The Changing Threat Landscape - Zift Solutions
The Changing Threat Landscape - Zift Solutions
The Changing Threat Landscape - Zift Solutions
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Comparative Testing continued<br />
leaving the company, they can also secure<br />
commonly targeted data such as credit<br />
card numbers or personally identifying<br />
information such as Social Security<br />
numbers. WFBS-A was the only product<br />
tested that allowed the user to dictate what<br />
content should be protected in their unique<br />
business environment.<br />
Securing the email attack vector poses<br />
increasing challenges. With an everincreasing<br />
level of unwanted emails such as<br />
those with malware as well as phishing and<br />
spam, it’s imperative to have good multi-layer<br />
protection against these ever-present threats.<br />
All the vendor products tested provide<br />
malware detection for email-based<br />
malicious threats, but WFBS-A was the<br />
only product which offered host-based<br />
spam blocking capabilities based on<br />
IP addresses. This IP-based spam<br />
technology was able to detect 89% of<br />
spam with all functionality except the<br />
POP3 plug-in disabled. When the spam<br />
content filtering technology was fully<br />
enabled WFBS-A’s multi-layered antispam<br />
technologies blocked 96% of the<br />
spam it received, using a combination<br />
of IP-reputation technology and content<br />
scanning technology.<br />
To help protect the mobile user, Worry-Free<br />
Business Security now contains Location<br />
Awareness, which provides both in- and outof-office<br />
security policy control for the Trend<br />
Micro Firewall, Web <strong>Threat</strong> Protection, and<br />
TrendSecure technologies, which are key<br />
components of the overall WFBS-A solution.<br />
In the tests carried out by West Coast Labs,<br />
Worry-Free Business Security accurately<br />
identified the transition from the known-good<br />
network to that of the new one. <strong>The</strong> settings<br />
were recorded as switching to the Out-of-<br />
Office technology and users were protected as<br />
if they were still within the corporate network.<br />
<strong>The</strong> tests showed that Trend Micro’s<br />
s<br />
9