Trend Micro Reduces Endpoint Security Complexity

Mike Vizard
Slide Show

Five Digitally Vulnerable Areas Your Business May be Overlooking

When it comes to IT security, the complexity of managing all the technologies involved often seems like a clear-cut case of insult being continuously added to injury.

Looking to address that complexity issue, Trend Micro today announced an upgrade to the Trend Micro Complete User Protection suite of endpoint security software that makes it much easier to both deploy a mix of IT security technologies as well as acquire them in the age of the cloud.

Confronted with a dizzying array of security products in and out of the cloud, Eric Skinner, vice president of solutions marketing for Trend Micro, concedes it’s very likely that customers are unprotected simply because they failed to acquire the right type of security product to address a particular class of known threats. The primary reason for that failure, says Skinner, is often the complex line card of products that security vendors present to customers. Presented with a raft of options and a limited budget, customers often wind up making a best guess as to which endpoint software to deploy.

Skinner says the latest version of the Trend Micro Complete User Protection software reduces IT security complexity and confusion by centralizing the management of on-premise and cloud security offerings while at the same time making available more flexible licensing terms that allow customers to easily transfer licenses between those environments. As part of that move, Trend Micro is also making available a per-user licensing option that prices IT security the same way regardless of the vehicle used to distribute it.

Most organizations, says Skinner, are in some state of transition when it comes to the cloud. Requiring them to license different IT security products at different times during that transition adds a lot of unnecessary cost and complexity, says Skinner.

As part of the effort to reduce those costs even further, Trend Micro is now also adding a variety of endpoint security technologies to Trend Micro Complete User Protection that go well beyond traditional signature-based approaches to endpoint security. They include application whitelisting capabilities, browser exploit detection, improved endpoint protection, and an option to deploy Trend Micro security gateway software in the cloud. In addition, Trend Micro is tightening the integration between Trend Micro Complete User Protection software and its sandboxing software used for defending against advanced persistent threats (APTs).

One of the more unfortunate aspects of IT security is that it has become a complex maze of technologies that IT security vendors offer in a way that tends to maximize their profitability, often at the security expense of the customer. By extending both the capabilities of its endpoint protection suite while simultaneously making it easier to figure out what to deploy when and where, Trend Micro is making a significant step toward removing the insult from the IT security injury equation. Naturally, that won’t prevent all security breaches from occurring. But at least from a cost perspective, customers will start to feel a lot less like they are being nickeled and dimed to death over every little IT security threat.



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data