15
TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY 1 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security Trend Micro™ Titanium™ 2011: State-of-the-Art Endpoint Security Smarter, Faster, Simpler How the Titanium Family Provides What Users Require in an Endpoint Security Product v1.0 A Trend Micro Whitepaper | September 2010

Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

1 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Trend Micro™

Titanium™ 2011: State-of-the-Art Endpoint Security Smarter, Faster, Simpler

How the Titanium Family Provides What Users Require in an Endpoint Security Product v1.0

A Trend Micro Whitepaper | September 2010

Page 2: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

2 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Contents 1. EXECUTIVE SUMMARY ................................................................................................................................ 3

2. WHAT CONSUMERS WANT – AND DON’T WANT – IN AN ENDPOINT SECURITY PRODUCT ............................ 3

3. TREND RESPONDS: THE NEW TITANIUM FAMILY ......................................................................................... 4

TITANIUM PROVIDES BETTER PROTECTION .......................................................................................................................... 4 TITANIUM IS FASTER AND MORE EFFICIENT .......................................................................................................................... 9 TITANIUM IS EASIER TO USE ............................................................................................................................................ 12

4. THE RESULT: TITANIUM IS SMARTER, FASTER, AND SIMPLER ...................................................................... 14

5. ABOUT TREND MICRO ............................................................................................................................... 15

Page 3: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

3 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

1. Executive Summary Consumers complain that their endpoint security software is complex, intrusive, and eats up system resources, even as they continue to demand the best antimalware protection their money can buy. In response, Trend Micro has created Titanium, a new family of consumer endpoint security products, that’s smarter, faster, and simpler to use than its predecessors. Not only is Trend Micro Titanium™ more user-friendly, it has a significantly reduced impact on system resources, while maintaining the comprehensive security protections users require.

This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art endpoint security in three main areas: protection, performance, and ease-of-use.

2. What Consumers Want – and Don’t Want – in an Endpoint Security Product

As the Internet has expanded across the globe, threats to computer security have also grown. Long gone are the days when mass viruses or worms were unleashed upon an unwitting public merely to boost a hacker’s notoriety. Nowadays, users are more apt to be exposed to blended, stealthy, or well-targeted threats that will steal your identity, your data, or your money, while you’re not looking—or even when you are.

In response, security companies have added layer upon layer to their endpoint security products, to address the fact that threats can come from multiple vectors—from the Web or email, from instant messaging or social networking sites, from infected files, hidden rootkits, or leaky networks—or a treacherous combination thereof. But as the volume and variety of threats has grown, so has the technical burden on the typical endpoint security product, with the result that good security is often had at the expense of a slower computer—higher CPU, memory, and hard disk usage—and annoying, intrusive pop-ups that only software engineers can understand.

When you add complex configuration settings and cluttered user interfaces to the picture, it’s no wonder that consumer surveys identify security software at the top of their list of computer troublemakers. A recent survey conducted by Trend Micro tags security software as approximately twice as troublesome as gaming, audio, and video software, the second, third, and fourth in line.

And when asked what users most dislike about security software, system resource usage rose to the top of the list. This was followed by high price, slow scanning/performance, too many pop-up messages, and the complaint that security software is often difficult to use and understand.

Figure 1. Security Software is the Most Problematic

Figure 2. What Users Dislike Most About Security Software

Page 4: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

4 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

So what’s a user to do? Uninstall the security software and expose oneself to the wilds of the Internet? Of course not. That’s a prescription for disaster. Trend Micro has a real solution: it has reengineered its consumer endpoint security product so it’s simpler and faster—while still providing top-notch protection from all the threats on the Internet. The result is Trend Micro Titanium™ and it promises to improve users’ bad opinion of security software.

3. Trend Responds: The New Titanium Family Trend Micro Titanium™ is a new family of powerful, easy-to-use, and efficient endpoint security products targeted for consumers, ranging from entry-level protection to a mid-range Internet suite and a full-fledged solution for high-end users:

• Titanium Antivirus + provides light and fast basic protection for netbooks, laptops, and entry-level computers

• Titanium Internet Security provides advanced protection for the mid-range with maximum performance • Titanium Maximum Security provides the complete, high-end endpoint security solution for protecting

your PC.

Each product is the successor to and upgrade for a previous Trend Micro product; namely Trend Micro AntiVirus, Trend Micro Internet Security, and Trend Micro Internet Security Pro respectively. And each product meets three important criteria to qualify as a superior endpoint security product:

• Better protection. Titanium’s core technologies provide state-of-the-art protection from a wide variety of threats.

• More efficient. Titanium scans faster, uses less CPU, and has a smaller footprint in memory and on disk than competing security products on the market today.

• Easier to use. Titanium’s user interface is uncluttered, easy to use, and specifically designed for the consumer market.

This whitepaper explores each criterion in turn.

Titanium Provides Better Protection Even as users want simpler and more efficient endpoint security products—issues from the survey addressed below—first and foremost they still want the best threat protection their money can buy. To meet this core criterion, the Titanium family has been engineered to provide superior, proven, state-of-the-art endpoint security protection from a wide variety of threats.

Each member in the Trend Micro Titanium family provides strong multilayered protections from viruses, spyware, rootkits, bots, and blended Web threats; while the more advanced siblings include spam prevention in POP3/SMTP email, parental controls, data theft prevention, and protection from unauthorized changes to your system. Titanium Maximum Security also provides safety when using Wi-Fi connections and includes system optimization tools to help your computer run smoothly and efficiently.

Page 5: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

5 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Table 1. Multi-level Endpoint Security: The Trend Micro Titanium 2011 Family

High-Level Features

Trend Micro Titanium

Antivirus +

Trend Micro Titanium Internet Security

Trend Micro Titanium

Maximum Security

Description

Default Protection √ √ √ During installation, Titanium pre-scans your computer for threats. As soon as Titanium is installed, default protections are put in place immediately to protection the user.

Antivirus and Anti-Spyware

√ √ √ Antivirus and Anti-spyware protections extend from real-time background to on-demand and scheduled scanning. Instant Messaging and POP3/SMTP Email clients are protected from viruses and rootkits.

Advanced Web Threat Protection

√ √ √ Users are warned of unsafe Web pages and blocked from access. A new “browser guard” feature for IE protects against malicious scripts. URL ratings are also provided for Instant Messaging and Web-based email (Yahoo! Mail, MSN, and AIM).

Anti-Spam √ √ Anti-spam features include image spam blocking, “Worry-Free click” for embedded links in email, and a spam filter folder.

Unauthorized Change Prevention

√ √ Behavior monitoring blocks suspicious changes to your system including executables that could “phone home” as part of a bot.

Data Theft Protection

√ √ Blocks private information, such as credit card numbers and passwords, stolen through web browsers, email clients, and instant messaging applications.

Parental Controls √ √ URL Filtering blocks family members from accessing inappropriate websites by category and workday/weekend schedules.

Windows Firewall Optimization

√ √ Windows Firewall “boosters” add a Network Virus Scan and an Intrusion Detection System to increase network protections.

System Optimization

System Tuner improves PC performance by recovering disk space, cleaning the registry, removing temporary files, or controlling application startup. Privacy settings help delete cookies, browser or application histories, or instant messaging logs.

Remote File Lock √ Trend Micro Vault is a password-protected Windows folder that can safeguard your sensitive files. If your computer is lost, it automatically seals itself shut by remote control.

Secure Erase √ Overwrites unwanted files with random data, so that no one can retrieve the contents. Permanent Erase option meets US Government security standards.

Trend Micro Toolbar

√ Rates the reputation of pages, websites, and web search results. Checks for security risks in links to websites received through Instant Messaging or Webmail.

Wi-Fi Protection √ Checks the reputation of available wireless networks or hotspots and warns against those that pose a security risk.

To provide its wide set of protections, Titanium uses various underlying strategies and technologies, including the following:

Page 6: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

6 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Smart Protection Network Integration. Titanium is integrated with the Trend Micro Smart Protection Network (SPN), a next-generation cloud-client content security infrastructure. The SPN delivers security that is smarter than conventional approaches by blocking the latest threats before they reach a user’s PC or a company’s network. Leveraged across Trend Micro’s solutions and services, the Trend Micro SPN combines unique Internet-based—or “in-the-cloud”— technologies with lighter-weight clients, such as Titanium. By incorporating in-the-cloud reputation, as well as “smart” scanning and correlation technologies, the SPN reduces reliance on conventional pattern file downloads and eliminates the delays commonly associated with desktop updates. Users benefit from increased network bandwidth, reduced utilization of processing power, and associated cost savings.

Spelling out these components further, Titanium in combination with the SPN provides the following:

Reputation Technologies. While browsing the web, receiving an email, or doing a memory or disk scan, Titanium variously checks websites, domains, email IP addresses, and files against continuously updated and correlated SPN reputation databases in the cloud. Bad reputations are blocked, good are allowed through, and unknown or ambiguous ones are warned against or blocked. This means Titanium customers always have immediate access to the latest Trend Micro protection wherever they connect to the Internet.

Correlation with Behavior Analysis. The SPN Network, along with the Anti-Malware Solution Platform (AMSP) underlying Titanium, also use “correlation” technologies along with behavioral analysis in the back end and on the client to correlate blended threat activities to determine if they are malicious. Although a single email or other component of a Web threat may appear innocuous, several activities used in conjunction can create a malicious result. So a holistic view—gained by examining the relationship between and across the different components of a potential threat—is required to determine if a threat is actually present. Cloud-based and local correlation, combined with behavior analysis, protect the user in real time against blended threats.

Smart Scanning. Titanium utilizes a Smart Scan engine, residing on the end user’s computer, which references the above reputation, correlation, and behavior analysis technologies for real-time, on-demand, and scheduled scanning. The Smart Scan state-of-the-art cloud-client scanning processes help to greatly reduce the volume of signatures on the client, whether on disk or in memory. Additionally, Titanium scans efficiently when doing a normal Quick, Full, or Scheduled Scan. If it finds excessive threats, it automatically switches to an Intensive Scan mode, to scan the computer more deeply.

Unauthorized Change Prevention. Unknown or disguised threats can pose a serious problem to naïve users, particularly when they come in the form of Fake Antivirus software posing as protection from the very infection it causes when you install it. That’s why Titanium Internet Security and Maximum Security also provide an unauthorized change prevention module that watches for suspicious behavior right on your system, then allows you to block it when it tries to alter your registry or system files. This means that, if an unknown threat has somehow been able to bypass the previous proactive layers in Titanium, unauthorized changes can still be blocked on the user’s computer.

Offline Protection. Indeed, while Titanium utilizes cloud-based reputation services and Smart Scan to protect online users—and most threats arise when users are online—offline users are still protected from malware that can get on your computer through portable USB hard drives or thumb drives. Real-time scans of memory combine with a behavior monitoring module to block autorun of executables to keep the offline user protected in real-time. On-demand scans use the local index of the cloud-based signatures to stop malicious files. And the AMSP foundation provides local correlation in the client to help track blended threats that may begin with a file that seems innocent at first blush, but that is actually malicious when analyzed in the context of a multi-stage infection strategy.

Smart Feedback. Additionally, because all Trend Micro solutions act as a single, cohesive security platform, the built-in automatic Smart Feedback module within Titanium provides continuous communication between all Trend Micro products and services and Trend Micro’s threat research centers and technologies in a two-way update stream to ensure rapid and optimal protection against the latest threats.

Page 7: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

7 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Threat Intelligence. Finally, Trend Micro supplements automated and manual user feedback and submissions with internal research culled from researchers located in labs spread across the globe. Multilingual staff members at TrendLabs—Trend Micro’s global network of research, service and support centers—respond in real time, providing 24/7 threat surveillance and attack prevention to detect, pre-empt, and eliminate attacks. Using a combination of technologies and data collection methods—including Honey Pots, Web crawlers, customer and partner submissions, Smart Feedback, and TrendLabs threat research—Trend Micro proactively gains intelligence about the latest threats. This threat data is analyzed and correlated in real time via queries of Trend Micro’s malware knowledge databases in the Internet cloud and by TrendLabs research, service, and support centers.

State-of-the-Art Endpoint Security and Real-World Testing. In the modern world, where most threats arise from the Web and can combine multiple vectors, the real proof of an endpoint security product’s ability to protect its users can only be obtained by tests that examine how users actually get infected by Web, domain, email, and file-related threats and how the product protects against them in the real world. Gone are the days when a vendor, test lab, or product reviewer can simply dump a collection of malware on a computer’s hard drive, run a scan and report on the results, and thereby conclude they know how well an endpoint security product works. Such results from the old testing methodology, still promoted by some vendors, ignores the fact the cross-correlated, cloud-based protections in Titanium are specifically designed to proactively stop such a massive infection scenario from happening. Thus, a new “real-world” model for testing is required.1

1. Examine the exposure, infection, and execution layers in the attack process.

This new model for testing, pioneered by Trend Micro, can (among other things):

2. Examine at what layers the attack is stopped (i.e., proactively, at the exposure or infection layers, before it gets to the user’s hard disk, which is better; or reactively, at the execution layer, when the malware is on disk and tries to execute). Vendors, like Trend Micro, that stop more attacks proactively have less to catch reactively, at the execution layer.

3. Assess the time it takes to protect the user from the first appearance of the malware in the wild.

NSS Labs (Carlsbad, California, www.nsslabs.com) is one among several testing labs that has adopted the new, total protection testing model required to examine how well products actually protect their users in the real world. In recent tests reported in NSS Labs Report, “Endpoint Protection Products Test Report for Socially Engineered Malware”, September 2010, where over 1100 malware were directed over the Internet to competing endpoint security products, Titanium Maximum Security came out on top in three key criteria2

1. Zero Hour Blocks. The percentage of malware blocked upon first exposure to the endpoint.

:

2. Malware Caught Before Execution. The percentage of malware blocked before being executed on the endpoint. (Includes first and repeated exposures.)

3. Time-to-Protect. The average time after first exposure for the security vendor to provide a block to new threats. (Includes first and repeated exposures.)

1 For details on the scope and importance of using new, real-world methods for testing endpoint security products, readers are encouraged to click: http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html. 2 The results of a fourth indicator, “Total Protection”, are pending.

Page 8: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

8 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Figure 3. Zero Hour Blocks | Endpoint Protection Products Test Report for Socially Engineered Malware, Comparative Test Results, NSS Labs Report, September 2010

Figure 4. Malware Caught Before Execution | Endpoint Protection Products Test Report for Socially Engineered Malware, Comparative Test Results, NSS Labs Report, September 2010

Note: The catch rate percentages given here focus on the proactive, cloud-based Smart Protection Network side of the equation. Titanium—and all Trend Micro products—supplement these protections with additional client-based technologies to increase protection levels up to 95%.

Page 9: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

9 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Figure 5. Time to Protect: Endpoint Protection Products Test Report for Socially Engineered Malware, Comparative Test Results, NSS Labs Report, September 2010

In conclusion, Trend Micro’s Smart Protection Network strategy clearly puts it at the head of the pack for total average protection rates. Indeed, Trend Micro’s philosophy—that its best to stop malware before it touches the user’s computer—defines the true goal of Titanium’s state-of-the-art endpoint security protection.

Titanium is Faster and More Efficient Next, as our survey indicated, users want better performance from their security software. In response, Titanium has been specifically engineered to provide improved, optimal performance on netbooks, laptops, and desktops. Its first goal was to make the product faster and more efficient than its predecessors. A second, equally important goal, was to outpace its competitors.

Titanium has met the first goal for a number of key indicators. Across multiple tests that Trend Micro has conducted, it has improved performance across the board, as shown in the table below comparing Titanium Maximum Security against its predecessor.

Note: The internal figures below differ from the third-party results following because different computer systems and configurations were used in the tests.

Page 10: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

10 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Table 2. Performance Improvement Benchmarks

Performance Index Trend Micro

Internet Security Pro 2010

Trend Micro Titanium

Maximum Security 2011

Percentage of Improvement

Memory Footprint on Windows 7 (Idle) (MB)

115 60 47.83%

Disk Utilization (MB) 637 437 31.40%

Boot Time (User Experience) (Sec) 97 69 28.87%

Quick Scan Time (Sec) 120 16 86.67%

Full Scan Time (Initial) Min) 27.18 22.48 17.29%

Full Scan Time (Succeeding) (Min) 29.5 13.76 53.36%

Full Scan Time vs (CPU Utilization (%) 31 26 16.13%

Local File Copy (Internal Sample) (Sec) 405 267 43.07%

Network File Copy (Internal Sample) (Sec) 132 117 11.36%

To judge the success at meeting the second goal, recent performance tests of Titanium Maximum Security 2011 versus a set of competitors were conducted by the Tolly Group (Boca Raton, Florida), completed in August-September 2010. Results include the following key performance indicators, as given in the Tolly Report #210142: Trend Micro Titanium Maximum Security 3.0: Consumer Endpoint Security Performance vs K7, Kaspersky, McAfee, & Symantec, Tolly Group, September 2010.3 An appendix detailing the test protocols and individual results more fully is available in the Tolly document #210142A. Both are available on www.tolly.com.

Figure 6. Boot to Desktop. Tolly Report #210142. Tolly Group, August 2010.

Boot to Desktop. Security systems can impact how long it takes a computer to boot. To test this impact, Tolly Group measured the six endpoint security solutions for their affects on the boot time from the display of the BIOS text to the point where the Windows desktop could accept user input. Titanium tied for first with McAfee Total Protection for the shortest boot time in this test, as indicated here.

Note: Tolly Group also tested boot times using the Microsoft Velocity Test Suite (VTS), which measures boot time using "Boot to Desktop" and "Boot to Complete" criteria. While the data obtained in these tests are not a formal part of the published study (because VTS is an OEM tool), the results show that Trend Micro actually had the fastest boot times of all vendors tested.

3 The solutions under test were Trend Micro Titanium Maximum Security 2011 (v3.0.1303), K7 – K7 TotalSecurity (v10.0.00.31), Kaspersky PURE (v0.0.0.192), McAfee Total Protection 2010 (v10.5.195), Symantec Norton Internet Security 2011 (v18.1.0.30), and Symantec Norton 360 (v4.1.0.32).

Page 11: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

11 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Figure 7. System Memory Footprint - Busy. Tolly Report #210142. Tolly Group, August 2010.

System Memory Footprint When Busy. When conducting a full scan, the amount of memory taken up by a security product can increase—sometimes dramatically. To assess this, Tolly examined the system memory footprint of Titanium while a full scan was being conducted and compared it with the five other endpoint security products. Titanium came in first place for this test, as indicated below.

Figure 8. CPU Usage - Busy. Tolly Report #210142. Tolly Group, August 2010.

CPU Usage When Busy. Also when conducting a full scan, the CPU usage taken up by the endpoint security system can increase dramatically. In the Tolly tests, Titanium came out on top for the least amount of CPU usage when conducting a full scan. Tolly reports also that CPU usage can fluctuate during a scan and that Kaspersky PURE sometimes used 100% CPU during its scan.

Figure 9. Network Copy. Tolly Report #210142. Tolly Group, August 2010.

Network File Copy. Because security systems hook into the network processes (e.g., doing network scans, etc.) they can affect the time it takes to copy files over a network. To test the affects of the six endpoint security programs on network copying, Tolly Group copied a 6GB corpus of files from a network share to the test endpoint system. Titanium took the least amount of time to copy the 6GB file corpus, showing it had the least affect on network copying, as indicated here.

Note: Tested in default configuration. Titanium does not scan ZIP files by default, though it can be configured to do so.

Page 12: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011 | STATE-OF-THE-ART ENDPOINT SECURITY

12 - White Paper | Trend Micro™ Titanium™ 2011 | State-of-the-Art Endpoint Security

Titanium is Easier to Use Finally, as indicated in our survey, users also want their security product to be easier to use. In response, Titanium has been built with a “set it and forget it” philosophy, to address those who complain that security software is too complex, intrusive, and difficult to use; however, when users want controls, Titanium provides them appropriately. Users don’t have to be IT managers to configure options.

Figure 10. Trend Micro Titanium Antivirus +

Figure 11. Trend Micro Titanium Internet Security

Figure 12. Trend Micro Titanium Maximum Security

Modular Design. The Titanium family is built on the Trend Micro Anti-Malware Solution Platform (AMSP), a framework for managing and correlating core modules. Its modular design and “uniclient” strategy means that each edition builds on the prior one, adding modules to the simpler package, as partially shown in the screens above. The modules work in a “plug-in” fashion to the AMSP, which also means new functionality can be more easily adopted, integrated, and sustained by Trend Micro engineers, while providing better performance and a lighter-weight package. For users, upgrading is as simple as buying a new serial number. Titanium Internet Security or Maximum Security installs the additional modules over the existing edition to fulfill the upgrade. Downgrading is the reverse: the extra modules are removed while the core of the simpler edition remains.

A Simpler Console. Titanium presents a widget-style user interface in the main Console that’s informative, intuitive, and uses up minimal screen real estate. Titanium eliminates the redundant action buttons of the previous products (e.g., TIS and TIS Pro), provides a multi-tasking user interface, enables a single email address/password protection function for the Console, and presents all the management tools a user needs in a simple, up-front manner, as shown in the following screens:

Figure 13. Titanium Console Dashboard

Protection Status. The first thing users are interested in is their Protection Status. Titanium immediately displays the status of their protection with a sign (e.g., a check, exclamation, or X mark) and a description in the header area, as well as in the details of the Security Summary panel of the Main Console. Easier Scanning. Users can easily do a manual scan on demand. At the click of a mouse, the Scan tool executes a Quick Scan in a matter of seconds; or using the Scan popup menu, the user can conduct a Full or Custom scan with designated targets on demand. Scans can also be scheduled for any or every day of the week at a time designated by the user.

Page 13: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011| STATE-OF-THE-ART ENDPOINT SECURITY

13 - White Paper | Trend Micro Titanium 2011 | State-of-the-Art Endpoint Security

Figure 14. Titanium Protection Settings

Easier Configuration. Protection Settings are also available at the click of a mouse. Using Maximum Security as an example, settings for Virus & Spyware Controls, Internet & Email Controls, Exception Lists, and Other Settings require just a few clicks. Additionally, Titanium only provides useful and necessary configuration controls and makes important security decisions for the end user. Unlike its competitors, Titanium does not overburden the consumer with too many controls they don’t understand and which are better suited to business products configured by network administrators.

Figure 15. Security Reports

Intuitive Security Reports. Clicking the Security Reports tool in the main screen of the Console displays a graphical security report that shows you a pie chart of Threat Types Found by percentage, along with a Threat History for the past week, month, 3 or 6 months, or year, also selectable by Threat Type. You can also view detailed logs of violations by Threat Type (e.g. Viruses, Web Threat, etc.). Additionally, users are provided with new security tips whenever they open the Console.

Figure 16. Extra Tools

Extra Tools. Both Titanium Internet Security and Titanium Maximum Security provide additional Tools, accessible at the click of a mouse. Internet Security provides Data Theft Prevention and Parental Controls. Maximum Security adds a System Tuner, Secure Erase, the Trend Micro Vault, and online access to the Free Tool Center, where you can try tools for free or purchase them as you wish. The System Tuner is also available in the main Console window.

Figure 17. Simple Notification Controls

Simple Notification Controls. Titanium takes the philosophy that “less is more.” For example, users have the option to configure Titanium to display real-time notifications of viruses and spyware when a critical threat is endangering their computer. The control for this is simple to enable or disable.

Page 14: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011| STATE-OF-THE-ART ENDPOINT SECURITY

14 - White Paper | Trend Micro Titanium 2011 | State-of-the-Art Endpoint Security

Figure 18. Scan Results

Figure 19. Clear and Simple Notification

Clearer and Simpler Notifications. In addition, Titanium’s notifications are clear, accurate, and simple to understand, so users know exactly what to do next when the security situation requires action on their part. Also, Titanium has fewer pop-ups because aggregates its notifications when multiple types of malware are detected. Cookies detection is kept separated from spyware detection, since most scans delete cookies placed on your computer from browser activity, which leads users to falsely believe their antispyware isn’t blocking spyware from their computer. Finally, hotlinks provide more details or definitions for user, to help them better understand a security issue or a function of the product.

4. The Result: Titanium is Smarter, Faster, and Simpler When taken together, it’s clear why the Titanium family of endpoint security products provides state-of-the-art protection for its users. Titanium is smarter because it leverages multi-layered, multi-vector proactive protection with the Smart Protection Network, providing global real-time security for all its users. Titanium is faster, leaner, and more efficient because it leverages key technologies such as cloud-client reputation services, while optimizing performance on the the client. And Titanium is simpler because its core AMSP plug-in architecture and widget-style interface eliminates the clutter and confusion rampant today in most endpoint products.

September 2010

---

Copyright © September 2010 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, TrendLabs, and Trend Micro Titanium are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.

Page 15: Titanium™ 2011: State-of-the-Art Endpoint Securitysolutionfile.trendmicro.com/solutionfile/Titanium3... · This whitepaper shows how Trend Micro Titanium 2011 provides state-of-the-art

TREND MICRO™ TITANIUM™ 2011| STATE-OF-THE-ART ENDPOINT SECURITY

15 - White Paper | Trend Micro Titanium 2011 | State-of-the-Art Endpoint Security

5. About Trend Micro Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest web threats.

Visit TrendWatch at http://www.trendmicro.com/go/trendwatch to learn more about the threats and Trend Micro™ Smart Protection Network™ infrastructure. Trend Micro’s flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro’s trusted security solutions are sold through its business partners worldwide. Please visit http://www.trendmicro.com.

Copyright © 2010 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, and Titanium are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.

Legal Notice: Trend Micro licenses this product in accordance with terms and conditions set forth in the License Agreement inside this package. If you wish to review the License Agreement prior to purchase, visit: www.trendmicro.com/license. If you (or the company you represent) do not agree to these terms and conditions, promptly return the product and package to your place of purchase for a full refund.

Protected by United States Patent No. 5,951,698.