Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/12/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Expands Its Consumer Strategy Beyond Internet Security

Announces Trend Micro Longevity for Android and Trend Micro Backup and Restore

CUPERTINO, Calif., Sept. 10, 2012 /PRNewswire/ --Trend Micro Incorporated (TYO: 4704;TSE:4704), is broadening its consumer strategy beyond Internet Security to help home users connect and work online, effortlessly. With 25 years of expertise in the security industry and proven success with its Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, Trend Micro is uniquely positioned to protect consumers in all aspects of their digital lives and evolve the consumer security industry to protect an array of devices, data, people and privacy.

With the multitude of devices and platforms that people are using today, consumers are connected more than ever before.Within the past five years, laptop sales have outpaced desktop PC sales. Mobile phones are now personal computers that have the ability to record moments and take pictures. Tablets have become the new "need to have" personal device. With the multitude of devices and platforms - people are always online. While online banking and shopping are still prominent, they are eclipsed by the rise in social networking. The evolution of devices, operating systems and uses for data has created a new set of security issues that, until today, have gone unresolved.

Trend Micro is looking at new and innovative ways to take complex jobs and make them easy for consumers with a differentiated approach that is cross-platform, cross-operating system and cross-people. As the first security company to recognize and develop for the vast potential of cloud technology and the benefits it can bring to customers, Trend Micro has unrivaled expertise and assets to deliver solutions that can bridge across these ecosystems. Trend Micro believes this strategy will not only allow the security business to continue to flourish, but also to stimulate growth across new consumer product offerings and into the future of product development.

"As a leader in consumer security software, we have a thriving business with millions of satisfied customers. We are now leading our industry to innovate new businesses that solve emerging and complex consumer problems," said Carol Carpenter, general manager and senior vice president at Trend Micro. "As a company, we have invested years into creating the infrastructure needed to protect people and their 'stuff' on any device they use. Given the strength of our cloud infrastructure, expertise in security and the strength of our consumer products, our expectation is that Trend Micro's consumer division will continue to grow at a healthy pace."

The first products in this expansion strategy were also announced today for the consumer mobile business:Trend Micro(TM) Longevity(TM) for Android(TM) and Trend Micro(TM) Backup and Restore. Both of these solutions leverage Trend Micro's cloud infrastructure to deliver unique solutions. Longevity uses Trend Micro's Mobile App Reputation database to identify apps that have a large impact on battery life. Mobile Backup and Restore uses Trend Micro's proficiency in cloud security, sync and storage to help users restore all of their data on a new device in the case of theft or loss. Both apps are available in the Google Play Store and on the Trend Micro website.

About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro's products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17185
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-12424
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-18380
PUBLISHED: 2019-12-09
Symantec Industrial Control System Protection (ICSP), versions 6.x.x, may be susceptible to an unauthorized access issue that could potentially allow a threat actor to create or modify application user accounts without proper authentication.
CVE-2019-19687
PUBLISHED: 2019-12-09
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, whic...
CVE-2019-19682
PUBLISHED: 2019-12-09
nopCommerce through 4.20 allows XSS in the SaveStoreMappings of the components \Presentation\Nop.Web\Areas\Admin\Controllers\NewsController.cs and \Presentation\Nop.Web\Areas\Admin\Controllers\BlogController.cs via Body or Full to Admin/News/NewsItemEdit/[id] Admin/Blog/BlogPostEdit/[id]. NOTE: the ...