Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/12/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Expands Its Consumer Strategy Beyond Internet Security

Announces Trend Micro Longevity for Android and Trend Micro Backup and Restore

CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704;TSE:4704), is broadening its consumer strategy beyond Internet Security to help home users connect and work online, effortlessly. With 25 years of expertise in the security industry and proven success with its Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, Trend Micro is uniquely positioned to protect consumers in all aspects of their digital lives and evolve the consumer security industry to protect an array of devices, data, people and privacy.

With the multitude of devices and platforms that people are using today, consumers are connected more than ever before.Within the past five years, laptop sales have outpaced desktop PC sales. Mobile phones are now personal computers that have the ability to record moments and take pictures. Tablets have become the new "need to have" personal device. With the multitude of devices and platforms - people are always online. While online banking and shopping are still prominent, they are eclipsed by the rise in social networking. The evolution of devices, operating systems and uses for data has created a new set of security issues that, until today, have gone unresolved.

Trend Micro is looking at new and innovative ways to take complex jobs and make them easy for consumers with a differentiated approach that is cross-platform, cross-operating system and cross-people. As the first security company to recognize and develop for the vast potential of cloud technology and the benefits it can bring to customers, Trend Micro has unrivaled expertise and assets to deliver solutions that can bridge across these ecosystems. Trend Micro believes this strategy will not only allow the security business to continue to flourish, but also to stimulate growth across new consumer product offerings and into the future of product development.

"As a leader in consumer security software, we have a thriving business with millions of satisfied customers. We are now leading our industry to innovate new businesses that solve emerging and complex consumer problems," said Carol Carpenter, general manager and senior vice president at Trend Micro. "As a company, we have invested years into creating the infrastructure needed to protect people and their 'stuff' on any device they use. Given the strength of our cloud infrastructure, expertise in security and the strength of our consumer products, our expectation is that Trend Micro's consumer division will continue to grow at a healthy pace."

The first products in this expansion strategy were also announced today for the consumer mobile business:Trend Micro(TM) Longevity(TM) for Android(TM) and Trend Micro(TM) Backup and Restore. Both of these solutions leverage Trend Micro's cloud infrastructure to deliver unique solutions. Longevity uses Trend Micro's Mobile App Reputation database to identify apps that have a large impact on battery life. Mobile Backup and Restore uses Trend Micro's proficiency in cloud security, sync and storage to help users restore all of their data on a new device in the case of theft or loss. Both apps are available in the Google Play Store and on the Trend Micro website.

About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15488
PUBLISHED: 2020-09-30
Re:Desk 2.3 allows insecure file upload.
CVE-2020-15849
PUBLISHED: 2020-09-30
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for a...
CVE-2020-14375
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated ...
CVE-2020-14376
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system...
CVE-2020-14377
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attack...