Podcast
Questions and Answers
What are some examples of Cloud Apps mentioned in the text?
What are some examples of Cloud Apps mentioned in the text?
Microsoft 365, Google Workspace, Dropbox
Name two SIEM solutions mentioned in the text.
Name two SIEM solutions mentioned in the text.
Splunk, ArcSight
Which security tool is not mentioned in the text: (a) Qualys, (b) Tenable, (c) Checkpoint, (d) Fortinet
Which security tool is not mentioned in the text: (a) Qualys, (b) Tenable, (c) Checkpoint, (d) Fortinet
Fortinet
How can customers connect into the Trend Micro ecosystem?
How can customers connect into the Trend Micro ecosystem?
What does Trend Micro Threat Intelligence aim to provide organizations and individuals?
What does Trend Micro Threat Intelligence aim to provide organizations and individuals?
What kind of intelligence does Trend Micro researchers continually analyze and identify?
What kind of intelligence does Trend Micro researchers continually analyze and identify?
Give an example of a high-profile attack mentioned in the text that utilized exploits.
Give an example of a high-profile attack mentioned in the text that utilized exploits.
What is the average number of days Trend Micro protected customers before the vendor issued a patch in 2017?
What is the average number of days Trend Micro protected customers before the vendor issued a patch in 2017?
Why does the 72 days matter according to the text?
Why does the 72 days matter according to the text?
What does Trend Micro provide protection for, even in the absence of patches from the vendor?
What does Trend Micro provide protection for, even in the absence of patches from the vendor?
What is the benefit of TippingPoint customers being protected against the first phase of exploits?
What is the benefit of TippingPoint customers being protected against the first phase of exploits?
What is the potential downside of some competitors' security intelligence after a vulnerability is disclosed?
What is the potential downside of some competitors' security intelligence after a vulnerability is disclosed?
What does Trend Micro not do with the vulnerabilities acquired through the ZDI?
What does Trend Micro not do with the vulnerabilities acquired through the ZDI?
What is the potential impact of not being protected against variants of an exploited vulnerability?
What is the potential impact of not being protected against variants of an exploited vulnerability?
What is the purpose of ThreatLinQ threat intelligence portal?
What is the purpose of ThreatLinQ threat intelligence portal?
Where can customers point their browser to access the ThreatLinQ threat intelligence portal?
Where can customers point their browser to access the ThreatLinQ threat intelligence portal?
What is included in the Distributed weekly or as critical vulnerabilities emerge?
What is included in the Distributed weekly or as critical vulnerabilities emerge?
What can be created using the DVToolkit?
What can be created using the DVToolkit?
What can be defined or imported using the DVToolkit?
What can be defined or imported using the DVToolkit?
In what type of environments can custom filters be created using DVToolkit?
In what type of environments can custom filters be created using DVToolkit?
What is the purpose of the security filters written to cover the entire footprint of a vulnerability?
What is the purpose of the security filters written to cover the entire footprint of a vulnerability?
What company is associated with the TrendLinQ threat intelligence portal?
What company is associated with the TrendLinQ threat intelligence portal?