Mobile
2/26/2014
12:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Evolves Mobile Security Solutions, Elevating Capabilities for Combating Cyber Threats And Data Loss For Businesses, Consumers

New solutions will help mitigate threats to mobile networks and devices

PR Newswire -- February 24, 2014

DALLAS and BARCELONA, Spain, Feb. 24, 2014 /PRNewswire/ -- At the Mobile World Congress today, Internet security pioneer Trend Micro Incorporated (TYO: 4704;

TSE: 4704) revealed a set of solutions to combat the unprecedented array of cyber attacks that are continually victimizing individuals and enterprises via mobile platforms. The new solutions will help mitigate threats to mobile networks and devices, including product enhancements to support enterprises and consumers alike.

At Mobile World Congress 2014 (Hall 6 - Booth 6L61), Trend Micro CEO and co-founder Eva Chen along with other Trend Micro experts will share the company's vision for mobile security, as well as launch three new solutions that span enterprise and consumer markets.

These innovative solutions are designed to defend against fast-evolving, sophisticated threats to provide IT administrators with greater control over corporate devices and offer consumers an enhanced user experience. The solutions

include:

-- Safe Mobile WorkForce provides secure mobile access to corporate data

from mobile devices and an improved user experience, while providing the

mobile user data through a remote operating system delivered to their

mobile device.

-- Trend Micro Mobile Security is a multi-platform security solution to

secure users' data and privacy on Google Android, Apple iOS and Amazon

Kindle devices. The solution provides first-rate secure web browsing,

privacy guidance for Facebook settings, threat protection and lost

device protection, data backup and parental controls.

-- Mobile App Reputation is the world's first mobile app evaluation service

that identifies new and existing malware verifies the reputations of

mobile applications and provides threat defense during downloads. The

Mobile App Reputation scans, blocks and identifies millions of hazardous

apps from a variety of global online sources and has played a pivotal

role in detecting and thwarting malicious apps' damage at the BlackBerry

app store, BlackBerry World.

"Mobile threats continue to grow in intensity and sophistication, and Trend Micro is committed to utilizing our proven expertise to address these challenges," said Chen. "In 2014, mobile will become the attack vector of choice for cyber criminals, as the number of Android threats alone is expected to climb to more than 3 million. As cloud-based applications and BYOD policies become mainstream, both employees' and companies' sensitive data are at risk. Our comprehensive solutions will keep this information safe without impeding the mobile experience."

Trend Micro is at the forefront of mobile threat research, identifying where attacks will come from and how users can best defend themselves. In Trend Micro's 2013 Mobile Threat Report, threat researchers reported that mobile threats are moving beyond apps and Android's vulnerabilities and are inconsistent with industry standards, developing a less secure mobile ecosystem.

In 2013, TrendLabs researchers predicted that malicious and high-risk Android malware would exceed 1 million by the year's end - a figure that took PC malware a decade to reach. Now, TrendLabs predicts that figure will reach 3 million in 2014.

The effectiveness of Trend Micro solutions are reinforced through its partnership with BlackBerry(r). Trend Micro further identifies and blocks repackaged Android apps before they are sold on the BlackBerry(r) World(TM) storefront. The Trend Micro Mobile App Reputation service identifies and flags potential threats as either "malicious" or "high-risk" to prevent harm to devices and networks.

"Keeping our customers protected from security concerns, such as malware, remains a top priority at BlackBerry," said Scott Totzke, senior vice president for Security at BlackBerry. "By leveraging Trend Micro's app scanning capabilities with our comprehensive app vetting program, BlackBerry Guardian, we are providing customers with another layer of protection to help ensure that applications within our store are as safe as possible."

To learn more about Trend Micro's mobile security solutions, visit:

http://www.trendmicro.com/us/home/products/mobile-solutions/index.html

About Trend Micro

Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem.

All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro(TM) Smart Protection Network(TM) infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: At least with wireless, my coffee's more secure.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.