sb-au logo
Story image

Trend Micro named as leader in endpoint security

Cyber security firm Trend Micro has been named a leader in endpoint security after achieving the second-highest score in the current offering category in The Forrester Wave: Endpoint Security Suites, Q2 2019 report.

"Trend Micro's endpoint security offerings span the full gamut of threat prevention and detection, with market-leading capabilities in both categories," Forrester commented. "Extensive services are also offered, including MDR services for network, endpoints, messaging, cloud workloads, and servers."

Trend Micro received the highest possible score for Corporate Vision and Focus (a criterion under the Strategy category), which Trend Micro says is a recognition of its stable leadership, innovative technology and high-quality product management and development.

"The bullseye for cyber threats is corporate endpoints, making security solutions in this area a crucial component of any enterprise risk management strategy," says Mick McCluney, technical director, Trend Micro ANZ. 

"That's why we are delighted to be recognised as a leader in endpoint security. We believe its proof that Trend Micro has the strategy, the resources and the range of market-leading capabilities to suit any organisation," he says.

"Modern technology can transform endpoint security," McCluney says.

"With the future of endpoint security in mind, Trend Micro has enhanced its proposition with the release of Apex One, the evolution of its advanced endpoint security offering," he explains.

"Apex One offers a comprehensive blend of cross-generational threat defense capabilities from a single, easy-to manage agent available as SaaS or on-premises," says McCluney.

"Although critically important, the endpoint is just one piece of the cybersecurity puzzle. Thats why Trend Micro offers these security capabilities as part of a Connected Threat Defense strategy, which ensures each IT layer shares intelligence to enhance visibility and real-time threat protection and response," he says.

"Trend Micro's Connected Threat Defense architecture provides integrated threat intelligence and control over an extensive portfolio of email, endpoint, network, cloud, and security products aimed at enterprise buyers," Forrester's report says.

"Trend is well positioned for large or small organisations looking for a complete endpoint security suite, especially those with complex deployment requirements."

Link image
Revealed: The pros and cons of leading cloud security vendors
Determining which edge and cloud security vendor is the right fit for your organisation can be challenging. Here's the guide for evaluating the leading enterprise solutions.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Link image
Revealed: 9 developer best practices to achieve DevOps at scale
Learn from a software engineering leader how to enable large dev teams to write and deploy higher-quality software with a metrics-driven strategy.More
Story image
The importance of selecting a secure SD-WAN solution
It’s essential to adopt a secure SD-WAN solution to avoid the risks that an unsecured SD-WAN solution can introduce, writes Wavelink managing director Ilan Rubin.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More