Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/12/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Expands Its Consumer Strategy Beyond Internet Security

Announces Trend Micro Longevity for Android and Trend Micro Backup and Restore

CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704;TSE:4704), is broadening its consumer strategy beyond Internet Security to help home users connect and work online, effortlessly. With 25 years of expertise in the security industry and proven success with its Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, Trend Micro is uniquely positioned to protect consumers in all aspects of their digital lives and evolve the consumer security industry to protect an array of devices, data, people and privacy.

With the multitude of devices and platforms that people are using today, consumers are connected more than ever before.Within the past five years, laptop sales have outpaced desktop PC sales. Mobile phones are now personal computers that have the ability to record moments and take pictures. Tablets have become the new "need to have" personal device. With the multitude of devices and platforms - people are always online. While online banking and shopping are still prominent, they are eclipsed by the rise in social networking. The evolution of devices, operating systems and uses for data has created a new set of security issues that, until today, have gone unresolved.

Trend Micro is looking at new and innovative ways to take complex jobs and make them easy for consumers with a differentiated approach that is cross-platform, cross-operating system and cross-people. As the first security company to recognize and develop for the vast potential of cloud technology and the benefits it can bring to customers, Trend Micro has unrivaled expertise and assets to deliver solutions that can bridge across these ecosystems. Trend Micro believes this strategy will not only allow the security business to continue to flourish, but also to stimulate growth across new consumer product offerings and into the future of product development.

"As a leader in consumer security software, we have a thriving business with millions of satisfied customers. We are now leading our industry to innovate new businesses that solve emerging and complex consumer problems," said Carol Carpenter, general manager and senior vice president at Trend Micro. "As a company, we have invested years into creating the infrastructure needed to protect people and their 'stuff' on any device they use. Given the strength of our cloud infrastructure, expertise in security and the strength of our consumer products, our expectation is that Trend Micro's consumer division will continue to grow at a healthy pace."

The first products in this expansion strategy were also announced today for the consumer mobile business:Trend Micro(TM) Longevity(TM) for Android(TM) and Trend Micro(TM) Backup and Restore. Both of these solutions leverage Trend Micro's cloud infrastructure to deliver unique solutions. Longevity uses Trend Micro's Mobile App Reputation database to identify apps that have a large impact on battery life. Mobile Backup and Restore uses Trend Micro's proficiency in cloud security, sync and storage to help users restore all of their data on a new device in the case of theft or loss. Both apps are available in the Google Play Store and on the Trend Micro website.

About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...