Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:34 PM
Dark Reading
Dark Reading
Products and Releases

Trend Micro Unveils End User Data Protection Solutions for Today's Post-PC Environments

Trend Micro Enterprise Security and Data Protection mitigates risks of attacks and breaches across platforms

CUPERTINO, Calif., March 12, 2013 /PRNewswire/ -- Trend Micro Incorporated (TYO:4704;TSE: 4704), the global leader in cloud security, today announced a new suite - Trend Micro(TM) Enterprise Security and Data Protection -- designed to help companies efficiently mitigate the risks of attacks and data breaches across the spectrum of end user platforms, from smartphones to tablets, laptops to removable drives.

Protect the data, not just the device

For all of consumerization's benefits and conveniences, companies are now wrestling with the challenges, costs, and risks of company-procured IT environments being supplemented by employee-owned technologies, creating new entry points for cyber-espionage and data loss. According to Forrester Research, "most organizations will have policies in place for smartphone, tablet, and consumer-oriented tool use, but more than half say that they either don't have the tools to enforce policy or that their current tools are insufficient for enforcing policy."[i]

With the introduction of Trend Micro Enterprise Security and Data Protection, Trend Micro extends its existing threat protection platform to include integrated data protection capabilities, offering existing and new customers a comprehensive, easy-to-install, centrally managed data protection solution designed to help them tackle the escalation of targeted attacks, the growth in the use of unsecured mobile devices, and an overall IT environment where data can be accessed anytime, anywhere.

Extending beyond comprehensive threat protection, the new suite brings together Trend Micro's leading data protection capabilities, including: data loss prevention, USB device control and mobile device management, and endpoint and email encryption. Trend Micro Enterprise Security and Data Protection is backed by the power of the Trend Micro(TM) Smart Protection Network(TM), a cloud-based, global threat intelligence network that rapidly and accurately collects and identifies new threats, delivering instant protection for data wherever it resides.

Supporting quotes

Charles Kolodgy, research vice president at IDC

"A user's device has historically been the deciding factor in how to best protect data. However, with the explosion of endpoints, users are instantly and seamlessly using whatever device is most appropriate at the time. Security's focus must be to protect users and their data irrespective of the endpoint device. Security solutions need to quickly adjust to this environment.

Protecting the user and data is the more effective and comprehensive approach.

Trend Micro's new suite adopts this holistic protection capability."

Ron Clarkson, vice president of enterprise mobility, Trend Micro

"Unlike our competitors who think about data protection from the perspective of a single device or app, Trend Micro's approach is to protect end users across the spectrum of devices and applications that they need to perform their jobs.

This is the only approach that can prepare organizations for the range of threats targeting end users and corporate data in today's IT environment.

Deploying Trend Micro Enterprise Security and Data Protection across endpoint, mobile, mail, and gateway enables organizations to reduce risk while still embracing consumerization."


For new customers, the Trend Micro Enterprise Security and Data Protection suite is available later this spring. For more information, please visit:


For customers of Trend Micro Enterprise Security suites, Trend Micro is offering a new Enterprise Data Protection bundle, also available this spring, that enables customers to easily add advanced data protection capabilities to their existing Trend Micro threat protection platform. Easily integrating with their existing enterprise security suites, the new Trend Micro Enterprise Data Protection makes it easy to add the robust data protection customers need without the expense and complexity of a deploying a separate, dedicated solution. For more information, please visit http://www.trendmicro.com/us/enterprise/data-protection/endpoint/index.html

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) global threat intelligence data mining framework, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

[i] Forrester Research, Inc., "Understand the State of Data Security and

Privacy: 2012 to 2013", September 2012, updated January 2013.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.