Cybersecurity in the Workplace is Everybody’s Business

CommunicationsTrend Micro

What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are standards and procedures for choosing and maintaining products to help keep information secure. But what can an individual do? Remember – you are the first line of defense. … Read More

Ransomware & Advanced Attacks: Servers are Different

CommunicationsSecurity, Trend Micro

Ransomware and other advanced attacks are the scourge of the modern IT security team. If allowed to gain access to your IT environment, these attacks could shut down the organization, denying access to mission critical applications & data for potentially days, or even indefinitely. The result? The disruption of service delivery, lost productivity and a hefty hit to reputation and profits. … Read More

Layered Cloud Security with IPS & IDS

JasonTrend Micro

In the past, IPS and IDS have only been defined in terms of one versus the other. While each offer their own unique attributes, the key to success may lie within a blend of the two. So how can you decipher what is offered with the two intrusion defense tools? In this article, we breakdown the main differences between IPS … Read More

3 Secrets to Becoming a Cloud Security Superhero

JasonTrend Micro

Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day … Read More

Trend Micro Named a Leader in 2016 Gartner Endpoint Protection Platforms Magic Quadrant

CommunicationsPress Release, Trend Micro

Today’s threat landscape has never been more volatile or dangerous. Given what’s at stake, it can be difficult for IT buyers to know which provider to turn to keep critical corporate data secure, their users’ endpoints and servers up and running, and compliance officers happy. That’s where Gartner’s Magic Quadrant reports can help out – providing cyber security executives with info they can use to see … Read More