Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
1/9/2019
06:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Rolls Out IoT Security 2.0

Latest version of IoT security platform improves protection, visibility and control

DALLAS, January 9, 2019 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced the global launch of Trend Micro IoT Security (TMIS) 2.0 to help manufacturers and managed service providers improve the security of their products and the wider IoT ecosystem, while enabling them to drive competitive differentiation.

With most traditional security products, it’s not possible for end users to install protection for IoT solutions by themselves, which is where TMIS 2.0 comes in.

“IoT threats are no longer theoretical: endpoints around the globe are being hijacked for data theft, attacked with ransomware and crypto-mining malware, conscripted into DDoS botnets and more,” said Akihiko Omikawa, executive vice president of Trend Micro. “It’s vital that manufacturers step up to raise the bar on security. By integrating threat monitoring, detection and protection into the device itself, consumers and businesses will enhance their security from the moment they install and switch on TMIS 2.0. That’s the kind of value the market is increasingly demanding of IoT device makers.”

The TMIS 2.0 platform can be pre-installed onto IoT devices during the product development lifecycle, requiring minimum deployment effort and providing maximum protection through a range of system hardening and risk detection features. 

This updated version offers tight integration with Trend Micro’s industry-leading threat intelligence platform the Smart Protection Network to offer a Web Reputation Service and IoT Reputation Service which block visits to malicious URLs/websites.

The improved installation script makes integration easier for device makers and IoT MSPs, and provides new capabilities to automate security learnings for these firms with less operational effort.

Reports on vulnerabilities, virtual patch deployment and more are emailed to administrators and device makers to provide more flexible management capabilities. A security detection log is stored locally and can be accessed by the device maker for each specific purpose (e.g. to show red light on the device).  TMIS 2.0 also boasts an offline mode and proxy support for a wider range of networking environments.

All of these enhancements come alongside the product’s comprehensive range of security capabilities: Application Whitelisting, Hosted Intrusion Prevention Services (HIPS), and System Vulnerability Scanning.

Together, they work to reduce the device attack surface, ensure firmware integrity and block active attacks — minimizing cyber risk for the end customer but also keeping device maintenance costs as low as possible while burnishing the corporate reputation of the device maker/MSP. 

More information of Trend Micro IoT Security, please visit: Trend Micro IoT Solutions

 

About Trend Micro

Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud workloads, networks, and endpoints. With more than 6,000 employees in 50 countries and the world’s most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world. For more information, visit www.trendmicro.com.

 

###

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4231
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
CVE-2020-4232
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.
CVE-2020-4233
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerabilit...
CVE-2020-4244
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an unauthorized user to obtain sensitive information through user enumeration. IBM X-Force ID: 175422.
CVE-2020-4245
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 175423.