Trend Micro, Inc. Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Trend Micro, Inc.

Overview: Trend Micro Incorporated, a global leader in Internet content security and threat management, aims to create a world safe for the exchange of digital information for businesses and consumers. Learn more by visiting www.trendmicro.com

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Trend Micro, Inc..
Research offered by Trend Micro, Inc.

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.. June 29, 2011 - This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.

  View A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing research abstract

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection by Trend Micro, Inc.. August 27, 2010 - Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  

  View Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection research abstract

Cloud Computing Security: Making Virtual Machines Cloud-Ready by Trend Micro, Inc.. October 20, 2010 - This paper covers the delivery model of cloud computing that is also called utility computing, or Infrastructure as a Service (IaaS). It looks at the security implications and challenges that IaaS presents and offers best practices to service providers and enterprises hoping to leverage IaaS and so much more.

  View Cloud Computing Security: Making Virtual Machines Cloud-Ready research abstract

Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments by Trend Micro, Inc.. October 20, 2010 - This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure.

  View Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments research abstract

Countdown: Top 5 technologies to help battle the new spam threat by Trend Micro, Inc.. November 27, 2007 - In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.

  View Countdown: Top 5 technologies to help battle the new spam threat research abstract

Data Loss Prevention Stops Data Leaks Where They Start by Trend Micro, Inc.. July 15, 2010 - Trend Micro Data Loss Prevention is a family of advanced DLP solutions that provide maximum protection for an enterprise’s critical information at endpoints, the point of use. The new built-in encryption module provides protection against unauthorized access to sensitive data on removable devices, one of the greatest risk areas for data loss.

  View Data Loss Prevention Stops Data Leaks Where They Start research abstract

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.. February 01, 2008 - In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.

  View Data Protection Solutions at Midsize Organizations research abstract

Data Protection: Solutions for Privacy, Disclosure and Encryption by Trend Micro, Inc.. July 15, 2010 - Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.

  View Data Protection: Solutions for Privacy, Disclosure and Encryption research abstract

Deep Security 7.5 by Trend Micro, Inc.. September 15, 2010 - Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  View Deep Security 7.5 research abstract

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by Trend Micro, Inc.. July 15, 2010 - When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.

  View Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention research abstract

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy by Trend Micro, Inc.. October 26, 2010 - This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China.

  View Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy research abstract

Endpoint Security: Visible Coverage in a Single, Scalable Platform by Trend Micro, Inc.. January 06, 2009 - Read this brief data sheet to learn how Trend Micro's Endpoint Security Platform delivers pervasive visibility and control, speeds time to protection, and increases management efficiency.

  View Endpoint Security: Visible Coverage in a Single, Scalable Platform research abstract

Endpoint Threat Management: The Benefits of Cloud-Based Security Services by Trend Micro, Inc.. January 12, 2009 - Read this short paper to learn how your organization can use a hybrid approach to acquire an endpoint security solution that consumes less CPU time, memory, disk, and network bandwidth.

  View Endpoint Threat Management: The Benefits of Cloud-Based Security Services research abstract

Enterprise Security For the Healthcare Industry by Trend Micro, Inc.. July 15, 2010 - The healthcare industry has unique IT needs. Trend Micro Enterprise Security provides unique and cost-effective solutions that ensure compliance, maximize protection, and enable your strategic business and IT initiatives.

  View Enterprise Security For the Healthcare Industry research abstract

Enterprise Security Solutions by Trend Micro by Trend Micro, Inc.. January 26, 2009 - This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.

  View Enterprise Security Solutions by Trend Micro research abstract

How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.. February 17, 2011 - In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.

  View How Security is Changing to Support Virtualization and Cloud Computing research abstract

Hybrid Clouds by Trend Micro, Inc.. October 07, 2011 - Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.

  View Hybrid Clouds research abstract

Information Security, Virtualization, and the Journey to the Cloud by Trend Micro, Inc.. October 20, 2010 - With visible virtualization leadership, commitment, and cooperation, VMware and Trend Micro should be amongst the top choices as CIOs and CISOs choose their partners for their own cloud journeys. Read this paper to find out so much more.

  View Information Security, Virtualization, and the Journey to the Cloud research abstract

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.. August 21, 2009 - Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  View InterScan Messaging Hosted Security (IMHS) Trial research abstract

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.. August 21, 2009 - Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  View InterScan Messaging Hosted Security (IMHS) Trial research abstract

Intrusion Defense Firewall: Network-Level HIPS at the Endpoint by Trend Micro, Inc.. July 15, 2010 - This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.

  View Intrusion Defense Firewall: Network-Level HIPS at the Endpoint research abstract

Is your security as good as the cloud’s? by Trend Micro, Inc.. October 04, 2011 - This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.

  View Is your security as good as the cloud’s? research abstract

Maximize Your Return on Investment for Virtualization and Cloud Computing by Trend Micro, Inc.. October 04, 2011 - View this paper to discover how platform-aware security can provide integrated security designed for virtual servers, VDI and the cloud, without sacrificing performance or management, ultimately maximizing your return on investment (ROI).

  View Maximize Your Return on Investment for Virtualization and Cloud Computing research abstract

Mobile Phones Emerge As Security Threat Targets by Trend Micro, Inc.. October 26, 2010 - Due to their portability and advanced computing features, mobile phones are becoming popular devices for Web surfing. Just like PCs, however, these gadgets are also susceptible to various security threats. Users must remain cautious when using their mobile phones to surf the Internet to keep their phones malware free.

  View Mobile Phones Emerge As Security Threat Targets research abstract

Protect Your Data from Endpoint to the Cloud by Trend Micro, Inc.. March 21, 2011 - Trend Micro Data Protection rises to the occasion with a robust solution that ensures the availability, integrity, and confidentiality of your business information. This comprehensive solution keeps your data safe from intentional or unintentional harm wherever it resides, protecting it against damage, loss, and unauthorized access. 

  View Protect Your Data from Endpoint to the Cloud research abstract

Secure Your Journey to the Cloud with Data Protection by Trend Micro, Inc.. October 07, 2011 - View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security.

  View Secure Your Journey to the Cloud with Data Protection research abstract

Securing Virtualized Data Centers by Trend Micro, Inc.. December 14, 2009 - On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.

  View Securing Virtualized Data Centers research abstract

Sharepoint in Healthcare: Collaboration and Information Sharing in a Secure Environment by Trend Micro, Inc.. July 15, 2010 - Trend Micro’s PortalProtect helps healthcare organizations implement the necessary industry best practices to achieve regulatory compliance and protect against the changing threats in today’s quickly evolving security landscape. Read this paper for more.

  View Sharepoint in Healthcare: Collaboration and Information Sharing in a Secure Environment research abstract

Slipping Through The Cracks Of Web Services To Serve Malware by Trend Micro, Inc.. October 26, 2010 - Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.

  View Slipping Through The Cracks Of Web Services To Serve Malware research abstract

The Impact of Messaging and Web Threats by Trend Micro, Inc.. May 2008 - This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.

  View The Impact of Messaging and Web Threats research abstract

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.. November 17, 2010 - Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.

  View Top 10 Tips to Keep Your Small Business Safe research abstract

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.. July 01, 2009 - The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.

  View Total Economic Impact™ of Trend Micro Enterprise Security research abstract

Trend Micro Deep Security 7.5 vs. McAfee and Symantec by Trend Micro, Inc.. February 17, 2011 - Server and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operational expenditures. In the rush to implement virtualization technologies, many organizations simply deploy the same anti-virus solution that is in use on their physical server and desktop systems.

  View Trend Micro Deep Security 7.5 vs. McAfee and Symantec research abstract

Trend Micro Endpoint Comparative Report Performed by AV-Test.org by Trend Micro, Inc.. January 31, 2011 - In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.

  View Trend Micro Endpoint Comparative Report Performed by AV-Test.org research abstract

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings by Trend Micro, Inc.. June 28, 2011 - 3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.

  View Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings research abstract

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.. January 31, 2011 - An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.

  View Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security research abstract

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.. October 22, 2010 - In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world.

  View TrendLabs: Global Threat Trends 1H 2010 research abstract

Understanding WMI Malware by Trend Micro, Inc.. October 26, 2010 - This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

  View Understanding WMI Malware research abstract

Web Threats: Challenges and Solutions by Trend Micro, Inc.. January 12, 2009 - Read this white paper to better understand Web threats and their
impacts, as well as why conventional methods fail to protect against
these threats and the characteristics of a new approach required to
ensure security, regulatory compliance, and business continuity.

  View Web Threats: Challenges and Solutions research abstract

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.. July 15, 2010 - Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.

  View When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure research abstract

Why Your Organization Needs to Implement DLP by Trend Micro, Inc.. July 15, 2010 - Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.

  View Why Your Organization Needs to Implement DLP research abstract

Worry-Free Business Security Advanced by Trend Micro, Inc.. October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  View Worry-Free Business Security Advanced research abstract

Worry-Free Business Security Services by Trend Micro, Inc.. October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  View Worry-Free Business Security Services research abstract

Worry-Free Business Security Standard by Trend Micro, Inc.. October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  View Worry-Free Business Security Standard research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts