Trend Micro Launches Network VirusWall In India

by Hinesh Jethwani    May 06, 2004

Trend Micro launched its new Network VirusWall - touted as the ’industry’s first outbreak prevention appliance’ - in Mumbai today.

Call it plain coincidence, or a well-planned marketing strategy - the launch has found perfect timing, with the Sasser threat still looming in the market, and industry experts comparing the threat magnitude to the MS Blaster incident.

Speaking to CXOtoday on the occasion of the launch, Niraj Kaushik, country sales manager, Trend Micro India, said, “The Microsoft LSASS vulnerability exploited by the Sasser worm was released on 13th April, and we declared a yellow alert for the same on the 17th. The Indian security mindset is poised for a major paradigm shift. It is no longer threat assessment, which is critical to an enterprise today, but the enforcement of security policies that ultimately makes a difference. The largest financial institution in India today is still struggling to get rid of the Funlove virus, which was released way back in 1999.”

“Network VirusWall extends our Enterprise Protection Strategy into the network layer, and the product is immediately available at a price of Rs 2,50,000. In India, most attacks go unreported and the magnitude of the problem does not get fully recognized. Virus and worms, as well as the malware writers’ skills have evolved dramatically over the years. The appliance will be a boon for Indian companies which have data intensive, IP intensive or PC intensive environments.” Kaushik added.

VirusWall is designed to scan, detect, and block threats in a company’s network. The product will allow security administrators to block network viruses and identify vulnerable or non-compliant networked devices, to help mitigate or even eliminate their ability to be a propagation point for internal outbreaks.

Malware writers have found new ways to exploit known system and network vulnerabilities, taking the form of such network worms as Sasser, MSBlaster and Slammer, network viruses written small enough to embed on a single packet of information. Security administrators face an increasingly shorter time gap to patch their systems before a potential attack is launched.

For example, based on data from Trend Micro, Sasser just took 17 days for the outbreak after the vulnerability was reported, compared to a MSBlaster.A which took 26 days, and Nimda which took 336 days for the virus outbreak. Additionally, a growing dependence on networked devices has introduced more vulnerability points to networks, such as unprotected or infected mobile devices. At the same time, administrators have little precise information that helps them prioritize around which vulnerabilities are likely to become the source of an attack, and need an efficient way to isolate vulnerable areas of the network.

Clarifying a common misconception that Linux is not vulnerable to virus attacks, Kaushik explained, “There are quite a few Linux viruses floating around in networks today. As a caution, we have included 600 signatures in the VirusWall for viruses that target Linux, and it is really surprising to know that more than 50 % of these viruses have been intercepted in the last 12 months. This clearly points to the increase in Linux virus attacks, although Microsoft still remains a hot favorite for virus coders.”

Trend Micro is also looking to open a office in Bangalore, and has tied up with HCL Comnet and Wipro to promote the product.