Threats to Android, the Cloud and digital lifestyle devices will make
fighting cybercriminals more complex in 2013 than ever before, according
to a report released today by the global cloud security leader Trend
"In 2013, people are going to have a harder time managing the security
of their devices," said Raimund Genes, CTO, Trend Micro. "Different
platforms, operating systems and security models will make it moremore...
Dell World 2012 -- Trend Micro Inc. (TYO: 4704;TSE: 4704), the global
leader in cloud security and virtualization, will be exhibiting as a
Bronze-level sponsor at Dell
World 2012 from December 11-13. Under the theme, "Securing your
Journey to the Cloud," Trend Micro will demonstrate how the company has
been working closely with Dell to simplify security by providing Dell
customers with a single platform that delivers complete security formore...
Japanese Android application review and information website Androider.JP,
recently announced that it is working with Trend Micro, the global
leader in cloud security, to integrate the company's Mobile
App Reputation Solution to pre-screen applications for
irregularities and security problems. This will increase the overall
quality of applications available through the site helping to prevent
the spread of illegitimate applicationsmore...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in
cloud security, and platinum sponsor of the AWS re:Invent Conference at
the Venetian in Las Vegas, Nevada from November 27th- 29th,
is announcing that global customers of Amazon Web Services (AWS) are
able to take advantage of highly optimized security solutions from Trend
Micro for their AWS deployments, including the newly announced AWS
Storage Gateway. Customers deployingmore...
In its analysis of targeted attack data collected between February and
September this year, global cloud security leader Trend Micro (TYO:
4704;TSE: 4704) found that 91 percent of targeted attacks involved spear
phishing. This finding reinforces the company's stance that these
attacks often begin at a very simple point of contact – an email message
that is cleverly crafted to entice a specific individual to either open
a malicious filemore...