Now In APAC, Gulf Africa. Detect-Investigate-Respond

Trend Micro XDR collects and analyses activity data from emails, endpoints, servers, cloud workloads, and networks, enabling security operations center (SOC) teams to detect, investigate, and respond to threats more effectively.

BANGALORE, Aug 12, 2020 (BNC Network): Cloud security leader Trend Micro Incorporated (TYO: 4704), today announced that its XDR suite is officially available in Asia Pacific, Middle East, and Africa (AMEA).

Trend Micro XDR is the first in the cybersecurity industry that offers the most extensive correlated detection going beyond endpoint detection and response (EDR). It collects and analyzes activity data from emails, endpoints, servers, cloud workloads, and networks, enabling security operations center (SOC) teams to detect, investigate, and respond to threats more effectively.

Today’s SOC analysts are up against sophisticated threats that are designed to circumvent the most advanced protection. Adding fire to the fuel is the massive volume of alerts they have to triage on a daily basis. Low job satisfaction and cybersecurity talent shortage are commonplace challenges for SOCs across the region.

Trend Micro’s XDR is designed to address such operational nightmares in a SOC. It delivers three major benefits, unparalleled by any other existing point solution:

Reducing alert fatigue: XDR automatically correlates and analyzes data from multiple security vectors to tell a bigger story. With XDR, level one SOC analysts no longer have to comb through mountains of noisy alerts and logs to identify a potential attack. XDR does it automatically for them and generates a few high-fidelity alerts instead of a thousand low-confidence ones, significantly reducing alert volume.

Powerful workbench that provides contextual visibility for alerts: The XDR dashboard presents attacks in a visualized manner, enabling SOC analysts to see the different stages, attack vectors, dwell time, and the spread and impact. XDR also offers contextually aware response options so SOC analysts can take quick actions within the platform.

Augmenting SIEM and effortless API integration: Trend Micro XDR augments SIEM for the SOC team, with centralization of normalized data and incident response capability that improve operational efficiency and productivity. XDR provides pre-built SIEM connector for Splunk to pull high-fidelity alerts into SIEM dashboards. For customers with their preferred SIEM solution, a public API can be used for the integration.

Trend Micro’s XDR is also available as a managed service (MDR), to further alleviate the pressure of constrained in-house teams. The MDR team conducts 24/7 full-threat analysis and threat hunting, and provides response plans and remediation recommendations.

“EDR is only one piece of the whole detection and response puzzle. It’s great but it has limited reach, as it only collects data on the endpoints. To have integrated visibility across multiple security vectors is a top-priority item on any SOC’s to-do list. And XDR ticks that box”, says Dhanya Thakkar, senior vice president for AMEA. “There has been tremendous demand from our customers in the region for XDR capabilities since last year. Now they will be able to have the full XDR experience.”

“XDR gives us an additional dimension in threat detection – it allows for faster correlation of endpoints events to related services, such as network and email, to help us quickly identify entry point and the spread of infection visually. This is a tremendous boost to the efficiency of our incident response teams”, shares Ian Loe, Senior Vice President, Cybersecurity, Infrastructure & Performance Architecture, at NTUC Enterprise Co-operative Limited.

Trend Micro’s XDR is recently named by Forrester as a Leader in enterprise detection and response, and achieved the highest initial detection in the MITRE ATT&CK Framework.