Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/12/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Expands Its Consumer Strategy Beyond Internet Security

Announces Trend Micro Longevity for Android and Trend Micro Backup and Restore

CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704;TSE:4704), is broadening its consumer strategy beyond Internet Security to help home users connect and work online, effortlessly. With 25 years of expertise in the security industry and proven success with its Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, Trend Micro is uniquely positioned to protect consumers in all aspects of their digital lives and evolve the consumer security industry to protect an array of devices, data, people and privacy.

With the multitude of devices and platforms that people are using today, consumers are connected more than ever before.Within the past five years, laptop sales have outpaced desktop PC sales. Mobile phones are now personal computers that have the ability to record moments and take pictures. Tablets have become the new "need to have" personal device. With the multitude of devices and platforms - people are always online. While online banking and shopping are still prominent, they are eclipsed by the rise in social networking. The evolution of devices, operating systems and uses for data has created a new set of security issues that, until today, have gone unresolved.

Trend Micro is looking at new and innovative ways to take complex jobs and make them easy for consumers with a differentiated approach that is cross-platform, cross-operating system and cross-people. As the first security company to recognize and develop for the vast potential of cloud technology and the benefits it can bring to customers, Trend Micro has unrivaled expertise and assets to deliver solutions that can bridge across these ecosystems. Trend Micro believes this strategy will not only allow the security business to continue to flourish, but also to stimulate growth across new consumer product offerings and into the future of product development.

"As a leader in consumer security software, we have a thriving business with millions of satisfied customers. We are now leading our industry to innovate new businesses that solve emerging and complex consumer problems," said Carol Carpenter, general manager and senior vice president at Trend Micro. "As a company, we have invested years into creating the infrastructure needed to protect people and their 'stuff' on any device they use. Given the strength of our cloud infrastructure, expertise in security and the strength of our consumer products, our expectation is that Trend Micro's consumer division will continue to grow at a healthy pace."

The first products in this expansion strategy were also announced today for the consumer mobile business:Trend Micro(TM) Longevity(TM) for Android(TM) and Trend Micro(TM) Backup and Restore. Both of these solutions leverage Trend Micro's cloud infrastructure to deliver unique solutions. Longevity uses Trend Micro's Mobile App Reputation database to identify apps that have a large impact on battery life. Mobile Backup and Restore uses Trend Micro's proficiency in cloud security, sync and storage to help users restore all of their data on a new device in the case of theft or loss. Both apps are available in the Google Play Store and on the Trend Micro website.

About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
Kelly Sheridan, Staff Editor, Dark Reading,  1/10/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: It is too bad the ceiling is made of glass!
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3686
PUBLISHED: 2020-01-17
openQA before commit c172e8883d8f32fced5e02f9b6faaacc913df27b was vulnerable to XSS in the distri and version parameter. This was reported through the bug bounty program of Offensive Security
CVE-2019-3683
PUBLISHED: 2020-01-17
The keystone-json-assignment package in SUSE Openstack Cloud 8 before commit d7888c75505465490250c00cc0ef4bb1af662f9f every user listed in the /etc/keystone/user-project-map.json was assigned full "member" role access to every project. This allowed these users to access, modify, create and...
CVE-2019-3682
PUBLISHED: 2020-01-17
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2019-17361
PUBLISHED: 2020-01-17
In SaltStack Salt through 2019.2.0, the salt-api NEST API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
CVE-2019-19142
PUBLISHED: 2020-01-17
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.