Trend Micro Australia

Displaying 1-8 of 8 results

  • White Papers // Feb 2013

    2012 brought threats to all platforms. We look back at the year that was

    2012 is truly the year we entered the post-PC era as cybercriminals moved to embrace Android, social media platforms, and even Macs with their attacks. Most notable for 2012 is that it took Android less than three years to reach the volume of malware threats that it took 14 years...

    Provided By Trend Micro Australia

  • White Papers // Feb 2013

    2012 Annual mobile Threat and Security Round- up: Repeating History

    By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth from the 1,000 mobile malware we saw at the end of 2011. Much of this growth was driven by adware and premium service abusers, which accounted for a sizable majority of the...

    Provided By Trend Micro Australia

  • White Papers // Feb 2013

    Take a look back at the notable developments in the mobile landscape in 2012.

    By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth from the 1,000 mobile malware we saw at the end of 2011. Much of this growth was driven by adware and premium service abusers, which accounted for a sizable majority of the...

    Provided By Trend Micro Australia

  • White Papers // Jan 2013

    Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond

    In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with...

    Provided By Trend Micro Australia

  • Videos // Oct 2012

    Gartner Research Video: Primary Market Trends that Impact Data Centre Security Today

    Today's data centres feel the increasing weight of virtualisation and cloud computing. But many of the available virtualisation security solutions are not designed for today's dynamic IT environment. These solutions offer a single function, are often only agent-based, and have no integration for public/hybrid cloud management. As a result, these...

    Provided By Trend Micro Australia

  • White Papers // Oct 2012

    CSO Research Report: The Challenges of Securing a Virtual IT Infrastructure

    CSO research reveals how other IT professionals are adapting their security strategies to maximise the ROI of their virtual and cloud environments. Find out what your peers are doing to get the most out of their security investment, including: •  Extending traditional security products to virtualized data centres ...

    Provided By Trend Micro Australia

  • White Papers // Jul 2012

    Forrester report: Kill Your Data To Protect It From Cybercriminals

    As cybercriminals have become more skilful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. In the future, encryption will become a strategic cornerstone for security...

    Provided By Trend Micro Australia

  • White Papers // Dec 2011

    IDC Analyst Whitepaper: Embracing Consumerisation with Confidence

    In this white paper, analyst IDC explores the key converging market dynamics driving the consumerisation of IT. We then examine some of the significant opportunities and challenges that this rapidly evolving trend represents and how to build a holistic mobile security and management framework that allows organisations to embrace the...

    Provided By Trend Micro Australia

  • Videos // Oct 2012

    Gartner Research Video: Primary Market Trends that Impact Data Centre Security Today

    Today's data centres feel the increasing weight of virtualisation and cloud computing. But many of the available virtualisation security solutions are not designed for today's dynamic IT environment. These solutions offer a single function, are often only agent-based, and have no integration for public/hybrid cloud management. As a result, these...

    Provided By Trend Micro Australia

  • White Papers // Oct 2012

    CSO Research Report: The Challenges of Securing a Virtual IT Infrastructure

    CSO research reveals how other IT professionals are adapting their security strategies to maximise the ROI of their virtual and cloud environments. Find out what your peers are doing to get the most out of their security investment, including: •  Extending traditional security products to virtualized data centres ...

    Provided By Trend Micro Australia

  • White Papers // Jan 2013

    Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond

    In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with...

    Provided By Trend Micro Australia

  • White Papers // Dec 2011

    IDC Analyst Whitepaper: Embracing Consumerisation with Confidence

    In this white paper, analyst IDC explores the key converging market dynamics driving the consumerisation of IT. We then examine some of the significant opportunities and challenges that this rapidly evolving trend represents and how to build a holistic mobile security and management framework that allows organisations to embrace the...

    Provided By Trend Micro Australia

  • White Papers // Jul 2012

    Forrester report: Kill Your Data To Protect It From Cybercriminals

    As cybercriminals have become more skilful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. In the future, encryption will become a strategic cornerstone for security...

    Provided By Trend Micro Australia

  • White Papers // Feb 2013

    2012 brought threats to all platforms. We look back at the year that was

    2012 is truly the year we entered the post-PC era as cybercriminals moved to embrace Android, social media platforms, and even Macs with their attacks. Most notable for 2012 is that it took Android less than three years to reach the volume of malware threats that it took 14 years...

    Provided By Trend Micro Australia

  • White Papers // Feb 2013

    2012 Annual mobile Threat and Security Round- up: Repeating History

    By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth from the 1,000 mobile malware we saw at the end of 2011. Much of this growth was driven by adware and premium service abusers, which accounted for a sizable majority of the...

    Provided By Trend Micro Australia

  • White Papers // Feb 2013

    Take a look back at the notable developments in the mobile landscape in 2012.

    By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth from the 1,000 mobile malware we saw at the end of 2011. Much of this growth was driven by adware and premium service abusers, which accounted for a sizable majority of the...

    Provided By Trend Micro Australia