Cloud Security News: Trend Micro, World's Fastest-Growing Leading Content Security Vendor

 

CUPERTINO, Calif., June 20, 2011 – The latest independent Canalys study of worldwide enterprise security market share found that Trend Micro Incorporated  is the world’s fastest – growing leading content security vendor, with a 17 percent growth rate (Q1 2010 – Q1 2011).

The Canalys study, “Canalys estimates, Enterprise Security Analysis, June 2011,” covers Content Security, Network Security and Security Management sectors for Q1 2011.  According to Canalys, Content Security (anti-malware, messaging security and web threat security) is one of the fastest growing sectors measured by end-user value.  The study reported Trend Micro as the fastest growing of the world’s leading content security vendors in Q1 2011 with 17 percent growth, outpacing Kasperksy at 12 percent growth, and Symantec and McAfee with 6.9 and 6.5 percent growth, respectively.

In the content security regional performances, Trend Micro ranked first in growth in APAC with a 38.7 percent growth rate, first in Latin America with an 18 percent growth rate, and second in EMEA with a 13.3 percent growth rating, beating McAfee with a reported 9.6 percent growth rate.

Trend Micro’s momentum in the marketplace is supported by several recent independent market share reports.  IDC recently declared Trend Micro the leader in server security (Worldwide Endpoint Security 2010-2014 Forecast and 2009 Vendor Shares, IDC).  Trend Micro was declared the #1 market share leader in Virtualization Security (2011 Technavio – Global Virtualization Security Management Solutions Citation).  And Trend Micro was declared the #1 largest independent security vendor in the world, (2011 © Quocirca Ltd.: Selected independent IT security vendor revenues)

These numerous independent market share survey reports of Trend Micro’s leading market share are further validation of Trend Micro’s innovative and award-winning endpoint, virtualization and cloud security solutions meeting real customer needs.  Trend Micro solutions secure data on millions of devices, endpoints and servers in physical, virtual and cloud environments worldwide.  Our more than 20 years of content security experience and continuous investment in building and acquiring key technologies is paying off,” said Eva Chen, Co-founder and CEO of Trend Micro.

Trend Micro’s content security expertise ranges across enterprise, small business and consumer products. For example, Trend Micro™ Enterprise Security is a tightly integrated offering of content security products, services, and solutions powered by the innovative, in-the-cloud Trend Micro™ Smart Protection Network™ security infrastructure. Trend Micro™ Worry-Free™ Business Security 7 – Advanced is cloud-based protection against viruses, spam, cybercriminals and data loss. It lets you focus on your business instead of worrying about Internet security. For strong, fast, and easy-to-use protection, Trend Micro™ Titanium™ products use cloud technology to automatically stop viruses and spyware before they reach your computer, so it won’t slow you down – it’s a whole new way to protect your computer.

With the introduction of Trend Micro™ Deep Security, a platform for advanced security and compliance on physical, virtual and cloud servers; Trend Micro™ SecureCloud™ security platform, a breakthrough data protection and encryption key management solution for both public and private clouds; and, on the consumer side, mobile device protection for the Android platform, Trend Micro continues to advance its ability to secure and manage data across multiple platforms.

About Trend Micro Incorporated

Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

SOURCE:  Trend Micro Newsroom

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

What Ever Happened To Google Glass?

What Ever Happened To Google Glass?

What Ever Happened to Google Glass? It was supposed to be the next big thing in tech so where did it go? Last year you could not go anywhere without hearing about some insane new use for the product and now it seems to have vanished in a plume of smoke. A Lackluster Rollout Back

Posted on by

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

Microsoft to enter the STRUGGLE of the Human Wrist

Microsoft to enter the STRUGGLE of the Human Wrist

It’s not just a thumb war, it’s total digit war The battle for the future of the human wrist entered a new phase on Monday after it was claimed that tech goliath Microsoft is planning to release its own wearable computer in the coming weeks.…Read the source article at The Register About Latest Posts Follow

Standards Organization ISO Takes on Cloud Computing Standards

Standards Organization ISO Takes on Cloud Computing Standards

Given the quality differences in different cloud services and issues of compatibility, ISO, the world’s best known standards body has issued two standards related to cloud computing…. Read the source article at Web Host Industry Review About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing

IBM Paying $1.5 Billion to Shed Its Chip Division

IBM Paying $1.5 Billion to Shed Its Chip Division

IBM will pay $1.5 billion to Globalfoundries in order to shed its costly chip division. IBM will make payments to the chipmaker over three years, but it took a $4.7 billion charge for the third quarter when it reported earnings Monday. Read the source article at Mashable About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is