Welcome!

News Feed Item

Trend Micro Enhances Complete User Protection Solution to Address Demand for Greater Flexibility in Deployment and Management of Security

Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment

DALLAS, April 15, 2014 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, today announced major upgrades to the Trend Micro™ Complete User Protection solution. As companies seek to transition to the cloud without compromising security or performance, Trend Micro has developed enhancements to meet growing demands for greater protection against next-gen threats and flexibility for deployment, management and pricing. Improvements span PC and mobile endpoints, email and collaboration, and Web security to enable integrated visibility and threat response. With "mix-and-match" support for cloud, hybrid and on-premise deployments, the solution updates are ideal for enterprises and mid-size businesses moving to the cloud.

"Trend Micro is leading the charge on delivering the most comprehensive threat protection against the latest security challenges," said Eric Skinner, vice president, solutions marketing, Trend Micro. "At the same time, we're listening to our customers who are asking for simplicity of security management, especially as cloud migration gains momentum. In response, our unique offering provides flexible management and licensing across cloud and on-premise environments, so customers have what they need regardless of where they are in the cloud adoption process."

In a March 2014 survey on technology adoption commissioned by Trend Micro and conducted by Forrester Consulting, a majority (77 percent) of global IT security decision makers acknowledged it was important, or very important, to have flexibility of cloud, on-premise or hybrid deployment, with the ability to recalibrate as requirements change. Trend Micro believes that its Complete User Protection solution uniquely addresses this concern by granting customers a blended offering of on-premise and SaaS deployments without having to switch environments.

New enhancements to the Complete User Protection solution, include:

Protection capabilities:

  • Application control enables category-based whitelisting and PC endpoint lockdown as an additional layer of protection against advanced malware and targeted attacks that evade signature-based defense
  • Browser exploit detection protects against attacks directed at unpatched browser vulnerabilities
  • Cloud-based secure Web gateway deployment as an alternative or complement to Trend Micro's existing on-premise Web gateway
  • Improved endpoint encryption includes pre-boot authentication and management for Windows Bitlocker and MacOS FileVault native disk encryption
  • User-centric visibility of the updated Trend Micro Control Manager central console, for better investigation and threat response, including dashboard status of incidents and compliance, and visibility across PC, Mac and mobile endpoints
  • Refreshed vulnerability protection capabilities that proactively protect against exploits directed at operating system and application vulnerabilities until patches can be deployed
  • Expanded hosted email security for inbound and outbound protection of Microsoft Office365 deployments

Improved management and licensing:

  • Enhanced central management with user-centric visibility of threat incidents and other statuses with the ability to manage cloud and on-premise components in one integrated console
  • Simplified all-inclusive suite packaging, enabling easy selection and ordering by customers and channel partners, providing cloud and on-premise capabilities with the ability to "mix-and-match" deployments
  • Comprehensive suite options with only endpoint protection capabilities or bundled with mail, web and collaboration server and gateway security
  • Per-user pricing on each suite with 24/7 support included, along with streamlined deployment and activation features to reduce IT workload

To reinforce its position as a threat defense expert, Trend Micro consistently earns impressive scores in third-party testing. In AV-TEST's February 2014 evaluation, the company tied for a perfect score in protection and scored number one overall across protection, performance and usability attributes. Trend Micro was also named a leader in the January 2014 Gartner Magic Quadrant for Endpoint Protection Platforms, which evaluates completeness of vision and ability to execute. 

Customer feedback on Complete User Protection:
DCI Donor Services (DCI), which helps save and enhance lives through organ and tissue donation, is using the solution to support more than 300 employees and approximately 400-500 devices, including laptops and tablets.

"Since we deployed Trend Micro's security solutions, we've seen a decrease in time spent looking for security compromises," said Greg Bell, IT director, DCI Donor Services. "The user interface is simple and easy to manage, which helps us be as efficient as possible. Plus, it alerts us when there's a threat detected across endpoints, from laptops, to desktops or servers – we don't have to go out and find it. That allows us more time and resources to focus on our mission to save and enhance lives."

To learn more about how DCI Donor Services protects patient and donor data, watch: https://www.youtube.com/watch?v=Mm41P9LPmSc.

Availability: Trend Micro's updated Complete User Protection solution is shipping today in English-language editions. New licensing and packaging features launch in select U.S. markets today, with a global rollout throughout 2014.

For additional details about the new Complete User Protection solution, visit: http://www.trendmicro.com/switch.

About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Leading cloud-centric IT organizations are establishing core capabilities to improve productivity, control costs and provide a highly responsive end-user experience. Key steps along this journey include creating an end-user cloud services catalog, automating workflows and provisioning, and implementing IT showback and chargeback. In his session at 19th Cloud Expo, Mark Jamensky, executive vice president of Products at Embotics, will walk attendees through an in-depth case study of enterprise I...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...