• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Research Drives Protection

Research Drives Protection

  • Posted on:November 13, 2018
  • Posted in:Security, Vulnerabilities
  • Posted by:
    Jon Clay (Global Threat Communications)
0

The threat landscape has changed often in the 22 years I’ve been working at Trend Micro and it will continue to change for many more years. We in cybersecurity are constantly at battle with hackers and threat actors who look to infect our customers using the many tactics available to them. Our job is to ensure we can detect and protect against this onslaught of attacks. In order to do that we’ve had to invest heavily in research to better understand the many components of an attack, the actors themselves, and the threats used to compromise organizations. With 500,000 commercial customers and millions of consumers all over the world we have invested in multiple threat research facilities across the globe as well as security researchers located in many other areas where we feel a physical presence is needed.

Our newest center is in Toronto, Canada where we have invested in more vulnerability research team members who are helping us improve our customers’ security. Vulnerability research is one area where Trend Micro has been investing heavily over the last several years. Besides our own internal researchers, our Zero Day Initiative (ZDI), which is the largest agnostic bug bounty program in the world, gives us unprecedented visibility into the latest 0-day vulnerabilities that could be used to exploit our customers.  ZDI today helps us publish virtual patches 72 days on average before the formal patch is published by affected vendors.

Besides vulnerability research, we have to invest in other areas of the threat landscape since our customers will be targeted across their entire network. This means ensuring we have threat experts who have a deep knowledge of these threats.  Below you will see many of the different research areas we cover.

As you can see above, we use our research to regularly improve protection for our customers. It also drives our innovation which you can see in this interactive infographic has been extensive over the past 30 years Trend Micro has been in business.

We share our research in many ways as you can also see above. Besides updates for our customers we will publish regular blogs detailing the latest threats found, reports from our researchers as well as bi-annual reports focused on the past six or 12 months of threat activity we’ve seen. Through ZDI we responsibly disclose many vulnerabilities discovered by the programs 3,500+ outside researchers who submit bugs to use regularly.

While I can’t get into all the details of where Trend Micro invests in research I can let you check out a fun interactive infographic that can help you understand better what I’ve been talking about.  What does this all mean to you? Know that Trend Micro will continue to invest in areas we need to in order to better protect our customers.

Related posts:

  1. FIRST and Beyond – a History of Elevating Research through Partnerships
  2. How vulnerability research benefits both vendors and customers
  3. Accelerating AI Research to Improve Threat Protection
  4. Advancing threat protection through industry-leading research

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.