Welcome!

News Feed Item

Trend Micro Reports Results for Q4 and Fiscal Year 2013

TOKYO, Feb. 19, 2014 /PRNewswire/ -- Trend Micro Incorporated (TSE: 4704; TYO 4704), a global leader in security software and solutions, announced earnings results for the fourth quarter and consolidated revenue for fiscal year 2013, ending Dec. 31, 2013.

For the fourth quarter, Trend Micro posted consolidated net sales of 28,428 million Yen (or US $282 million, 100.61 JPY = 1USD). The company posted operating income of 7,663 million Yen (or US $76 million) and net income of 4,656 million Yen (or US $46 million) for the quarter.

For 2013, Trend Micro posted consolidated net sales of 108,314 million Yen (or US $1,108 million, 97.72 JPY=1USD). The company also reported operating income of 29,450 million Yen (or US $301 million) and net income of 19,595 million Yen (or US $200 million).

Based on information currently available to the company, consolidated net sales for the year ending December 31, 2014 is expected to be 112,000 million Yen (or US $1,120 million, based on an exchange rate of 100 JPY = 1USD). Operating income and net income are expected to be 30,100 million Yen (or US $301 million) and 19,100 million Yen (or US $191 million), respectively.

Growth rate figures are calculated from Japanese Yen results. Some discrepancy may therefore be noted in US Dollar comparisons owing to fluctuations in currency conversion rates.

"Trend Micro was able to successfully conclude the year with a variety of achievements, including an acquisition and partnership expansion," said Eva Chen, CEO, Trend Micro. "Combined with our corporate social responsibility efforts, including our important work with the UN, we are reinforcing our commitment to making the world safe for exchanging digital information for customers and the public alike."

Q4 2013 Business Highlights

Trend Micro announced its acquisition of Broadweb, a Taiwan-based provider of advanced network security solutions. Broadweb's technology integrates with Trend Micro's existing capabilities for custom defense and enhances the company's network protection against targeted attacks and advanced threats.

The company launched its Educational Technology Grant program as part of its mission to promote digital literacy and citizenship among youth. As part of the grant, Trend Micro has made financial contributions and offered professional services and software to 12 schools across the U.S.

Trend Micro partnered with CSC to protect global enterprises against cyberthreats. The partnership provides global threat intelligence through the Trend Micro™ Smart Protection Network™ infrastructure to keep corporate networks and data safe.

The company showcased its comprehensive security solution for Amazon Web Services at AWS re:Invent 2013. The solution includes key security capabilities such as anti-malware, firewall, intrusion prevention, encryption, and application scanning, and empowers organizations to address their responsibilities under the AWS shared responsibility model.

As part of its mission and commitment to making the world safe for exchanging digital information, Trend Micro announced its partnership with the United Nations' International Telecommunication Union to provide ongoing cybersecurity support. The relationship better equips ITU's 193 Member States, as well as more than 700 private-sector entities and academic institutions, with the latest info to fight cyber threats globally.

With the goal to anticipate evolving security concerns and to inspire stakeholders to take action, Trend Micro released a nine-part video series called "2020: The Series," depicting a future driven by innovation, while highlighting the challenges of technology dependence in the year 2020. The series garnered a viral response from tens of thousands of viewers worldwide.

Trend Micro announced its training sponsorship of winter Olympic hopefuls for the 2014 winter games. The company sponsored 12 skiers with Flying Ace Productions, a team of handpicked, world champion athletes from all over the U.S., as they prepared for the games in Sochi, Russia.

Awards and Recognitions for Q4 2013

Trend Micro™ Integrated Data Loss Prevention awarded DLP Solution of the Year by Computing Security Awards.

V3 Technology Awards named Trend Micro™ Worry-Free™ 8.0 Best SMB Security Product.

Trend Micro was named a Top 500 Global Software Company for 2013 by Software Magazine.

CRN listed Trend Micro as one of the Best Companies to Partner with in 2013.

Patents

Trend Micro was awarded the following patents in Q4 2013:

Patent


8516582


Method and system using designated template hosts for real time classification of events in a computer integrity system

Patent


8520848


Secure password management using keyboard layout

Patent 


8527631


Web site reputation service using proxy auto-configuration

Patent


8549282


Method and system for monitoring encrypted data transmissions

Patent


8549309


Asymmetric content fingerprinting with adaptive window sizing

Patent


8554907


Repudiation prediction of IP addresses

Patent


8560692


User-specific cache for URL filtering

Patent


8560466


Method and arrangement for automatic charset detection

Patent


8561188


Command and control channel detection with query string signature

Patent


8566317


Apparatus and method for scalable object clustering

Patent


8566921


Method and system for protecting a computer system during boot operation

Patent


8572739


Detection of malicious module injected on legitimate processes

Patent


8578477


Secure computer system integrity check

Patent 


8578482


Cross site script detection and prevention

Patent


8578499


Script-based scan engine embedded in a webpage for protecting computers against web threats

Patent


8584240


Community scan for web threat protection

Patent


8584233


Providing Malware-Free Web Content to End Users Using Dynamic Templates

Patent


8595840


Detection of Computer Network Data Streams from a Malware and its Variants

Patent


8601064


Techniques for defending an email system against malicious sources

Patent


8601583


Certification of Virtual Machine in Cloud Computing Environments

Patent


8601584


Protection of Computers Against Argument Switch Attacks

Patent


8607345


Generic malware downloader detection and prevention

Patent


8606772


Efficient Multiple-Keyword Match Technique with Large Dictionaries

Patent 


8607342


Evaluation of Incremental Backup Copies for Presence of Malicious Codes in Computer Systems

Patent


8612523


Detecting botnets using attack characteristics

Patent


8621611


Verification of Webpage Integrity

 

Notice Regarding Forward-Looking Statements

Certain statements that are made in this release are forward-looking statements. These forward-looking statements are based on management's current assumptions and beliefs in light of the information currently available to it, but involve known and unknown risks and uncertainties. Many important factors could cause actual results to differ materially from those expressed in forward-looking statements. These factors include:

  • Difficulties in addressing new virus and other computer security problems
  • Timing of new product introductions and lack of market acceptance for new products
  • The level of continuing demand for, and timing of sales of, existing products
  • Rapid technological change within the antivirus software industry
  • Changes in customer needs for antivirus software
  • Existing products and new product introductions by competitors and pricing of those products
  • Declining prices for products and services
  • The effect of future acquisitions on our financial condition and results of operations
  • The effect of adverse economic trends on principal markets
  • The effect of foreign exchange fluctuations on our results of operations
  • An increase in the incidence of product returns
  • The potential lack of attractive investment targets and
  • Difficulties in successfully executing our investment strategy

About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

Copyright © 2014 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend micro t-ball logo, Smart Protection Network and Worry-Free are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners.

Media Contact:
Thomas Moore
thomas_moore@trendmicro.com
972-499-6648

Contact: Investor Relations
Tel: +81-3-5334-4899
ir@trendmicro.co.jp

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
910Telecom exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and exchanges.
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.