Threat Management System has now been replaced by the enhanced protection of Trend Micro Deep Discovery.
Explore Deep Discovery, our next generation threat management solution with enhanced discovery and intelligence features. See how you can dive deeper to get the network-wide visibility, insight, and control you need to reduce the risk of APTs and targeted attacks in your network
Get real-time visibility, insight, and control to protect from advanced attacks
Automatically detect and mitigate advanced threats that evade perimeter security
Protect systems that cannot directly run antivirus
Aid compliance efforts with important controls, DLP, and reporting capabilities
Leverage the proactive expertise of Trend Micro Risk Management Services
Prove to your executives why Threat Management System is better. Getting a Security Threat Assessment provides valuable insight for you to evaluate the effectiveness of your current security infrastructure. Learn the answers to the questions that keep you up at night:
In just two weeks, Trend Micro can reveal the answers in a customised executive report.
The Security Threat Assessment reveals your true security posture by detecting both active and potential threats that are evading your existing security measures. Our Security Threat Assessment uses non-invasive technology and the Trend Micro™ Smart Protection Network to provide an informative risk report that reveals the following information:
Capable of analysing traffic up to the application layer across 120 different protocols, the Threat Detection Appliance not only detects malware but also the mechanisms used by malware to propagate, including:
When traffic is received by the Threat Detection Appliance, a multi-step process occurs:
Once a threat is uncovered, the Threat Discovery Appliance sends a message to the Threat Mitigator, which will initiate a revolutionary pattern-free cleanup. The Threat Mitigator first removes the files and malware processes associated with the infection, then identifies the chain of events that led to the infection with a detailed root-cause analysis; for example, a malicious website download or an infected USB stick.
The comprehensive reports provide valuable insight into your security posture including:
If the Threat Mitigator is unable to clean the infection, it automatically sends all of the necessary forensic file data from the infected machines to the Trend Micro Threat Management Advisors. This team of seasoned security experts can then initiate an early warning communication in conjunction with diagnosis and remediation advisory services, helping you save valuable time.
As part of the infection learning phase, Trend Micro Threat Management Advisors provide proactive security planning services, including:
Throughout this process of discovering and remediating network infections, you gain a crucial advantage—greater insight into your security posture.