Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:34 PM
Dark Reading
Dark Reading
Products and Releases

Trend Micro Unveils End User Data Protection Solutions for Today's Post-PC Environments

Trend Micro Enterprise Security and Data Protection mitigates risks of attacks and breaches across platforms

CUPERTINO, Calif., March 12, 2013 /PRNewswire/ -- Trend Micro Incorporated (TYO:4704;TSE: 4704), the global leader in cloud security, today announced a new suite - Trend Micro(TM) Enterprise Security and Data Protection -- designed to help companies efficiently mitigate the risks of attacks and data breaches across the spectrum of end user platforms, from smartphones to tablets, laptops to removable drives.

Protect the data, not just the device

For all of consumerization's benefits and conveniences, companies are now wrestling with the challenges, costs, and risks of company-procured IT environments being supplemented by employee-owned technologies, creating new entry points for cyber-espionage and data loss. According to Forrester Research, "most organizations will have policies in place for smartphone, tablet, and consumer-oriented tool use, but more than half say that they either don't have the tools to enforce policy or that their current tools are insufficient for enforcing policy."[i]

With the introduction of Trend Micro Enterprise Security and Data Protection, Trend Micro extends its existing threat protection platform to include integrated data protection capabilities, offering existing and new customers a comprehensive, easy-to-install, centrally managed data protection solution designed to help them tackle the escalation of targeted attacks, the growth in the use of unsecured mobile devices, and an overall IT environment where data can be accessed anytime, anywhere.

Extending beyond comprehensive threat protection, the new suite brings together Trend Micro's leading data protection capabilities, including: data loss prevention, USB device control and mobile device management, and endpoint and email encryption. Trend Micro Enterprise Security and Data Protection is backed by the power of the Trend Micro(TM) Smart Protection Network(TM), a cloud-based, global threat intelligence network that rapidly and accurately collects and identifies new threats, delivering instant protection for data wherever it resides.

Supporting quotes

Charles Kolodgy, research vice president at IDC

"A user's device has historically been the deciding factor in how to best protect data. However, with the explosion of endpoints, users are instantly and seamlessly using whatever device is most appropriate at the time. Security's focus must be to protect users and their data irrespective of the endpoint device. Security solutions need to quickly adjust to this environment.

Protecting the user and data is the more effective and comprehensive approach.

Trend Micro's new suite adopts this holistic protection capability."

Ron Clarkson, vice president of enterprise mobility, Trend Micro

"Unlike our competitors who think about data protection from the perspective of a single device or app, Trend Micro's approach is to protect end users across the spectrum of devices and applications that they need to perform their jobs.

This is the only approach that can prepare organizations for the range of threats targeting end users and corporate data in today's IT environment.

Deploying Trend Micro Enterprise Security and Data Protection across endpoint, mobile, mail, and gateway enables organizations to reduce risk while still embracing consumerization."


For new customers, the Trend Micro Enterprise Security and Data Protection suite is available later this spring. For more information, please visit:


For customers of Trend Micro Enterprise Security suites, Trend Micro is offering a new Enterprise Data Protection bundle, also available this spring, that enables customers to easily add advanced data protection capabilities to their existing Trend Micro threat protection platform. Easily integrating with their existing enterprise security suites, the new Trend Micro Enterprise Data Protection makes it easy to add the robust data protection customers need without the expense and complexity of a deploying a separate, dedicated solution. For more information, please visit http://www.trendmicro.com/us/enterprise/data-protection/endpoint/index.html

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) global threat intelligence data mining framework, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

[i] Forrester Research, Inc., "Understand the State of Data Security and

Privacy: 2012 to 2013", September 2012, updated January 2013.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...