Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/12/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Expands Its Consumer Strategy Beyond Internet Security

Announces Trend Micro Longevity for Android and Trend Micro Backup and Restore

CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704;TSE:4704), is broadening its consumer strategy beyond Internet Security to help home users connect and work online, effortlessly. With 25 years of expertise in the security industry and proven success with its Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, Trend Micro is uniquely positioned to protect consumers in all aspects of their digital lives and evolve the consumer security industry to protect an array of devices, data, people and privacy.

With the multitude of devices and platforms that people are using today, consumers are connected more than ever before.Within the past five years, laptop sales have outpaced desktop PC sales. Mobile phones are now personal computers that have the ability to record moments and take pictures. Tablets have become the new "need to have" personal device. With the multitude of devices and platforms - people are always online. While online banking and shopping are still prominent, they are eclipsed by the rise in social networking. The evolution of devices, operating systems and uses for data has created a new set of security issues that, until today, have gone unresolved.

Trend Micro is looking at new and innovative ways to take complex jobs and make them easy for consumers with a differentiated approach that is cross-platform, cross-operating system and cross-people. As the first security company to recognize and develop for the vast potential of cloud technology and the benefits it can bring to customers, Trend Micro has unrivaled expertise and assets to deliver solutions that can bridge across these ecosystems. Trend Micro believes this strategy will not only allow the security business to continue to flourish, but also to stimulate growth across new consumer product offerings and into the future of product development.

"As a leader in consumer security software, we have a thriving business with millions of satisfied customers. We are now leading our industry to innovate new businesses that solve emerging and complex consumer problems," said Carol Carpenter, general manager and senior vice president at Trend Micro. "As a company, we have invested years into creating the infrastructure needed to protect people and their 'stuff' on any device they use. Given the strength of our cloud infrastructure, expertise in security and the strength of our consumer products, our expectation is that Trend Micro's consumer division will continue to grow at a healthy pace."

The first products in this expansion strategy were also announced today for the consumer mobile business:Trend Micro(TM) Longevity(TM) for Android(TM) and Trend Micro(TM) Backup and Restore. Both of these solutions leverage Trend Micro's cloud infrastructure to deliver unique solutions. Longevity uses Trend Micro's Mobile App Reputation database to identify apps that have a large impact on battery life. Mobile Backup and Restore uses Trend Micro's proficiency in cloud security, sync and storage to help users restore all of their data on a new device in the case of theft or loss. Both apps are available in the Google Play Store and on the Trend Micro website.

About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0565
PUBLISHED: 2020-02-25
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.
CVE-2020-9393
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows XSS.
CVE-2020-9394
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows CSRF.
CVE-2019-3999
PUBLISHED: 2020-02-25
Improper neutralization of special elements used in an OS command in Druva inSync Windows Client 6.5.0 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
CVE-2020-8809
PUBLISHED: 2020-02-25
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker ...