Breach Detection Systems Test Report

Thumb original nss labs report 2

NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 v3.8SP2 (this product is also sold as TippingPoint Advanced Threat Protection) with OfficeScan 11.0.5102 Service Pack 1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation.
While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.

View study
Date: 21 September 2016, 7:35 am   |   Provider: Trend Micro Deutschland GmbH   |   Size: 566 KB   |   Language: English
This may interest you too:
Thumb original forrester cloud security whitepaper  1

The State Of Public Cloud Security

Part One Of A Three-Part Series On Public Cloud Security

Forrester found that organizations today are ceding much of the control over cloud security to developers, who lack both the expertise and the desire to fully enforce cloud security policies, for fear of being left out of the conversation. Cloud managers often cited time as a critical factor for not implementing the ideal security tools, policies, and practices. Establishing different levels of security for different workloads will help your organization find a balance between cost, ti ...

To the download
Thumb original forrester balancing act paper final

The Cloud Manager’s Balancing Act - Balancing Security And Cost Without Sacrificing Time-To-Value

Part Two Of A Three Part Series On Public Cloud Security

Application developers are migrating to the cloud with or without the support of IT and security, motivated by the agility and speed that the cloud can provide. This is changing the fundamental equation that cloud managers have to solve when balancing cost, appropriate security, and time-to-value.
This paper follows “The State Of Public Cloud Security,” which serves as a primer on current best practices in public cloud security.

Download this Whitepaper for more details. ...

To the download
Thumb original produkt1 okta gettingstartedwithzerotrust final

Getting Started with Zero Trust

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that orga ...

To the download
Thumb original en vmware forbes exec summary v6

SPECIAL REPORT: Enterprises Across Europe, the Middle East and Africa Slowly Embrace Cybersecurity Challenges

This report, which is based on a Forbes Insights survey of 451 enterprises across Europe, and another 200 within the Middle East and Africa, explores the state of cybersecurity in these regions and how the perceptions of business leaders and security practitioners vary on these issues. We focus primarily on the European findings but have noted where there are noticeable differences among the regions. We also provide recommendations on how companies in Europe and in the Middle East and Africa can better protect their businesses.

To the download
Thumb original idr infographic automation is essential for cyber resilience final july 2019  1

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download