CUPERTINO, Calif. -- Trend Micro, Incorporated (TSE: 4704), a leader in network antivirus and Internet content security software and services, today unveiled the 2008 versions of its security products for consumers. Two are updates to the existing 2007 versions: Trend Micro AntiVirus plus AntiSpyware 2008 and Trend Micro Internet Security 2008. Trend Micro Internet Security Pro is new this year. Trend Micro 2008 security products offer consumers powerful protection from cyber criminals by safeguarding multiple attack points, from the operating system to browsers to keyboards.
In these latest releases, Trend Micro focused on core customer needs such as enhanced protection against the latest malware, 30% faster manual scanning than competitive products, easy reporting and more convenient manageability, including a simplified and elegant user interface.
Protection Against the Latest Malware
According to research by TrendLabsSM, Trend Micros global network of research, service and support centers, Web threats grew by 540 percent between January 2005 and January 2007. In order to combat such insidious threats, Trend Micro has enhanced the anti-malware protection available. New and improved functionality also includes proactive intrusion blocking, Web threat protection, enhanced anti-spam capabilities, a two-way firewall and fully integrated antivirus and anti-spyware engines.
TrendLabs is committed to constant threat surveillance and attack prevention. Trend Micro customers benefit from TrendLabs round-the-clock, real-time threat information and research service which delivers effective, timely security measures designed to detect, pre-empt, and eliminate attacks, protecting and informing users as they surf.
Proactive intrusion blocking is a behavior-based technology that protects computers from unauthorized and malicious changes. This new technology boasts non-signature-based, real-time prevention capabilities that dynamically adapt to new and emerging threats. By monitoring application activities on a computer, it is able to prevent malicious changes to a machine, before they can take effect. In addition, the number of alerts is reduced, because the technology can trace changes to their sources instead of reacting to them individually.