangerous threats lurking on the Web today. The damage they cause can range from information theft and malware infection to fraud and other crimes. A botnet refers to a network of bots or zombie computers widely used for malicious criminal activities...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Dark Side of Trusting Web Searches: From Blackhat SEO to System Infection

    This paper will explain how cybercriminals leverage blackhat SEO to compromise systems. It will share the observations regarding various sites that have been compromised and on doorway pages that have been specially crafted for use in blackhat SEO attacks. It will also identify the techniques that cybercriminals use to mask...

    Provided By Trend Micro

  • White Papers // Jul 2009

    When Encryption Isn't Enough:Trend Micro LeakProof Stops Data Leaks Where They Start

    It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these threats from data leaks, many enterprises have successfully deployed or are in the process of deploying...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Trend Micro Web Gateway Security

    As the web becomes more important to modern business, it also becomes more dangerous. A new malware threat is created every two seconds, and cybercriminals are better organized to deliver increasing numbers of sophisticated web-borne threats. URL filtering alone at the Internet gateway is insufficient to protect organizations from threats...

    Provided By Trend Micro

  • White Papers // Aug 2009

    A Cybercrime Hub

    This paper discussed some parts of a large ongoing cybercriminal operation that dates back to at least 2005. An Estonian company is actively administering a huge number of servers in numerous datacenters, which together form a network to commit cybercrime. It appears that the company from Tartu, Estonia controls everything...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Security Guide to Social Networks

    Social networking sites are websites designed for human interaction. They enable users to meet others; keep in touch with them; and share experiences. They are all built on a similar foundation - the user builds a network of contacts bound by an element of trust. The user then creates content...

    Provided By Trend Micro

  • White Papers // Jun 2010

    Unmasking FAKEAV

    This white paper aims to educate companies' IT department staff on how rogue antivirus or FAKEAV applications arrive on systems. It aims to arm them with the right Trend Micro solutions that can help them combat these threats. FAKEAV threats have been rampant in the past few years and are...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Improving Quality, Safety and Efficiency of Healthcare

    Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Healthcare delivery networks are now faced with the challenge of deploying HIE solutions in community and enterprise environments. These care delivery networks need to achieve interoperability across the landscape of diverse stakeholders...

    Provided By Trend Micro