Prevention pill against Web threats

Prevention pill against Web threats
Comment E-mail Print Share
First Published: Wed, Mar 28 2007. 01 02 AM IST
Updated: Wed, Mar 28 2007. 01 02 AM IST
New Delhi: Trend Micro, a leader in network anti-virus and Internet content security software and services, has introduced new technology that entails a holistic approach to protecting businesses from web threats.
The company’s new technology is a multi-layered, multiple- threat defence mechanism that includes an integrated combination of Web reputation, URL filtering, antivirus, anti-spyware and anti-spam technology control to deflect threats.
Based on extensive, continuously updated resources, this service presents a clear picture of the overall reputation of a Website and the trustworthiness of individual Web pages within that site.
Traditional scan-based security solutions alone no longer provide effective protection from insidious threats, and organizations now need to deploy flexible and adaptable techniques to address evolving Web threats.
Highly potent Web threats enter a company’s network silently, in real time, posing immediate danger to data, productivity, corporate reputation, and revenue. As a result, businesses and consumers are more exposed to information leakage and theft than ever before.
Through the use of this technique, these threats can be effectively thwarted: in the cloud, at the gateway, and on the endpoint.
How it works
The technology provides security readings and restrictions that minimize the risk of confidential information leakage, identity loss and damage to company image as a result of Web-based attacks.
Most URL-filtering and content-inspection solutions only protect reactively against known threats.
”When individuals in an organization use the Web, for company research or otherwise, they are automatically increasing the security risk to their organization,” said Trend Micro CEO, Eva Chen. ”The ability to track the credibility and reputation of a site before logging on to it is like running a credit check prior to entering into a business agreement. With insidious and often targeted attacks, a normally trustworthy site could unwittingly become hijacked by malicious code,” he added.
Comment E-mail Print Share
First Published: Wed, Mar 28 2007. 01 02 AM IST
More Topics: Technology | Tech News |