Welcome!

Cloud Security Authors: Ed Featherston, Liz McMillan, Derek Weeks, Elizabeth White, Darren Anstee

Blog Feed Post

Trend Micro alleviates small business security concerns with Worry-Free Business Security 7

Small Business Flagship Line now includes Data Loss Prevention and Mac Client Protection

Marlow, UK 3rd November, 2010 - Trend Micro, a global leader in Internet content security, today announces Worry Free Business Security 7, a new edition of its security suite specifically designed to combat IT security threats facing small businesses today, without impacting the day to day running of the business.

Worry-Free Business Security 7 equips small businesses with a set of tools designed to combat evolving IT security threats. With over one new piece of malware created every second, its introduction is timely, as cybercriminals are increasingly preying upon smaller businesses that are often strapped for IT resources and security expertise.

Small businesses are increasingly security aware. According to Trend Micro's 2010 corporate end user survey - which surveyed over 1600 end users in the US, UK, Germany and Japan - around 60% of small businesses expressed concerns over data-stealing malware, followed by over half (56%) concerned about data leaks (both intentional and unintentional).

"Data loss, either through internal data leaks or malware, is a serious issue for small businesses", said Caroline Hodson, head of UK channel sales and marketing at Trend Micro in the UK. "Worry-Free Business Security 7 offers small businesses data leakage protection while stopping threats before they reach their networks."

Despite their security concerns, a recent study* conducted by the Federation of Small Businesses in the UK, found that less than a quarter (24%) of small businesses currently had any form of email encryption in place.

In Worry-Free Business Security 7, Trend Micro addresses these concerns with a new email data leakage prevention (DLP) feature. This feature enables small businesses to keep information private by discovering, monitoring and preventing accidental or deliberate loss of confidential information through email.

Worry-Free Business Security 7 also offers an integrated Mac client protection feature which is available for small businesses that are running both Macs and Windows®. This allows them to secure their iMacs®, Mac Servers®, and MacBooks® without purchasing or managing additional solutions. The feature's single console includes security status and configuration for both platforms.

One of the most notorious threats in 2010, Conficker, was partly spread by infected USB sticks and other attachable devices. Its convenience and portability has made it another infection pathway. Small businesses that are challenged with managing and tracking the movements of USB devices can now, with this new feature, control access to USB drives and other attached devices to prevent data loss and block threats. Businesses can restrict access to USB ports to avoid anyone copying information to portable USB drives.

Trend Micro made a commitment to solving small business security needs six years ago when it first introduced its Worry-Free product line to the market. Since its launch, the Worry-Free product line has seen widespread adoption. "According to our latest reports, Trend Micro's Worry-Free Business Security Suite was the top product sold, accounting for 49% of the total sales of licenses in September this year in the sub 100 seats small to medium sized business segment", commented Alex Mesguich, VP of Enterprise Research at analyst firm Context.

-- ends ---

The Worry-Free difference: Stopping threats before they reach businesses
In independent tests, Worry-Free Business Security is rated best at blocking threats BEFORE they reach your computers, file servers, and mail servers. It achieves this through the power of the Trend Micro™ Smart Protection™ network infrastructure, which scans, filters and correlates in the cloud more than 3.2 terabytes of data and blocks over 5 billion threats every single day. The Smart Protection Network then leverages this data to rapidly identify and respond to emerging threats, blocking them before they impact a business, and improving the existing response to known threats. And because the majority of the work is done in the cloud, not directly on computers, performance is optimised so small businesses can focus on their business.

The Worry-Free difference: Channel-focused, channel-driven
Trend Micro's comprehensive channel-friendly portfolio of products and solutions also include Worry-Free Remote Manager, which is a single, hosted console that channel partners can use to manage multiple customers. Worry-Free Remote Manager provides integrated installation with Worry-Free Business Security 7, allowing partners to easily add customers to their console during their initial installation of Worry-Free Business Security. Trend Micro is currently the only security vendor that offers this type of critical tool, which allows channel partners to manage multiple customers using multiple products from a single console free of charge to eligible channel solution partners.

Availability
Worry-Free Business Security 7 is available in two editions: Standard and Advanced. The Standard edition protects Windows PCs, notebooks, and servers. The Advanced edition protects everything the Standard edition protects, as well as Mac clients and servers, and Exchange servers. The Advanced edition also includes multi-layer anti-spam and email data loss prevention.

About Trend Micro:
Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro Smart Protection Network infrastructure which delivers advanced protection from the cloud, blocking threats in real-time before they reach you. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.

Notes:
*The study was conducted by the Federation of Small Businesses in July, surveying 650 small businesses in the Bedfordshire, Cambridgeshire and Hertfordshire areas - further results of the survey are available on request

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@ThingsExpo Stories
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...