Welcome!

News Feed Item

Trend Micro Enhances Complete User Protection Solution to Address Demand for Greater Flexibility in Deployment and Management of Security

Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment

DALLAS, April 15, 2014 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, today announced major upgrades to the Trend Micro™ Complete User Protection solution. As companies seek to transition to the cloud without compromising security or performance, Trend Micro has developed enhancements to meet growing demands for greater protection against next-gen threats and flexibility for deployment, management and pricing. Improvements span PC and mobile endpoints, email and collaboration, and Web security to enable integrated visibility and threat response. With "mix-and-match" support for cloud, hybrid and on-premise deployments, the solution updates are ideal for enterprises and mid-size businesses moving to the cloud.

"Trend Micro is leading the charge on delivering the most comprehensive threat protection against the latest security challenges," said Eric Skinner, vice president, solutions marketing, Trend Micro. "At the same time, we're listening to our customers who are asking for simplicity of security management, especially as cloud migration gains momentum. In response, our unique offering provides flexible management and licensing across cloud and on-premise environments, so customers have what they need regardless of where they are in the cloud adoption process."

In a March 2014 survey on technology adoption commissioned by Trend Micro and conducted by Forrester Consulting, a majority (77 percent) of global IT security decision makers acknowledged it was important, or very important, to have flexibility of cloud, on-premise or hybrid deployment, with the ability to recalibrate as requirements change. Trend Micro believes that its Complete User Protection solution uniquely addresses this concern by granting customers a blended offering of on-premise and SaaS deployments without having to switch environments.

New enhancements to the Complete User Protection solution, include:

Protection capabilities:

  • Application control enables category-based whitelisting and PC endpoint lockdown as an additional layer of protection against advanced malware and targeted attacks that evade signature-based defense
  • Browser exploit detection protects against attacks directed at unpatched browser vulnerabilities
  • Cloud-based secure Web gateway deployment as an alternative or complement to Trend Micro's existing on-premise Web gateway
  • Improved endpoint encryption includes pre-boot authentication and management for Windows Bitlocker and MacOS FileVault native disk encryption
  • User-centric visibility of the updated Trend Micro Control Manager central console, for better investigation and threat response, including dashboard status of incidents and compliance, and visibility across PC, Mac and mobile endpoints
  • Refreshed vulnerability protection capabilities that proactively protect against exploits directed at operating system and application vulnerabilities until patches can be deployed
  • Expanded hosted email security for inbound and outbound protection of Microsoft Office365 deployments

Improved management and licensing:

  • Enhanced central management with user-centric visibility of threat incidents and other statuses with the ability to manage cloud and on-premise components in one integrated console
  • Simplified all-inclusive suite packaging, enabling easy selection and ordering by customers and channel partners, providing cloud and on-premise capabilities with the ability to "mix-and-match" deployments
  • Comprehensive suite options with only endpoint protection capabilities or bundled with mail, web and collaboration server and gateway security
  • Per-user pricing on each suite with 24/7 support included, along with streamlined deployment and activation features to reduce IT workload

To reinforce its position as a threat defense expert, Trend Micro consistently earns impressive scores in third-party testing. In AV-TEST's February 2014 evaluation, the company tied for a perfect score in protection and scored number one overall across protection, performance and usability attributes. Trend Micro was also named a leader in the January 2014 Gartner Magic Quadrant for Endpoint Protection Platforms, which evaluates completeness of vision and ability to execute. 

Customer feedback on Complete User Protection:
DCI Donor Services (DCI), which helps save and enhance lives through organ and tissue donation, is using the solution to support more than 300 employees and approximately 400-500 devices, including laptops and tablets.

"Since we deployed Trend Micro's security solutions, we've seen a decrease in time spent looking for security compromises," said Greg Bell, IT director, DCI Donor Services. "The user interface is simple and easy to manage, which helps us be as efficient as possible. Plus, it alerts us when there's a threat detected across endpoints, from laptops, to desktops or servers – we don't have to go out and find it. That allows us more time and resources to focus on our mission to save and enhance lives."

To learn more about how DCI Donor Services protects patient and donor data, watch: https://www.youtube.com/watch?v=Mm41P9LPmSc.

Availability: Trend Micro's updated Complete User Protection solution is shipping today in English-language editions. New licensing and packaging features launch in select U.S. markets today, with a global rollout throughout 2014.

For additional details about the new Complete User Protection solution, visit: http://www.trendmicro.com/switch.

About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation," he said in making the announcement.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of the 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to gre...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develop...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprises are adopting Kubernetes to accelerate the development and the delivery of cloud-native applications. However, sharing a Kubernetes cluster between members of the same team can be challenging. And, sharing clusters across multiple teams is even harder. Kubernetes offers several constructs to help implement segmentation and isolation. However, these primitives can be complex to understand and apply. As a result, it’s becoming common for enterprises to end up with several clusters. Thi...