Skip to content

Resources and Solutions for Home and Business

Threat Resources

Know Your Enemies

Part 1: John discovers the power of the web. Meanwhile, Evil Joe lurks online waiting to steal John’s data. (3:06 min./9.76 MB)


Part 2: The Trend Micro Smart Protection Network uses the power of the cloud to prevent Evil Joe’s attacks and protect users like John. (4:44 min./14 MB)


ThreatWatch app icon

ThreatWatch App

What are the latest Threat trends? Stay up-to-date and safe with the Threat Watch App for iPhone and Android.

iPhone download
Android download
All free tools

Protect Your Data

Carol Carpenter, Executive GM, explains why you need more protection than ever for their digital data – and why you can trust Trend Micro as your security partner.


Is the Cloud Safe?

Dan Conlon, Director of Engineering, explains what a “personal” cloud is and why it matters to you.

Understand the risks of cloud computing and what you can do about them. Read now.


Thumbnail Extreme-parental-controls 90x90

Extreme Parental Controls

How do you keep your kids from inappropriate sites?




5 Things Every Small Business Should Know about Social Networking
Do you know that social networking can be risky to your business?
Read more

Threat Resources

Five Things Every Small Business Should Know About Cybercrime

Don’t miss these important facts about securing your business.

Best Practices and Proven Advice

Get news and tips from security experts.

Cloud Computing and Small Business

Dan Conlon, Director of Engineering, explains what a “personal” cloud is and why it matters to you. Watch video

Understand the risks of cloud computing and what you can do about them. 
Read now

Video thumbnail-What is a personal cloud?

Find out more about “personal” clouds.

ThreatWatch App

ThreatWatch app icon

What are the latest Threat trends? Stay up-to-date and safe with the Threat Watch App for iPhone and Android.

iPhone download
Android download
All free tools


Threat Resources

The 10-Step Action Plan

Building Your Custom Defence Against Targeted Attacks
and Advanced Persistent Threats

 

This paper will outline ten steps essential for creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability toward off a persistent attacker.

Download paper

Raimund Genes, Trend Micro CTO, discusses cloud, Android, targeted attacks and more at VMworld 2011

 






All Clouds Aren’t Equal

Trend Micro CTO Raimund Genes discusses the advantages of cloud-based defenses and what you should know before choosing one.

Watch video

Data Protection


ESG Research—The Cloud-based Threat Defense Model

Find out what’s driving the shift to cloud-based security.

Download white paper asset

 

IDC—Network Security Overwatch Layer: Smarter Protection
for the Enterprise

Find out how threats are evading your defenses and what you need to do to get
rid of them. Download white paper



Connect with us on