In the current approach to file-based threat handling, patterns (or definitions) required
to
protect an endpoint are, for the most part, delivered on a scheduled basis. Patterns
are
delivered in batches from Trend Micro to endpoints.
When a new update is received, the virus/malware prevention software on the endpoint
reloads this
batch of pattern definitions for new virus/malware risks into memory. If a new virus/malware
risk
emerges, this pattern once again needs to be updated partially or fully and reloaded
on the
endpoint to ensure continued protection.
Over time, there has been a significant increase in the volume of unique emerging
threats. The
increase in the volume of threats is projected to grow at a near-exponential rate
over the coming
years. This amounts to a growth rate that far outnumbers the volume of currently known
security
risks. Going forward, the volume of security risks represents a new type of security
risk. The
volume of security risks can impact server and workstation performance, network bandwidth
usage,
and, in general, the overall time it takes to deliver quality protection - or "time
to
protect".
A new approach to handling the volume of threats has been pioneered by Trend Micro that aims to make Trend Micro customers immune to the threat of
virus/malware volume. The technology and architecture used in this pioneering effort
leverages
technology that off load the storage of virus/malware signatures and patterns to the
cloud. By
off loading the storage of these virus/malware signatures to the cloud, Trend Micro is able to provide better protection to
customers against the future volume of emerging security risks.