Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:04 PM
Dark Reading
Dark Reading
Products and Releases

Trend Micro Bundles Consumer Internet Security With Identity Protection And Laptop Theft Recovery Services

Trend Micro teams with IdentityTruth and Absolute Software

CUPERTINO, Calif., May 24 /PRNewswire/ -- Trend Micro announced today a new retail consumer bundle that includes identity protection and laptop theft recovery services for a comprehensive set of consumer security products in one package. The security bundle will offer:

-- A one-year subscription of Trend Micro(TM) Internet Security Standard, which guards against viruses, spyware, spam, Trojans, rootkits, and emerging online security threats. -- A one-year subscription of Computrace LoJack for Laptops by Absolute Software, a provider of firmware-based, patented, computer theft recovery, data protection and secure computer lifecycle management solutions. -- A one-year subscription of identity theft prevention and identity protection monitoring services from identityTruth, including certified specialist assistance with replacing lost or stolen identification and the remediation of a stolen or compromised identity.

Computrace LoJack for Laptops is powered by the patented Computrace technology from Absolute Software. LoJack for Laptops is virtually undetectable and calls home to the Absolute Monitoring Center with location information. If a computer is reported stolen, the Absolute Theft Recovery Team can gather evidence from the computer to identify the thief's location and works with local police to recover the computer. As an added layer of security, Premium customers can remotely delete data from the stolen computer to help protect their personal information.

IdentityTruth's unique Faster than Fraud(TM) technology combines data from many different sources -- going beyond simple credit-based protection to deliver a more complete picture of an individual's identity risk. The service continuously combines and analyzes any and all information that is discovered specific to an individual to detect, predict, and alert consumers to suspicious activities, identifying potential identity fraud patterns before fraud happens and providing concrete next-steps to resolve a problem that may arise.

Trend Micro Internet Security provides simplicity and speed when it comes to powerful online protection. It leverages the Trend Micro(TM) Smart Protection Network(TM) infrastructure, which works in the background, correlating threat intelligence, protecting in the Internet cloud, and giving consumers -- wherever they are -- immediate, real-time protection competitive products don't offer.

"In today's mobile and connected world, our computers become an extension of our lives. We must protect these valuable assets from internet threats and from data and device theft," said Mark Grace, vice president of consumer business at Absolute Software. "We're excited to be bundled in this offering, and at an attractive price, it provides consumers with the critical security features needed to confidently embrace the power of their mobile devices."

"Financial transactions are no longer limited to the personal desktop computer. Today's consumers use laptops and mobile communication devices for online banking and shopping, to store financial documents, tax returns and more - all of which can put consumers at greater risk of identity theft," said Steven Domenikos, CEO of IdentityTruth "Our partnership with Trend Micro is bringing best-in-class protection to consumers in one retail package."

Pricing and Availability

The retail bundle of one-year subscriptions of Trend Micro Internet Security Standard, IdentityTruth's proactive identity monitoring services, Computrace LoJack for Laptops by Absolute Software is available at Best Buy and www.bestbuy.com for MSRP US $89.99.

About IdentityTruth

IdentityTruth isthe leading provider of a new breed of service to help consumers safeguard their Privacy and Identity. IdentityTruth's proprietary technology provides subscribers with advance notice of potential identity fraud so they can take better control to stop it before it becomes costly. IdentityTruth not only detects -- but can actually predict -- possible problems, and that is what makes IdentityTruth Faster than Fraud(TM). IdentityTruth is a privately-held, VC-funded company headquartered in Waltham, Massachusetts. Investors include Argonaut Ventures and Stata Venture Partners. For more information, go to www.IdentityTruth.com or call 781-684-1300.

About Absolute Software

Absolute Software Corporation (TSX: ABT) is the leader in tracking, managing and protecting computers and mobile devices. The Company's Computrace, Absolute Manage and LoJack for Laptops solutions provide theft recovery, data protection and computer lifecycle management capabilities to organizations and consumers. The Company's software agent is embedded in the firmware of computers by global leaders, including Acer, ASUS, Dell, Fujitsu, General Dynamics Itronix, HP, Lenovo, Motion, Panasonic and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com and http://blog.absolute.com.

About Trend Micro:

Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro(TM) Smart Protection Network(TM) infrastructure, a next-generation cloud-client innovation that combines sophisticated cloud-based reputation technology, feedback loops, and the expertise of TrendLabs(SM) researchers to deliver real-time protection from emerging threats. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

Computrace and Absolute are registered trademarks of Absolute Software Corporation. LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
PUBLISHED: 2021-05-18
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
PUBLISHED: 2021-05-18
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
PUBLISHED: 2021-05-18
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
PUBLISHED: 2021-05-18
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage