Endpoint Security: Evolving With The Threats They Mitigate
Evolution is a continuous process, and nothing can exemplify the process better in our industry than the threats we defend against. From simple pranks and nuisances, they’ve become thieves of information, violators of privacy, destroyers of reputations and even saboteurs of businesses, all for the sake of money. They’ve also become tools for activists and terrorists of the cyber variety, used to make strong statements against governments or organizations.
But as such threats evolve, so must the security solutions that defend against them, or be left in the dust. This is our ethos in Trend Micro – that the protection we provide for our customers not only improve with every version we come out with, but continuously evolve into more powerful, more efficient and more impenetrable to cybercriminal attacks.
Our latest infographic, Trend Micro Endpoint Security Technology Evolution: A Complete Approach to Security, illustrates this. Using the visualization of a tree taking root and sprouting branches from its tree trunk, we catalog the evolution of cybercrime as well as the technologies we developed to address those malicious evolutions.
Take malware, for example, one of the main tools of cybercrime.From its primal state as a prank program to how it’s become a money-making machine, we’ve not only developed one but three technologies to address it:
- Signature-based Scanning, which identifies, isolates and deletes malware by matching it to a specific malware signature/pattern;
- Heuristic Behavior Scanning, which detects polymorphic malware through its malicious behavior, and;
- File Reputation Services, which identifies and blocks malware through their history, sources, behavior and reputation.
Each of these technologies work in conjunction with each other, as well as those that address the other tools of cybercrime – to provide a well-rounded and balanced approach to security that families and businesses deserve.
Incoming search terms