Trend Micro Brings Industry’s Most Comprehensive XDR Platform to Asia Pacific, Middle East, and Africa
A locally-hosted data lake will be fully operational in Sydney on 1 November, addressing data sovereignty concerns for Australia and New Zealand customers
SYDNEY, 12 August, 2020 – Trend Micro Incorporated (TYO: 4704), the leader in cloud security, today announced that its XDR suite is officially available in Asia Pacific, Middle East, and Africa (AMEA). In Australia and New Zealand, select customers are in the process of doing the proofs of concept (POCs) for XDR. A Sydney data lake is scheduled to be up and running in full force on 1 November, allowing XDR data to be processed in-country. This will strengthen data sovereignty for customers operating in highly regulated sectors.
Trend Micro XDR is the first in the cybersecurity industry that offers the most extensive correlated detection going beyond endpoint detection and response (EDR). It collects and analyses activity data from emails, endpoints, servers, cloud workloads, and networks, enabling security operations centre (SOC) teams to detect, investigate, and respond to threats more effectively.
Today’s SOC analysts are up against sophisticated threats that are designed to circumvent the most advanced protection. Adding fire to the fuel is the massive volume of alerts they have to triage on a daily basis. Low job satisfaction and cybersecurity talent shortage are commonplace challenges for SOCs.
Trend Micro’s XDR is designed to address such operational nightmares in a SOC. It delivers three major benefits, unparalleled by any other existing point solution:
Reducing alert fatigue: XDR automatically correlates and analyses data from multiple security vectors to tell a bigger story. With XDR, level one SOC analysts no longer have to comb through mountains of noisy alerts and logs to identify a potential attack. XDR does it automatically for them and generates a few high-fidelity alerts instead of a thousand low-confidence ones, significantly reducing alert volume.
Powerful workbench that provides contextual visibility for alerts: The XDR dashboard presents attacks in a visualised manner, enabling SOC analysts to see the different stages, attack vectors, dwell time, and the spread and impact. XDR also offers contextually aware response options so SOC analysts can take quick actions within the platform.
Augmenting SIEM and effortless API integration: Trend Micro XDR augments SIEM for the SOC team, with centralisation of normalised data and incident response capability that improve operational efficiency and productivity. XDR provides pre-built SIEM connector for Splunk to pull high-fidelity alerts into SIEM dashboards. For customers with their preferred SIEM solution, a public API can be used for the integration.
Trend Micro’s XDR is also available as a managed service (MDR), to further alleviate the pressure of constrained in-house teams. The MDR team conducts 24/7 full-threat analysis and threat hunting, and provides response plans and remediation recommendations.
“EDR is only one piece of the whole detection and response puzzle. It’s great but it has limited reach, as it only collects data on the endpoints. To have integrated visibility across multiple security vectors is a top-priority item on any SOC’s to-do list. And XDR ticks that box”, says Dhanya Thakkar, senior vice president for AMEA. “There has been tremendous demand from our customers in the region for XDR capabilities since last year. Now they will be able to have the full XDR experience.”
“XDR gives us an additional dimension in threat detection – it allows for faster correlation of endpoints events to related services, such as network and email, to help us quickly identify entry point and the spread of infection visually. This is a tremendous boost to the efficiency of our incident response teams”, shares Ian Loe, Senior Vice President, Cybersecurity, Infrastructure & Performance Architecture, at NTUC Enterprise Co-operative Limited.