{"id":15333,"date":"2019-05-16T07:00:06","date_gmt":"2019-05-16T15:00:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/16\/news-9082\/"},"modified":"2019-05-16T07:00:06","modified_gmt":"2019-05-16T15:00:06","slug":"news-9082","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/16\/news-9082\/","title":{"rendered":"Why You Should Pick a Leader for Your Enterprise Email Security"},"content":{"rendered":"<p><strong>Credit to Author: Joyce Huang| Date: Thu, 16 May 2019 14:30:38 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%<sup>1<\/sup> of ransomware attacks come from email. That\u2019s why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming.<\/p>\n<p>Maybe it doesn\u2019t have to be. Forrester Research, a well-known independent research firm, released \u201cThe Forrester Wave<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>: Enterprise Email Security, Q2 2019\u201d report on May 16, 2019. Using its 32-criterion evaluation of enterprise email content security providers, Forrester identified the 12 most significant vendors and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk professionals select the right one for their needs.<\/p>\n<p>Trend Micro has been named a Leader in the Forrester report. What\u2019s special is that we also received the highest score in the <strong>Strategy category<\/strong> among all 12 vendors. Furthermore, we got the highest score possible for the \u201c<strong>Technology leadership\u201d criterion<\/strong>, which is a sub-criterion of the Product Strategy criterion. Trend Micro also received the highest score possible in the \u201cDeployment options\u201d and \u201cCloud integration\u201d criteria.<\/p>\n<p><strong>Highest score possible for \u201cTechnology leadership\u201d criterion in Strategy category \u2013 our takeaways<\/strong><\/p>\n<p>Building on 20+ years in email security, Trend Micro continues to make strong investment and technology innovation in this market. Email threats are evolving, so do Trend Micro\u2019s email security solutions. \u00a0To cite just a couple of examples, new technologies developed by Trend Micro to combat latest email threats include:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>The unique, patent-pending <a href=\"https:\/\/blog.trendmicro.com\/stop-impersonations-of-your-ceo-by-checking-the-writing-style\/\"><strong>Writing Style DNA technology<\/strong><\/a> compares the writing style of suspected fraud emails to the known AI model of the executive being impersonated. This technology adds another layer of filtering for Business Email compromise (BEC) attacks on top of the machine learning-based email header and content analysis. To-date, Trend Micro has built AI writing style models for almost 7,000 high-profile users, and found 5,400 additional attacks at 160 organizations. This is the final detection layer after Microsoft Office 365 and\/or email gateway filtering and other Trend Micro anti-phishing filters.<\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com\/stop-office-365-credential-theft-with-an-artificial-eye\/\"><strong>Computer vision<\/strong><\/a> detection of popular fake login sites for account takeover protection. This patent-pending technology blends computer vision image analysis technology with artificial intelligence to \u201csee\u201d fake websites. It protects customers from credential phishing attacks.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>With a long and innovative history with email security, Trend Micro remains at the forefront of the industry with a strong strategy that continues to position its customers well over the long term.<\/p>\n<p><strong>Highest score possible in \u201cDeployment options\u201d and \u201cCloud integration\u201d criteria \u2013 our takeaways<\/strong><\/p>\n<p>Trend Micro is the only vendor to offer dual layer email protection via a cloud-based API plus SMTP solution for advanced threat protection. This unique approach provides \u201cbest of both worlds\u201d, offering the benefits of both deployment types. Email gateway (SMTP solution) is perfect for inbound filtering and outbound DLP or email encryption. Trend Micro\u2019s API solution is quick and easy to deploy, and can protect internal phishing emails for your Office 365 or Gmail, as well as cloud file sharing services (e.g. OneDrive or Google Drive).<\/p>\n<p>Trend Micro email security is proven to be effective in protecting customers. In 2018, Trend Micro Cloud App Security, the API solution, stopped <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/advanced-defenses-for-advanced-email-threats\">8.9 million high-risk threats<\/a> that weren\u2019t caught by Office 365 security.<\/p>\n<p>By choosing Trend Micro, you are investing in a solution which will continuously evolve to combat tomorrow\u2019s email security challenges.<\/p>\n<p>Check out the <a href=\"https:\/\/resources.trendmicro.com\/Forrester-Wave-Email.html\">report<\/a> and see for yourself why Trend Micro is a leader in Enterprise Email Security.<\/p>\n<h5>1 TrendLabs 2017 Security Roundup, March 2018<\/h5>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/why-you-should-pick-a-leader-for-your-enterprise-email-security\/\">Why You Should Pick a Leader for Your Enterprise Email Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/why-you-should-pick-a-leader-for-your-enterprise-email-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joyce Huang| Date: Thu, 16 May 2019 14:30:38 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/05\/20180418012618464-956-859BM0g-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%1 of ransomware attacks come from email. That\u2019s why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming&#8230;.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/why-you-should-pick-a-leader-for-your-enterprise-email-security\/\">Why You Should Pick a Leader for Your Enterprise Email Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,21813,21814,714],"class_list":["post-15333","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-enterprise-email-security","tag-forrester-research","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15333"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15333\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15333"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}