Trend Micro Named – 2011 Readers' Choice Award Winner

Trend Micro Named as SearchSecurity.com™ 2011 Readers’ Choice Award Winner

CUPERTINO, Calif., Oct. 3, 2011Trend Micro Incorporated, a global cloud security leader, announced Trend Micro InterScan Messaging Security Suite was awarded the gold medal in the Messaging Security Products category of the SearchSecurity.com 2011 Readers’ Choice Awards.

According to SearchSecurity.com, users gave Trend Micro InterScan Messaging Security Suite strong marks for end-user transparency and ease of use. The product also won high marks for ease of installation, configuration and administration.  Users liked the product’s ability to detect and block spam, phishing attempts, viruses and spyware in messaging traffic.

Offered as a software appliance for bare metal or a virtual appliance for VMware or Microsoft Hyper-V, Trend Micro InterScan Messaging Security uses cloud-based Web and email reputation technologies to block spam, spear phishing and other email threats at the messaging gateway. The flexible software solution offers inbound and outbound content filtering to preserve resources and productivity, while preventing data loss and compliance violations. It’s designed to simplify administration with LDAP integration, delegated administration, message tracking and end-user quarantine management.

The newest version of Trend Micro InterScan Messaging Security, announced September 19,2011, features a new Data Privacy and Encryption module which includes data loss prevention and identity-based email encryption. It also further improves ease of use with a widget based dashboard.

Trend Micro InterScan Messaging Security includes a SaaS pre-filter that blocks unwanted spam before it reaches the network while still maintaining privacy with onsite quarantines and outbound filtering. It uses in-the-cloud security powered by the Trend Micro™ Smart Protection Network™ infrastructure.  The Smart Protection Network uses patent-pending “in-the-cloud correlation technology” with behavior analysis to correlate combinations of Web, email and file-threat activities to determine if they are malicious and is powered by over 100 million nodes. By correlating the different components of a threat and continuously updating its threat databases, Trend Micro has the distinct advantage of being able to respond in real time, providing immediate and automatic protection from email, file and web threats.

For the sixth consecutive year, Information Security readers voted to determine the best security products for the SearchSecurity.com 2011 Readers’ Choice Awards. More than 1,500 voters participated this year, rating products in 14 different categories.  Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product’s overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.

For a complete list of the winners, please visit: http://searchsecurity.com/

About Information Security

Information Security is the enterprise security and risk managers’ leading source of critical, objective information on strategic and practical security issues. Information Security’s team of veteran security journalists and experts break down the security problems challenging enterprises and provide practical resolutions. Its in-depth, comprehensive reports and analyses provide security managers–department managers to CXOs — with the tools, knowledge and information they need to make informed decisions about how to safeguard their enterprises, comply with regulations and standards, and reduce risk. The publication’s analysis of technology and products provide a guide for budgeting and purchasing decisions and trends reports, case studies and industry-leading exposes offers security managers insight into how their peers are addressing and solving key security issues. Information Security is an indispensable guide for any security manager and executive charged with protecting information assets and reducing risk.

About SearchSecurity.com and Information Security Magazine Online

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We’re the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more — all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today’s IT-security professional.

About Trend Micro

Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

SOURCE: Trend Micro

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Featured Sponsors

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

2015 Advertising Opportunities - Find Out More!

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Blue square_logo_100x100-01
cisco_logo_100x100 vmware citrix100

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter