We continually advance our technologies to deliver on our mission to make the world safe for the exchange of digital information.
Our data-centric security framework addresses the risks and opportunities inherent in cloud computing and the mobility of people, their devices and their data, as well as confronting the dangerous increase in targeted attacks on business and government.
Building on the superior technology of the Trend Micro™ Smart Protection Network™ infrastructure, we’re integrating smarter threat and data protection along with unified security management to deliver adaptive security that protects your important data wherever it resides.
Smarter threat protection brings the power of our cloud-based detection and correlation technologies inside a customer’s environment with intelligent sensors throughout the network to identify and protect against targeted attacks.
Smarter data protection enables integrated data protection and contextual awareness throughout the organisation to ensure the confidentiality and protection of valuable data.
Our History of Innovation Continues
Breakthrough Encryption Key Management and Data Protection for Public and Private Clouds
Agentless Anti-Malware for virtualised desktops and data centers
Data Center Security
Deep Security for Physical, Virtual and Cloud Servers
Trend Micro Smart Protection NetworkA Cloud/Client Content Security Infrastructure
Data Loss PreventionLeakProof™
Web Threat ProtectionWeb Reputation
|2006||Botnet Identification Service|
|2005||E-mail Reputation Services|
Trend Micro and Cisco
Integrated Security in the Network
Integrated Gateway Content Security:InterScan™ Messaging Security Suite
|2002||Two-Hour Virus Response SLA
Threat Lifecycle Management Strategy
Enterprise Protection Strategy (EPS)
Web-based Centralised Management
Trend Micro Control Manager™
Email Server Virus Protection
Internet Gateway Virus Protection
LAN Server Virus Protection
All of our solutions are powered by Smart Protection Network infrastructure, which uses smart feedback, threat correlation and a cloud-client architecture to ensure new threats are blocked as soon as they are identified.
Combining data loss prevention, device control, encryption and key management with contextual awareness secures data across physical, virtual and cloud environments.
Securing data as it moves between platforms or cloud vendors, regardless of access device, enables customers to take full advantage of improvements in IT infrastructures.