sb-au logo
Story image

IDC names Trend Micro number one vendor for SDC security

Trend Micro has been ranked the number one vendor in the 2018 market share for software-defined compute (SDC) workload protection, according to global analyst firm IDC.

The new independent report: Worldwide Software Defined Compute Workload Security Market Shares, 2018 revealed Trend Micro achieved a market share lead of 35.5%, almost triple its nearest competitor in 2018.

“We predicted a decade ago that organisations would need multi-layered security to protect their cloud environments and software-defined data centres,” says Trend Micro ANZ technical director Mick McCluney.

“Were glad to see our foresight and innovation being recognised by so many customers and to be ranked a #1 vendor for 2018 market share by IDC,” says McCluney.

The firm defines SDC in the report as, SDC technologies are often used in the context of public or private clouds, but can also be implemented in non-cloud environments particularly virtualised and/or containerised environments.

These products accomplish their goals by ensuring the system does not run malicious software that can compromise business applications and data on the servers.

IDC program vice president, security and trust Frank Dickson says, “For years, Trend Micro has steadily built out its SDC workload protection capabilities for virtual, public cloud and container environments, offering tight integration with AWS, Azure and Google Cloud Platform. Although, the future has not been written, Trend Micro is the dominant player in this market.”

Over this time, real-time security has been embedded into running applications and Trend Micro has focused on automation and security-as-code to seamlessly build protection into DevOps pipelines, including pre-runtime scanning of container images.

This development continued with the August release of XDR, which correlates data across email, network, endpoint, server and cloud workloads to identify malicious activity which might otherwise go unnoticed. Trend Micro further built on these capabilities with the acquisition of security posture management leader Cloud Conformity in October.

This month, Trend Micro launched a cloud security services program, Trend Micro Cloud One, to address customers security challenges around data center, IaaS, containers, storage and serverless architectures.

Trend Micro provides cybersecurity solutions including layered security for data centres, cloud environments, networks and endpoints to consumers, businesses, and governments. The vendor’s products work together to share threat intelligence and provide a connected threat defence with centralised visibility and control. The company has more than 6,000 employees in 50 countries.

Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Link image
Save the date: 28 October is the day your CX will be supercharged
Learn from the experts at Zendesk and ESG to find out how you can supercharge your customer experience approach in this exclusive online event! Register now.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Attack from DOS: In Zero We Trust
In combination with malware, DDoS attacks on banks have been used to cause distraction so the transfer of stolen funds goes unnoticed. More