Welcome!

News Feed Item

Trend Micro Enhances Complete User Protection Solution to Address Demand for Greater Flexibility in Deployment and Management of Security

Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment

DALLAS, April 15, 2014 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, today announced major upgrades to the Trend Micro™ Complete User Protection solution. As companies seek to transition to the cloud without compromising security or performance, Trend Micro has developed enhancements to meet growing demands for greater protection against next-gen threats and flexibility for deployment, management and pricing. Improvements span PC and mobile endpoints, email and collaboration, and Web security to enable integrated visibility and threat response. With "mix-and-match" support for cloud, hybrid and on-premise deployments, the solution updates are ideal for enterprises and mid-size businesses moving to the cloud.

"Trend Micro is leading the charge on delivering the most comprehensive threat protection against the latest security challenges," said Eric Skinner, vice president, solutions marketing, Trend Micro. "At the same time, we're listening to our customers who are asking for simplicity of security management, especially as cloud migration gains momentum. In response, our unique offering provides flexible management and licensing across cloud and on-premise environments, so customers have what they need regardless of where they are in the cloud adoption process."

In a March 2014 survey on technology adoption commissioned by Trend Micro and conducted by Forrester Consulting, a majority (77 percent) of global IT security decision makers acknowledged it was important, or very important, to have flexibility of cloud, on-premise or hybrid deployment, with the ability to recalibrate as requirements change. Trend Micro believes that its Complete User Protection solution uniquely addresses this concern by granting customers a blended offering of on-premise and SaaS deployments without having to switch environments.

New enhancements to the Complete User Protection solution, include:

Protection capabilities:

  • Application control enables category-based whitelisting and PC endpoint lockdown as an additional layer of protection against advanced malware and targeted attacks that evade signature-based defense
  • Browser exploit detection protects against attacks directed at unpatched browser vulnerabilities
  • Cloud-based secure Web gateway deployment as an alternative or complement to Trend Micro's existing on-premise Web gateway
  • Improved endpoint encryption includes pre-boot authentication and management for Windows Bitlocker and MacOS FileVault native disk encryption
  • User-centric visibility of the updated Trend Micro Control Manager central console, for better investigation and threat response, including dashboard status of incidents and compliance, and visibility across PC, Mac and mobile endpoints
  • Refreshed vulnerability protection capabilities that proactively protect against exploits directed at operating system and application vulnerabilities until patches can be deployed
  • Expanded hosted email security for inbound and outbound protection of Microsoft Office365 deployments

Improved management and licensing:

  • Enhanced central management with user-centric visibility of threat incidents and other statuses with the ability to manage cloud and on-premise components in one integrated console
  • Simplified all-inclusive suite packaging, enabling easy selection and ordering by customers and channel partners, providing cloud and on-premise capabilities with the ability to "mix-and-match" deployments
  • Comprehensive suite options with only endpoint protection capabilities or bundled with mail, web and collaboration server and gateway security
  • Per-user pricing on each suite with 24/7 support included, along with streamlined deployment and activation features to reduce IT workload

To reinforce its position as a threat defense expert, Trend Micro consistently earns impressive scores in third-party testing. In AV-TEST's February 2014 evaluation, the company tied for a perfect score in protection and scored number one overall across protection, performance and usability attributes. Trend Micro was also named a leader in the January 2014 Gartner Magic Quadrant for Endpoint Protection Platforms, which evaluates completeness of vision and ability to execute. 

Customer feedback on Complete User Protection:
DCI Donor Services (DCI), which helps save and enhance lives through organ and tissue donation, is using the solution to support more than 300 employees and approximately 400-500 devices, including laptops and tablets.

"Since we deployed Trend Micro's security solutions, we've seen a decrease in time spent looking for security compromises," said Greg Bell, IT director, DCI Donor Services. "The user interface is simple and easy to manage, which helps us be as efficient as possible. Plus, it alerts us when there's a threat detected across endpoints, from laptops, to desktops or servers – we don't have to go out and find it. That allows us more time and resources to focus on our mission to save and enhance lives."

To learn more about how DCI Donor Services protects patient and donor data, watch: https://www.youtube.com/watch?v=Mm41P9LPmSc.

Availability: Trend Micro's updated Complete User Protection solution is shipping today in English-language editions. New licensing and packaging features launch in select U.S. markets today, with a global rollout throughout 2014.

For additional details about the new Complete User Protection solution, visit: http://www.trendmicro.com/switch.

About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Hostway Services, Inc. and WSM International have partnered to deliver trouble free migration services for any organization that wishes to bring their IT infrastructure to Hostway's Azure managed cloud services. WSM is the leader in providing turn-key IT migration services since 2003 and is now the preferred provider to any Hostway customer that is seeking to move its computer infrastructure to the Hostway Azure-based cloud.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?