Trend Micro Named – 2011 Readers' Choice Award Winner

Trend Micro Named as SearchSecurity.com™ 2011 Readers’ Choice Award Winner

CUPERTINO, Calif., Oct. 3, 2011Trend Micro Incorporated, a global cloud security leader, announced Trend Micro InterScan Messaging Security Suite was awarded the gold medal in the Messaging Security Products category of the SearchSecurity.com 2011 Readers’ Choice Awards.

According to SearchSecurity.com, users gave Trend Micro InterScan Messaging Security Suite strong marks for end-user transparency and ease of use. The product also won high marks for ease of installation, configuration and administration.  Users liked the product’s ability to detect and block spam, phishing attempts, viruses and spyware in messaging traffic.

Offered as a software appliance for bare metal or a virtual appliance for VMware or Microsoft Hyper-V, Trend Micro InterScan Messaging Security uses cloud-based Web and email reputation technologies to block spam, spear phishing and other email threats at the messaging gateway. The flexible software solution offers inbound and outbound content filtering to preserve resources and productivity, while preventing data loss and compliance violations. It’s designed to simplify administration with LDAP integration, delegated administration, message tracking and end-user quarantine management.

The newest version of Trend Micro InterScan Messaging Security, announced September 19,2011, features a new Data Privacy and Encryption module which includes data loss prevention and identity-based email encryption. It also further improves ease of use with a widget based dashboard.

Trend Micro InterScan Messaging Security includes a SaaS pre-filter that blocks unwanted spam before it reaches the network while still maintaining privacy with onsite quarantines and outbound filtering. It uses in-the-cloud security powered by the Trend Micro™ Smart Protection Network™ infrastructure.  The Smart Protection Network uses patent-pending “in-the-cloud correlation technology” with behavior analysis to correlate combinations of Web, email and file-threat activities to determine if they are malicious and is powered by over 100 million nodes. By correlating the different components of a threat and continuously updating its threat databases, Trend Micro has the distinct advantage of being able to respond in real time, providing immediate and automatic protection from email, file and web threats.

For the sixth consecutive year, Information Security readers voted to determine the best security products for the SearchSecurity.com 2011 Readers’ Choice Awards. More than 1,500 voters participated this year, rating products in 14 different categories.  Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product’s overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.

For a complete list of the winners, please visit: http://searchsecurity.com/

About Information Security

Information Security is the enterprise security and risk managers’ leading source of critical, objective information on strategic and practical security issues. Information Security’s team of veteran security journalists and experts break down the security problems challenging enterprises and provide practical resolutions. Its in-depth, comprehensive reports and analyses provide security managers–department managers to CXOs — with the tools, knowledge and information they need to make informed decisions about how to safeguard their enterprises, comply with regulations and standards, and reduce risk. The publication’s analysis of technology and products provide a guide for budgeting and purchasing decisions and trends reports, case studies and industry-leading exposes offers security managers insight into how their peers are addressing and solving key security issues. Information Security is an indispensable guide for any security manager and executive charged with protecting information assets and reducing risk.

About SearchSecurity.com and Information Security Magazine Online

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We’re the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more — all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today’s IT-security professional.

About Trend Micro

Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

SOURCE: Trend Micro

Follow Us!

cloudtweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Add Comment Here