Cloud Security News: Trend Micro, World's Fastest-Growing Leading Content Security Vendor

 

CUPERTINO, Calif., June 20, 2011 – The latest independent Canalys study of worldwide enterprise security market share found that Trend Micro Incorporated  is the world’s fastest – growing leading content security vendor, with a 17 percent growth rate (Q1 2010 – Q1 2011).

The Canalys study, “Canalys estimates, Enterprise Security Analysis, June 2011,” covers Content Security, Network Security and Security Management sectors for Q1 2011.  According to Canalys, Content Security (anti-malware, messaging security and web threat security) is one of the fastest growing sectors measured by end-user value.  The study reported Trend Micro as the fastest growing of the world’s leading content security vendors in Q1 2011 with 17 percent growth, outpacing Kasperksy at 12 percent growth, and Symantec and McAfee with 6.9 and 6.5 percent growth, respectively.

In the content security regional performances, Trend Micro ranked first in growth in APAC with a 38.7 percent growth rate, first in Latin America with an 18 percent growth rate, and second in EMEA with a 13.3 percent growth rating, beating McAfee with a reported 9.6 percent growth rate.

Trend Micro’s momentum in the marketplace is supported by several recent independent market share reports.  IDC recently declared Trend Micro the leader in server security (Worldwide Endpoint Security 2010-2014 Forecast and 2009 Vendor Shares, IDC).  Trend Micro was declared the #1 market share leader in Virtualization Security (2011 Technavio – Global Virtualization Security Management Solutions Citation).  And Trend Micro was declared the #1 largest independent security vendor in the world, (2011 © Quocirca Ltd.: Selected independent IT security vendor revenues)

These numerous independent market share survey reports of Trend Micro’s leading market share are further validation of Trend Micro’s innovative and award-winning endpoint, virtualization and cloud security solutions meeting real customer needs.  Trend Micro solutions secure data on millions of devices, endpoints and servers in physical, virtual and cloud environments worldwide.  Our more than 20 years of content security experience and continuous investment in building and acquiring key technologies is paying off,” said Eva Chen, Co-founder and CEO of Trend Micro.

Trend Micro’s content security expertise ranges across enterprise, small business and consumer products. For example, Trend Micro™ Enterprise Security is a tightly integrated offering of content security products, services, and solutions powered by the innovative, in-the-cloud Trend Micro™ Smart Protection Network™ security infrastructure. Trend Micro™ Worry-Free™ Business Security 7 – Advanced is cloud-based protection against viruses, spam, cybercriminals and data loss. It lets you focus on your business instead of worrying about Internet security. For strong, fast, and easy-to-use protection, Trend Micro™ Titanium™ products use cloud technology to automatically stop viruses and spyware before they reach your computer, so it won’t slow you down – it’s a whole new way to protect your computer.

With the introduction of Trend Micro™ Deep Security, a platform for advanced security and compliance on physical, virtual and cloud servers; Trend Micro™ SecureCloud™ security platform, a breakthrough data protection and encryption key management solution for both public and private clouds; and, on the consumer side, mobile device protection for the Android platform, Trend Micro continues to advance its ability to secure and manage data across multiple platforms.

About Trend Micro Incorporated

Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

SOURCE:  Trend Micro Newsroom

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and