The Lighter Side Of The Cloud: Passing By
The Lighter Side Of The Cloud – Cloud Storage
The Lighter Side Of The Cloud – Bed Box
The Lighter Side Of The Cloud – Application Forecaster
The Lighter Side Of The Cloud – Brain Clutter

Trend Micro Named – 2011 Readers’ Choice Award Winner

Trend Micro Named as SearchSecurity.com™ 2011 Readers’ Choice Award Winner

CUPERTINO, Calif., Oct. 3, 2011Trend Micro Incorporated, a global cloud security leader, announced Trend Micro InterScan Messaging Security Suite was awarded the gold medal in the Messaging Security Products category of the SearchSecurity.com 2011 Readers’ Choice Awards.

According to SearchSecurity.com, users gave Trend Micro InterScan Messaging Security Suite strong marks for end-user transparency and ease of use. The product also won high marks for ease of installation, configuration and administration.  Users liked the product’s ability to detect and block spam, phishing attempts, viruses and spyware in messaging traffic.

Offered as a software appliance for bare metal or a virtual appliance for VMware or Microsoft Hyper-V, Trend Micro InterScan Messaging Security uses cloud-based Web and email reputation technologies to block spam, spear phishing and other email threats at the messaging gateway. The flexible software solution offers inbound and outbound content filtering to preserve resources and productivity, while preventing data loss and compliance violations. It’s designed to simplify administration with LDAP integration, delegated administration, message tracking and end-user quarantine management.

The newest version of Trend Micro InterScan Messaging Security, announced September 19,2011, features a new Data Privacy and Encryption module which includes data loss prevention and identity-based email encryption. It also further improves ease of use with a widget based dashboard.

Trend Micro InterScan Messaging Security includes a SaaS pre-filter that blocks unwanted spam before it reaches the network while still maintaining privacy with onsite quarantines and outbound filtering. It uses in-the-cloud security powered by the Trend Micro™ Smart Protection Network™ infrastructure.  The Smart Protection Network uses patent-pending “in-the-cloud correlation technology” with behavior analysis to correlate combinations of Web, email and file-threat activities to determine if they are malicious and is powered by over 100 million nodes. By correlating the different components of a threat and continuously updating its threat databases, Trend Micro has the distinct advantage of being able to respond in real time, providing immediate and automatic protection from email, file and web threats.

For the sixth consecutive year, Information Security readers voted to determine the best security products for the SearchSecurity.com 2011 Readers’ Choice Awards. More than 1,500 voters participated this year, rating products in 14 different categories.  Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product’s overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.

For a complete list of the winners, please visit: http://searchsecurity.com/

About Information Security

Information Security is the enterprise security and risk managers’ leading source of critical, objective information on strategic and practical security issues. Information Security’s team of veteran security journalists and experts break down the security problems challenging enterprises and provide practical resolutions. Its in-depth, comprehensive reports and analyses provide security managers–department managers to CXOs — with the tools, knowledge and information they need to make informed decisions about how to safeguard their enterprises, comply with regulations and standards, and reduce risk. The publication’s analysis of technology and products provide a guide for budgeting and purchasing decisions and trends reports, case studies and industry-leading exposes offers security managers insight into how their peers are addressing and solving key security issues. Information Security is an indispensable guide for any security manager and executive charged with protecting information assets and reducing risk.

About SearchSecurity.com and Information Security Magazine Online

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We’re the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more — all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today’s IT-security professional.

About Trend Micro

Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

SOURCE: Trend Micro

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Recent

Technologies That Work Nicely With The Cloud

Technologies That Work Nicely With The Cloud

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a look at some of the more exciting emerging technologies that can be used in conjunction…

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Popular Archives

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising