SB - Deep Discovery Familyy
SB - Deep Discovery Familyy
SB - Deep Discovery Familyy
Trend Micro™
demands are met. To detect targeted attacks and advanced threats, analysts Intelligence for a rapid response
and security experts agree that organizations should use advanced detection
Deep Discovery and global threat intelligence
technology as part of an expanded strategy to address today’s evasive threats. drive a rapid and effective response.
Trend Micro™ Deep Discovery™ is a family of advanced threat protection products Integration of your defenses
that enables you to detect, analyze, and respond to today’s stealthy, targeted Deep Discovery integrates with your Trend
attacks. Deep Discovery blends specialized detection engines, custom sandboxing, Micro and third-party security tools to help
and global threat intelligence from Trend Micro™ Smart Protection Network™, prevent successful targeted attacks.
providing the highest detection rate possible against attacks that are invisible to
Protection from integrated threats
standard security products. Deployed individually or as an integrated solution, Deep
Discovery works with Trend Micro and third-party products to provide advanced Trend Micro Network One™ solutions provide
threat protection across your organization. a blend of cross-generational techniques
that apply the right technology at the right
time. Trend Micro™ TippingPoint™ intrusion
prevention system (IPS) and Deep Discovery
advanced threat protection work closely
together to deliver integrated detection
and prevention of known, unknown, and
undisclosed threats.
CAPABILITIES
Network content inspection. Deep Discovery Inspector monitors all traffic across physical and virtual network segments, all
network ports, and more than 100 network protocols to identify targeted attacks, advanced threats, and ransomware. Our
agnostic approach to network traffic enables Deep Discovery to detect targeted attacks, advanced threats, and ransomware
from inbound and outbound network traffic, as well as lateral movement, C&C, and other attacker behavior across all phases
of the attack life cycle.
Extensive detection techniques use file, web, IP, mobile application reputation, heuristic analysis, advanced threat scanning,
custom sandbox analysis, and correlated threat intelligence to detect ransomware, zero-day exploits, advanced malware, and
attacker behavior.
Custom sandbox analysis uses virtual images tuned to precisely match an organization’s system configurations, drivers,
installed applications, and language versions. This approach improves the detection rate of advanced threats and
ransomware designed to evade standard virtual images.
Deep Discovery Analyzer, more commonly known as a pure sandbox, will automatically take IoCs from other security
products, detonate, analyze the threat, and automatically send the results back for further action. Deep Discovery
Analyzer can also help security analysts or threat hunters by accepting manual submissions of potential threats. This
simplifies the analysis by providing a definitive answer to potential threats and suspicious objects.
On the easy-to-read Sankey diagram (see above), you will be able to see every
step of the attack play out, dating back six months. XDR for Networks sequentially
extracts metadata from the network traffic and correlates the events in a graph
database for real-time visibility. This provides faster resolution with fewer people
involved and gives you a bigger picture of the full attack. In some cases, you may
think the attack started today, but in fact, the initial breach happened weeks ago. For details about what personal information we collect
and why, please see our Privacy Notice on our website at:
XDR for Networks will correlate the data and map out every step of the attack, https://www.trendmicro.com/privacy
giving you a better idea of how to respond and how to prevent future attacks.
are valuable parts of the Trend Micro Vision One solution, providing critical logs and [SB04_DD_Family_Solution_Brief_210326US]