Perimeter
11/29/2010
10:02 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Trend Micro To Purchase Mobile Armor

Mobile Armor's data protection offerings provide full-disk, file/folder, and removable media encryption for endpoints

CUPERTINO, Calif. and ST. LOUIS, Nov. 29, 2010 /PRNewswire/ -- Trend Micro Incorporated (TSE: 4704) announced today the signing of a definitive agreement to purchase innovative data protection specialist, Mobile Armor, in a move to expand Trend Micro's data protection product portfolio. Mobile Armor, based in St. Louis, Missouri is majority-owned by Dolphin Equity of New York, New York. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including regulatory approvals, is expected to close before December 31, 2010.

Mobile Armor's data protection offerings provide full-disk, file/folder, and removable media encryption for endpoints. They will complement Trend Micro's existing data loss prevention, email encryption and cloud encryption products. The acquisition furthers Trend Micro's leadership in data protection and encryption from the endpoint to the cloud for all major customer segments. Small and medium businesses, large enterprises, and government organizations will receive unprecedented, centrally-managed data protection while benefiting from a more flexible, effective layer of protection by encrypting data no matter where it resides.

Data protection is a growing concern for businesses. IDC assesses that the market for endpoint encryption is growing at an estimated 14 percent CAGR through 2014. State and national governments are enacting more stringent regulations such as the U.S. HITECH Act, the U.K. Data Protection Act, and the German Federal Data Protection Act. Together with the Payment Card Industry Data Security Standard (PCI DSS), such regulations are driving the need to encrypt sensitive information and protect privacy. The increased frequency and cost of data breaches are also accelerating the adoption of encryption as organizations strive to mitigate risks and protect sensitive information from unauthorized access.

"This acquisition will expand our endpoint security market reach and will provide our customers with proven technology for encrypting data on laptops, tablet PCs, and smartphones. Mobile Armor's solutions further our vision of protecting digital information wherever it resides and complements our recent announcement of Trend Micro SecureCloud for securing and controlling data in the cloud," said Eva Chen, CEO, Trend Micro. "Mobile Armor's endpoint encryption suite will enhance our data protection portfolio for the cloud computing era."

"Security-minded buyers are assured that the Mobile Armor solution is fortified, tested, and proven to have the quality, certifications and critical security features that other data security solutions do not have. For customers, we see Mobile Armor complementing Trend Micro's data protection strategy and contributing to Trend Micro's mobile and cloud security initiatives. Trend Micro's worldwide reach and extensive resources will add value to Mobile Armor's customer base," said Michael Menegay, CEO, Mobile Armor.

"Each year, hundreds of thousands of laptops, phones and removable media devices are estimated by various sources to go missing through loss or theft, to have their data copied without consent, and to be upgraded or exchanged without having their data removed," according to a recent Gartner report*. "Mobile data protection (MDP) is an attractive complement to the endpoint protection (EPP) product suites, which already encompass enterprise antivirus (AV), anti-spyware, personal firewall and desktop host intrusion prevention system."

*Gartner, Inc., Magic Quadrant for Mobile Data Protection, John Girard, Eric Ouellet, September 7, 2010.

About Trend Micro

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro™ Smart Protection™ Network infrastructure which delivers advanced protection from the cloud, blocking threats in real-time before they reach you. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

About Mobile Armor

Mobile Armor, Incorporated is an innovator and leader in data encryption and mobile device management technology. Mobile Armor provides domestically developed trusted data security solutions to commercial and government organizations. Notable customers include the U.S. Army, U.S. Navy, civilian agencies and customers in healthcare and financial services verticals. The Mobile Armor Data Encryption & Device Management Suite is a centrally managed and fully integrated hardware and software-based encryption solution for desktops, laptops, smartphones, CDs/DVDs, and USB flash drives. Mobile Armor is the recipient of the coveted DoD Data at Rest Tiger Team award, enabling its solution to be sold to the U.S. government. Mobile Armor technology is FIPS 140-2 Level 2 and 3 validated and is certified to meet the standards for security set by the U.S. National Institute of Standards and Technology (NIST). It is also in final review for Common Criteria Evaluation Assurance Level 4+ (EAL-4+) Certification.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web