Trend Micro Protects Its Customers in 2016
Credit to Author: Jon Clay| Date: Tue, 07 Mar 2017 14:00:41 +0000
Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our global threat intelligence resides and where we provide much of our protection capabilities for our customers. Trend Micro has 500,000 commercial customers and…


IDC, a leading global market intelligence firm, believes that organizations need to have access to security that moves at the speed of business. In fact, one of IDC’s leading security practice analysts had this to say about securing workloads across the hybrid cloud: “Multiple techniques are essential to defend against the sophistication of today’s threats….
Classic and modern… often standing side by side. Many of the world’s greatest cities are incredible collections of architectures, some old and some new, coming together for a common purpose. Not unlike these cities, any great enterprise still has the legacy platforms on which it has built its foundation; AIX, Solaris, and Windows 2003 to name…
We’ve entered a new era of cyber threats. It’s like no other that’s gone before, in that CISOs must battle not only the huge volume of “old threats” out there but also a growing array of stealthier new attacks designed to circumvent traditional tools. These could include certain types of targeted attacks, ransomware, zero-day threats,…
The Internet of Things (IoT) is changing the way we live and work forever. It makes us more productive, healthier and happier, and it enables businesses to work smarter, more efficiently and with greater agility. There’s just one problem: from a security perspective IoT devices are fundamentally flawed. And the bad guys are getting pretty…