|By PR Newswire||
|April 15, 2014 08:07 AM EDT||
DALLAS, April 15, 2014 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, today announced major upgrades to the Trend Micro™ Complete User Protection solution. As companies seek to transition to the cloud without compromising security or performance, Trend Micro has developed enhancements to meet growing demands for greater protection against next-gen threats and flexibility for deployment, management and pricing. Improvements span PC and mobile endpoints, email and collaboration, and Web security to enable integrated visibility and threat response. With "mix-and-match" support for cloud, hybrid and on-premise deployments, the solution updates are ideal for enterprises and mid-size businesses moving to the cloud.
"Trend Micro is leading the charge on delivering the most comprehensive threat protection against the latest security challenges," said Eric Skinner, vice president, solutions marketing, Trend Micro. "At the same time, we're listening to our customers who are asking for simplicity of security management, especially as cloud migration gains momentum. In response, our unique offering provides flexible management and licensing across cloud and on-premise environments, so customers have what they need regardless of where they are in the cloud adoption process."
In a March 2014 survey on technology adoption commissioned by Trend Micro and conducted by Forrester Consulting, a majority (77 percent) of global IT security decision makers acknowledged it was important, or very important, to have flexibility of cloud, on-premise or hybrid deployment, with the ability to recalibrate as requirements change. Trend Micro believes that its Complete User Protection solution uniquely addresses this concern by granting customers a blended offering of on-premise and SaaS deployments without having to switch environments.
New enhancements to the Complete User Protection solution, include:
- Application control enables category-based whitelisting and PC endpoint lockdown as an additional layer of protection against advanced malware and targeted attacks that evade signature-based defense
- Browser exploit detection protects against attacks directed at unpatched browser vulnerabilities
- Cloud-based secure Web gateway deployment as an alternative or complement to Trend Micro's existing on-premise Web gateway
- Improved endpoint encryption includes pre-boot authentication and management for Windows Bitlocker and MacOS FileVault native disk encryption
- User-centric visibility of the updated Trend Micro Control Manager central console, for better investigation and threat response, including dashboard status of incidents and compliance, and visibility across PC, Mac and mobile endpoints
- Refreshed vulnerability protection capabilities that proactively protect against exploits directed at operating system and application vulnerabilities until patches can be deployed
- Expanded hosted email security for inbound and outbound protection of Microsoft Office365 deployments
Improved management and licensing:
- Enhanced central management with user-centric visibility of threat incidents and other statuses with the ability to manage cloud and on-premise components in one integrated console
- Simplified all-inclusive suite packaging, enabling easy selection and ordering by customers and channel partners, providing cloud and on-premise capabilities with the ability to "mix-and-match" deployments
- Comprehensive suite options with only endpoint protection capabilities or bundled with mail, web and collaboration server and gateway security
- Per-user pricing on each suite with 24/7 support included, along with streamlined deployment and activation features to reduce IT workload
To reinforce its position as a threat defense expert, Trend Micro consistently earns impressive scores in third-party testing. In AV-TEST's February 2014 evaluation, the company tied for a perfect score in protection and scored number one overall across protection, performance and usability attributes. Trend Micro was also named a leader in the January 2014 Gartner Magic Quadrant for Endpoint Protection Platforms, which evaluates completeness of vision and ability to execute.
Customer feedback on Complete User Protection:
DCI Donor Services (DCI), which helps save and enhance lives through organ and tissue donation, is using the solution to support more than 300 employees and approximately 400-500 devices, including laptops and tablets.
"Since we deployed Trend Micro's security solutions, we've seen a decrease in time spent looking for security compromises," said Greg Bell, IT director, DCI Donor Services. "The user interface is simple and easy to manage, which helps us be as efficient as possible. Plus, it alerts us when there's a threat detected across endpoints, from laptops, to desktops or servers – we don't have to go out and find it. That allows us more time and resources to focus on our mission to save and enhance lives."
To learn more about how DCI Donor Services protects patient and donor data, watch: https://www.youtube.com/watch?v=Mm41P9LPmSc.
Availability: Trend Micro's updated Complete User Protection solution is shipping today in English-language editions. New licensing and packaging features launch in select U.S. markets today, with a global rollout throughout 2014.
For additional details about the new Complete User Protection solution, visit: http://www.trendmicro.com/switch.
About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.
SOURCE Trend Micro Incorporated
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Dec. 3, 2016 09:30 PM EST Reads: 1,758
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 3, 2016 09:30 PM EST Reads: 1,595
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Dec. 3, 2016 08:00 PM EST Reads: 1,742
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
Dec. 3, 2016 08:00 PM EST Reads: 3,950
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 3, 2016 06:15 PM EST Reads: 1,508
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 05:30 PM EST Reads: 4,040
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 3, 2016 05:15 PM EST Reads: 2,136
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 3, 2016 05:15 PM EST Reads: 1,998
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 3, 2016 04:30 PM EST Reads: 1,471
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Dec. 3, 2016 04:00 PM EST Reads: 4,859
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Dec. 3, 2016 03:30 PM EST Reads: 1,590
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Dec. 3, 2016 03:15 PM EST Reads: 3,222
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 3, 2016 03:00 PM EST Reads: 475
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 3, 2016 02:45 PM EST Reads: 786
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 3, 2016 02:45 PM EST Reads: 700