Trend Micro Enhances User Protection Solution
Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment
April 22, 2014
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
PRESS RELEASE
DALLAS, April 15, 2014 –Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, today announced major upgrades to the Trend Micro™ Complete User Protection solution. As companies seek to transition to the cloud without compromising security or performance, Trend Micro has developed enhancements to meet growing demands for greater protection against next-gen threats and flexibility for deployment, management and pricing. Improvements span PC and mobile endpoints, email and collaboration, and Web security to enable integrated visibility and threat response. With “mix-and-match” support for cloud, hybrid and on-premise deployments, the solution updates are ideal for enterprises and mid-size businesses moving to the cloud.
“Trend Micro is leading the charge on delivering the most comprehensive threat protection against the latest security challenges,” said Eric Skinner, vice president, solutions marketing, Trend Micro. “At the same time, we’re listening to our customers who are asking for simplicity of security management, especially as cloud migration gains momentum. In response, our unique offering provides flexible management and licensing across cloud and on-premise environments, so customers have what they need regardless of where they are in the cloud adoption process.”
In a March 2014 survey on technology adoption commissioned by Trend Micro and conducted by Forrester Consulting, a majority (77 percent) of global IT security decision makers acknowledged it was important, or very important, to have flexibility of cloud, on-premise or hybrid deployment, with the ability to recalibrate as requirements change. Trend Micro believes that its Complete User Protection solution uniquely addresses this concern by granting customers a blended offering of on-premise and SaaS deployments without having to switch environments.
New enhancements to the Complete User Protection solution, include:
Protection capabilities:
§ Application controlenables category-based whitelisting and PC endpoint lockdown as an additional layer of protection against advanced malware and targeted attacks that evade signature-based defense
§ Browser exploit detection protects against attacks directed at unpatched browser vulnerabilities
§ Cloud-based secure Web gateway deployment as an alternative or complement to Trend Micro's existing on-premise Web gateway
§ Improved endpoint encryption includes pre-boot authentication and management for Windows Bitlocker and MacOS FileVault native disk encryption
§ User-centric visibility of the updated Trend Micro Control Manager central console, for better investigation and threat response, including dashboard status of incidents and compliance, and visibility across PC, Mac and mobile endpoints
§ Refreshed vulnerability protection capabilities that proactively protect against exploits directed at operating system and application vulnerabilities until patches can be deployed
§ Expanded hosted email security for inbound and outbound protection of Microsoft Office365 deployments
Improved management and licensing:
§ Enhanced central management with user-centric visibility of threat incidents and other statuses with the ability to manage cloud and on-premise components in one integrated console
§ Simplified all-inclusive suite packaging, enabling easy selection and ordering by customers and channel partners, providing cloud and on-premise capabilities with the ability to “mix-and-match” deployments
§ Comprehensive suite options with only endpoint protection capabilities or bundled with mail, web and collaboration server and gateway security
§ Per-user pricing on each suite with 24/7 support included, along with streamlined deployment and activation features to reduce IT workload