Trend Micro releases four new security suites

New solutions aimed at cutting costs for mid-to-enterprise level businesses

Tags: Trend Micro IncorporatedUnited Arab Emirates
  • E-Mail
Trend Micro releases four new security suites Trend says the new suites are intended to allow companies to more efficiently deploy security solutions.
By  Mark Sutton Published  January 17, 2010

Trend Micro has announced the launch of four new security suites for mid- to enterprise-sized organizations, which it says will help reduce the cost of security.

The new, solutions, Enterprise Security Suite, Enterprise Security for Endpoints and, Mail Servers, Enterprise Security for Gateways and Enterprise Security for Endpoints, are intended to block online threats and secure corporate networks, servers and endpoints, across a range of client devices.

The four new suites all utilise the Trend Micro Smart Protection Network infrastructure, which combines cloud-based technologies with light-weight clients, which reduces the time it takes to deploy and manage security solutions. According to independent research from Osterman Research Trend Micro can help lower projected infection rates by up to over 60%, while cutting security management costs by up to 40%.

Dan Glessner, vice-president of global enterprise and data centre marketing, Trend Micro said: "Based on in-depth primary market research, we created these new Trend Micro Enterprise Security suites to better help organizations get their security-related jobs performed both more effectively and more efficiently. An increasing number of organizations are seeking to consolidate many, disparate security point products into fewer, more comprehensive solutions from a handful of industry leaders; Trend Micro is one of these trusted advisors."

3377 days ago
Janice Gaines

Anyone else here reading “I.T. WARS”? I had to read parts of this book as part of my employee orientation at a new job. The book talks about a whole new culture as being necessary – an eCulture – for a true understanding of security, being that most identity/data breaches are due to simple human errors. It has great chapters on security, as well as risk, content management, project management, acceptable use, policies, and so on. Just Google “IT WARS” – check out a couple links down and read the interview with the author David Scott. (Full title is “I.T. WARS: Managing the Business-Technology Weave in the New Millennium”).

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code