{"id":11147,"date":"2018-01-17T07:00:05","date_gmt":"2018-01-17T15:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/17\/news-4918\/"},"modified":"2018-01-17T07:00:05","modified_gmt":"2018-01-17T15:00:05","slug":"news-4918","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/17\/news-4918\/","title":{"rendered":"We Did It Again! Trend Micro Named a Leader in 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)"},"content":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Wed, 17 Jan 2018 14:16:11 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"275\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-768x703.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-1024x938.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-640x586.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-900x824.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-440x403.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-380x348.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup.jpg 1268w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Trend Micro has been <a href=\"http:\/\/newsroom.trendmicro.com\/press-release\/corporate\/trend-micro-again-recognized-leader-gartner-magic-quadrant-intrusion-detecti\">named <\/a>a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders\u2019 quadrant illustrates our commitment to meeting the growing security and performance requirements of data centers and high-performance enterprise networks.<\/p>\n<p><strong>What Sets Us Apart? Go Beyond NGIPS with XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Security<\/strong><\/p>\n<p>Trend Micro goes beyond next-generation intrusion prevention systems (NGIPS) to protect your enterprise network with a cross-generational blend of threat protection techniques fueled by market-leading threat intelligence. Our solutions are optimized, specifically designed for and integrated with leading customer platforms and applications, and connected through shared threat intelligence with centralized visibility and control across layers of security.<\/p>\n<p>Going beyond NGIPS with XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><strong>\u00a0<\/strong>requires that our solutions must be <u>smart<\/u> \u2013 they must provide faster time to protection against known, undisclosed and unknown threats. Our solution provides protection against the full range of threats through key capabilities like virtual patching, lateral movement detection, machine learning, and custom sandbox analysis. Our threat intelligence is fueled by a global research team and the <a href=\"https:\/\/www.zerodayinitiative.com\/blog\">Zero Day Initiative<\/a>, the leader in global vulnerability research and discovery since 2007. With exclusive access to vulnerability information from the Zero Day Initiative, we were able to provide customers an average of <strong>72 days<\/strong> of preemptive coverage for vulnerabilities before the availability of a patch in 2017!<\/p>\n<p>XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> security demands that our solutions be <u>optimized<\/u> \u2013 they must provide high performance and automated protection that will fit any network environment. With the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/integrated-atp\/threat-protection-system\/tx-series-tps.html\">TippingPoint\u00ae TX Series<\/a>, we are able to provide unparalleled performance up to <strong>40 Gbps<\/strong> in a small physical footprint (1U) for large data centers and high capacity enterprise networks and stack up to 120 Gbps in a 3U form factor. Our purpose-built solutions are designed for optimal performance and network transparency, and can be deployed in the network as a bump-in-the wire \u2013 with latency measured at less than 40 microseconds.<\/p>\n<p>XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> security requires that our solutions must be <u>connected<\/u> \u2013 they must enable real-time sharing of threat intelligence and provide centralized threat insights to deliver automated and faster time to protection. Our solutions leverage the intelligence gathered from Trend Micro\u2019s security research teams, as well as the Trend Micro Smart Protection Network<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> and Zero Day Initiative to detect and block known, unknown and undisclosed attacks in-line in real-time. TippingPoint automatically integrates with Deep Discovery<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.3\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> to immediately forward suspicious objects to be analyzed and remedied. Our threat insights provide centralized visibility on critical threat information including the number and severity of breached hosts, attacked vulnerable hosts, suspicious objects and zero-day threats. Enterprises can prioritize response measures by quickly understanding the threats impacting the network and identifying those that need immediate attention.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/campaigns\/gartner-idps.html\">Click here<\/a> to find out why Gartner named Trend Micro a Leader in the 2018 IDPS Magic Quadrant.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-540526\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-982x1024.jpg\" alt=\"\" width=\"609\" height=\"634\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-982x1024.jpg 982w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-288x300.jpg 288w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-768x801.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-900x939.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-440x459.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips-380x396.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/01\/ips.jpg 1047w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<h5><em>This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Trend Micro.<\/em><\/h5>\n<h5><em>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/em><\/h5>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trend-micro-named-leader-2018-gartner-magic-quadrant-intrusion-detection-prevention-systems-idps\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Wed, 17 Jan 2018 14:16:11 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"275\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-768x703.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-1024x938.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-640x586.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-900x824.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-440x403.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-380x348.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup.jpg 1268w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders\u2019 quadrant illustrates our commitment to meeting the growing security&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714],"class_list":["post-11147","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11147"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11147\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11147"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}