Trend Micro Advances Healthcare Industry Cyber Threat Intelligence Collection and Sharing
November 06, 2015
HITRUST to Deploy Trend Micro Deep Discovery across 50 Healthcare Organizations

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704TSE: 4704), a global leader in security software solutions, today announced that, according to a recent HITRUST evaluation in support of its HITRUST Cyber Threat Exchange (CTX), Trend Micro Deep Discovery has detected and discovered 286 times more indicators of compromise (IOC) than other participants in the evaluation. In addition, 24 percent of the IOCs found by Trend Micro were deemed unique when compared to threat intelligence available through public sources. The evaluation demonstrated Deep Discovery, an advanced breach detection system, could provide comprehensive threat intelligence, while securely and seamlessly submitting them to the CTX in near real time. Regardless of a participant’s technical maturity and availability of resources, the solution improved collection and distribution challenges, addressing major findings in a recent review of HITRUST CTX. As a result, Deep Discovery will be leveraged across 50 HITRUST CTX organizations.

“The frequency and pervasiveness of attacks against the healthcare industry demonstrate the risk all organizations face as the demand and value of electronic medical records continue to accelerate in the cybercriminal underground,” said Tom Kellermann, chief cybersecurity officer, Trend Micro. “In cybersecurity, accuracy, timing and completeness of data help determine whether or not an organization is able to respond quickly and efficiently to an attack. A key issue identified by HITRUST is one we see in most industries – organizations readily consume threat intelligence, but only a few are willing to share data – and if they do, it is often incomplete or after the fact. Leveraging industry-leading breach detection capabilities in a high tech, low touch approach significantly enhances the quality and speed that threat data is delivered.”

HITRUST CTX automates the collection and analysis of threats and distributes actionable indicators electronically to participants. Organizations are encouraged to share their own cyber threat indicators, enabling better analysis and threat correlation for increased protection.

“Over the last three years, we have continuously improved the capabilities of our cyber threat intelligence sharing and analysis infrastructure to address industry requirements including better analytics, alerting, distribution and integration,” said Daniel Nutkis, CEO, HITRUST. “One area we have consistently struggled with has been collecting timely and complete IOCs from organizations across the healthcare industry, especially those with less technical capabilities and resources. As a result of our review, HITRUST CTX has been updated to support seamless data collection from Deep Discovery and we are recommending that organizations evaluate breach detection systems as a component of their cyber strategy.”

“With Deep Discovery, Rush University Medical Center can monitor the entire network for attacks, analyze malware using sandboxing, and quickly assess and react to the threat,” said Jaime Parent, associate CIO & vice president, IT Operations, Rush University Medical Center.

To read the complete set of HITRUST CTX findings and recommendations, please visit

Deep Discovery is an advanced threat protection platform that enables organizations to detect, analyze, and respond to targeted attacks. Using specialized detection engines, custom sandboxing, and global threat intelligence from the Trend Micro™ Smart Protection Network™, Deep Discovery defends against attacks that are invisible to standard security products. Deployed individually or as an integrated solution, Deep Discovery solutions for network, email, endpoint, and integrated protection provide advanced threat protection. For more information, please visit

About Trend Micro

Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 26 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit


Trend Micro Incorporated
Thomas Moore, 972-499-6648


Public Company Information: