Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/7/2009
01:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro, BigFix Partner On Endpoint Security Management Solution

Solution will scale to the requirements of very large enterprises with more than 10,000 endpoints

Emeryville and Cupertino, Calif. - January 06, 2009 -- BigFix, Inc., a leading provider of high-performance enterprise systems and security management solutions, and Trend Micro Inc. (TSE:4704), a global leader in Internet content security, announced today a joint licensing agreement that will result in a comprehensive and modular Trend Micro endpoint security management solution, powered by the BigFix platform, that scales to the requirements of very large enterprises with more than 10,000 endpoints.

The first in a series of new endpoint modules anticipated to be available is the Trend Micro Web Protection Module, designed to proactively protect endpoints against Web threats and provide security enhancements to the BigFix platform. The Trend Micro Web Protection Module, which also works with existing endpoint anti-malware solutions, leverages the Trend Micro(tm) Smart Protection Network - a security infrastructure that uses light-weight clients to access its unique in-the-cloud correlation of email, Web and file reputation technologies, as well as extensive threat databases. Customers' protection is automatically updated and strengthened as more products, services and users access the network, creating a real-time neighborhood watch protection service for its users.

The planned integration of Trend Micro's Web Protection solution and the BigFix platform is expected to allow IT managers in very large enterprises to achieve easy deployment, management scalability and efficient control of their endpoints through BigFix's single-agent architecture and comprehensive, consolidated single-console views.

"The management capability of endpoint protection suites is a substantial differentiator," said Andrew Hanson, Research Analyst IDC. "By combining multiple correlated technologies into a single management framework, Endpoint Protection Platforms have the promise of increasing security while lowering complexity, cost and administrative overhead."

This relationship enhances Trend Micro Enterprise Security, which minimizes the time to protect organizations from content security risks. Powered by Trend Micro Smart Protection Network, Trend Micro Enterprise Security delivers immediate protection that improves automatically - closing the window of vulnerability - and reduces complexity by reducing the time to acquire, deploy and manage enterprise security.

BigFix is built on a high performance real-time, single agent, single management infrastructure architecture that provides continuous security, configuration assessment and remediation on the endpoints themselves regardless of connectivity--public or private networks, connected or disconnected. This architecture makes BigFix faster, more accurate, scalable, and more adaptive than traditional management solutions on IT infrastructures ranging up to 100,000s of endpoints.

BigFix helps customers simplify and automate infrastructure management, saving costs and improving service delivery by delivering pervasive real-time visibility and control of all endpoints across global networks. The BigFix management platform is also expected to complement the existing Trend Micro platform and plug-in architecture for OfficeScan, directed at enterprises under 10,000 seats.

"The BigFix-Trend Micro agreement changes the enterprise IT security landscape. The combination of BigFix's highly scalable and adaptable infrastructure management platform and Trend Micro's cloud-client technologies result in fully unified endpoint security solutions that cut costs and lowers security risks in ways that no other solution set can touch," said Amrit Williams, CTO of BigFix. "Customers can quickly adopt these solutions with high confidence of success, containing IT security costs, and freeing the enterprise to dedicate resources to more strategic business initiatives."

"Trend Micro Enterprise Security, now poised to be combined with the BigFix Platform for easier management, offers a powerful business case to very large enterprises grappling with the dual challenges of staying ahead of the increased threat environment and lowering the complexity of security management," said Thomas Miller, general manager of the enterprise business unit at Trend Micro. "Our value proposition of better, more immediate protection and less complexity is now taken to an even higher level."

Pricing and Availability The Trend Micro Web Protection Module is available now to new and current BigFix Endpoint Protection or Unified Management Platform customers for trial evaluation at no cost. Additional Trend Micro-branded endpoint security modules will be made available in Q1 2009. Both Trend Micro and BigFix plan to implement a continuous stream of value as new modules are made available through this business relationship. Pricing and availability of these new modules is available through Trend Micro and BigFix. For more information, please visit: http://us.trendmicro.com/us/solutions/enterprise/security-solutions/endpoint-security/bigfix/index.php

About BigFix: Founded in 1997, BigFix(r), Inc. is a leading provider of high-performance enterprise systems and security management solutions that revolutionizes the way IT organizations manage and secure their computing infrastructures. Based on a revolutionary architecture that distributes management intelligence directly to the computing devices themselves, BigFix is radically faster, scalable, more accurate and adaptive than legacy management software. Today, BigFix provides real-time visibility and control for over 8 million computing devices for 900 customers worldwide. The BigFix customer list counts many of the world's largest and most prestigious organizations in every industry including financial services, retail, education, manufacturing, and public sector agencies. More information can be found at www.bigfix.com.

About Trend Micro: Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these products and solutions are powered by the Trend Micro(tm) Smart Protection Network, a next generation cloud-client content security infrastructure designed to protect customers from Web threats. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

(c) 2008 BigFix, Inc. and Trend Micro Incorporated. All rights reserved. All company and product names mentioned herein may be trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23281
PUBLISHED: 2021-04-13
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to ro...
CVE-2021-27598
PUBLISHED: 2021-04-13
SAP NetWeaver AS JAVA (Customer Usage Provisioning Servlet), versions - 7.31, 7.40, 7.50, allows an attacker to read some statistical data like product version, traffic, timestamp etc. because of missing authorization check in the servlet.
CVE-2021-27600
PUBLISHED: 2021-04-13
SAP Manufacturing Execution (System Rules), versions - 15.1, 15.2, 15.3, 15.4, allows an authorized attacker to embed malicious code into HTTP parameter and send it to the server because SAP Manufacturing Execution (System Rules) tab does not sufficiently encode some parameters, resulting in Stored ...
CVE-2021-27601
PUBLISHED: 2021-04-13
SAP NetWeaver AS Java (Applications based on HTMLB for Java) allows a basic-level authorized attacker to store a malicious file on the server. When a victim tries to open this file, it results in a Cross-Site Scripting (XSS) vulnerability and the attacker can read and modify data. However, the attac...
CVE-2021-27602
PUBLISHED: 2021-04-13
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the sour...