Trend Micro

Displaying 1-40 of 143 results

  • White Papers // May 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Organizations must take an active role in protecting systems and applications as part of the AQS shared security model. This paper discusses what part of the shared responsibility equation customers are responsible for and recommended practices that help create a security cloud-computing environment.

    Provided By Trend Micro

  • White Papers // May 2014

    Trend Micro Deep Security + VMware vSphere with Operations Management

    VMware and Trend Micro have partnered to deliver the first security and operations management bundle designed for virtualized environments within midsize businesses.

    Provided By Trend Micro

  • White Papers // May 2014

    Why a New Business Model is Needed for SSL Certificates

    The de facto Internet communication security protocol in use today is Secure Sockets Layer (SSL), used most commonly for browser-to-Web server communications, but increasingly for connections between applications when transferring critical business content.

    Provided By Trend Micro

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Provided By Trend Micro

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Case Studies // Feb 2011

    Securing the Technology That Advances K12 Education

    Walled Lake Consolidated School District has faced its share of challenges that giving students the benefits of technology without exposing them to Internet threats, avoid learning disruptions that result from infections, with reduced budgets and staff, manage security solutions and maximize the value they deliver to the students and staff...

    Provided By Trend Micro

  • Case Studies // Dec 2010

    Service Provider Helps Small Businesses Address Compliance

    Total Care Computer Consulting brings in-depth industry experience to its clients, their challenges are to provide small businesses with broad protection from escalating threats, help clients meet evolving compliance requirements, introduce effective data loss prevention to safeguard vital data assets and cost-effectively deliver affordable managed services for the security solutions....

    Provided By Trend Micro

  • Case Studies // Dec 2010

    Keeping SMBs Secure While Simplifying Management

    Viritim Systemhaus serves a broad range of businesses and enterprises, with small and medium businesses making up a key market segment. Viritim Systemhaus challenges are to secure small and medium business customers' systems and email, provide good value, in terms of cost of ownership, work smarter, saving time, to keep...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    County Adopts Hybrid SaaS Email Security to Thwart Spammers

    Dane County challenges are to proactively secure the network against increasingly sophisticated spam attacks, minimize gateway appliance overhead, to maximize the benefits of virtualization and maximize the availability of mission-critical email with a resilient security solution. They chose Trend Micro to overcome these challenges. Dane County need to upgrade to...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    Trend Micro InterScan Messaging Security Virtual Appliance Adds In-the-Cloud Pre-Filter for Resource Efficiency and Proactive, Up-to-the-Minute Security

    The local Dane County government agencies serve more 450,000 citizens in more than 60 cities, towns, and villages. Dane County wanted to minimize gateway appliance overhead, to maximize the benefits of virtualization and also wanted to maximize the availability of mission-critical email with a resilient security solution. To master these...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Botnet Chronicles: A Journey to Infamy

    Botnets are considered one of the most prevalent and dangerous threats lurking on the Web today. The damage they cause can range from information theft and malware infection to fraud and other crimes. A botnet refers to a network of bots or zombie computers widely used for malicious criminal activities...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Dark Side of Trusting Web Searches: From Blackhat SEO to System Infection

    This paper will explain how cybercriminals leverage blackhat SEO to compromise systems. It will share the observations regarding various sites that have been compromised and on doorway pages that have been specially crafted for use in blackhat SEO attacks. It will also identify the techniques that cybercriminals use to mask...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Service Provider Switches Customers to Trend Micro Security

    Bauman Lyons are outsourcing their IT skills, their challenges are to stop threats that were getting through the previous security solutions, avoid disruptions to the business, and help users stay focused, simplify and centralize management of security and keep cost of ownership low for security. They chose Trend Micro to...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Academy Switches to Trend Micro to Protect Young Students

    At Alfred and Adele Davis Academy, a new network administrator pointed out several problems, their challenges are to protect students by filtering content, avoid system down time that would highly impact class time and enforce security policies that balance the need to be careful with the need to maximize learning....

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Software Company Adds Web Protection at the Gateway

    The IT professionals at Gladstone introduced a multi-tiered deployment of security solutions to protect PCs, servers, and email communications. Gladstone plc need to allow employees to surf the web without introducing vulnerabilities to the business, keep control of web security in IT; don't depend on users making smart choices, integrate...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Research and Testing Put Trend Micro in First Place

    Pen-Cal is recognized as a leader in the field of benefits consulting - an impressive accomplishment for a small business, their challenges are to protect extremely sensitive customer data, avoid disruptions to financial trading systems and connections with trading partners, keep security simple enough for a small IT team to...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Schools Switch to Trend Micro Endpoint Security Platform

    Bay County challenges are to clean up Conficker virus and prevent vulnerabilities that could lead to similar attacks in the future, increase visibility over the status of security at any point in time and minimize complexity to simplify functional deployments, enhancements, and day-to-day management of security and systems. They chose...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Defense and Security Electronics Company Selects Trend Micro Enterprise Security

    With operations spread across multiple countries, SELEX Sistemi Integrate found it increasingly challenging to secure its mission-critical resources. Their challenges are to simplify management of security, increase visibility of security within a large, global infrastructure and keep security up to date to avoid risks from the latest threats. They chose...

    Provided By Trend Micro

  • White Papers // Jul 2010

    Addressing Data Security Challenges in the Cloud

    Enterprises increasingly recognize cloud computing compelling economic and operational benefits. Vitalizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by cloud computing. Deploying...

    Provided By Trend Micro

  • Case Studies // Jun 2010

    Trend Micro Worry-Free Business Security Aces the Test

    The professionals at Real Time Consultants provide technology expertise and IT services to a diverse range of small and medium businesses. They wanted to block emerging threats including the latest spyware, web threats, and cybercrime attack and also they wanted protection from the latest emerging threats. And Simplify security for...

    Provided By Trend Micro

  • White Papers // Jun 2010

    Unmasking FAKEAV

    This white paper aims to educate companies' IT department staff on how rogue antivirus or FAKEAV applications arrive on systems. It aims to arm them with the right Trend Micro solutions that can help them combat these threats. FAKEAV threats have been rampant in the past few years and are...

    Provided By Trend Micro

  • Case Studies // May 2010

    Telecommunications Services Gain Improved Endpoint Security

    A specialized telecommunications service provider has offered technology solutions aimed at helping businesses in target industries. Their challenges are to eliminate infrastructure vulnerabilities and potential damage to corporate reputation, gain increased control over internal processes, consolidate systems and software to control costs and save time for IT administrators. They chose...

    Provided By Trend Micro

  • White Papers // May 2010

    Trend Micro Deep Security: Similarities and Differences With Cisco CSA

    Your enterprise invested in Cisco Security Agent (CSA) because it understands the importance of a defense-in-depth strategy for protecting servers, desktop and laptop computers from threats that can bypass perimeter security. However, with the recent announcement of Cisco's End-of-Life plans for CSA, one needs to explore alternatives that will continue...

    Provided By Trend Micro

  • White Papers // May 2010

    Making Virtual Machines Cloud-Ready

    Cloud computing has been compared to the early proliferation of electricity. Homes, businesses and towns did not want to produce or rely on their own source of power. They began connecting into a greater power grid, supported and controlled by power utilities. Along with this utility connection came time and...

    Provided By Trend Micro

  • White Papers // Apr 2010

    ZeuS: A Persistent Criminal Enterprise

    After the Kneber botnet incident earlier this year, the ZeuS botnet was thrown into the limelight of notorious cybercriminal campaigns that the general public is currently talking about. ZeuS, however, has been in the wild for years and has gone through continual improvements, making it one of the most effective...

    Provided By Trend Micro

  • White Papers // Mar 2010

    SK-KEM Sakai Kasahara Key Exchange Mechanism

    SK-KEM is a third generation crypto system that solves the key exchange problem without adding complexity to the user. Implementations of SK-KEM will see users able to add encryption to their email with a single click, or even set an option in their email program to encrypt every message in...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Hosted Security Strengthens Managed Services Business

    Star IT gives its customers the benefits of low fixed rates and customizable services while also increasing the level of security for sensitive corporate data. Their challenges are to introducing affordable managed services to the smallest business customers, minimize the cost of support for profitable services and provide consistent security...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Trend Micro Data Protection: Solutions for Privacy, Disclosure and Encryption

    Enterprises are faced with addressing several common compliance requirements across multiple geographies and industries. These include protecting confidential data in common usage scenarios, notifying relevant parties when this data is disclosed, and securing this information with data loss prevention and encryption technologies. Factors - such as finding accurate, usable, and...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Expanded AV Product Testing to Include Blocking by Source Reputation

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Ochsner Health System Automates Threat Mitigation

    Ochsner Health System is a thriving organization with high levels of network traffic. Their challenge is to minimize the risks to security from third-party laptops and devices on the network, discourage risky employee behavior such as streaming or file sharing that can introduce threats and speed the time to discovery...

    Provided By Trend Micro

  • White Papers // Mar 2010

    The Business of Cybercrime: A Complex Business Model

    As online crime has grown more prevalent, consumer confidence has plummeted. Unlike the old days when hackers created viruses to be mischievous, modern-day malware authors create threats primarily to make a profit. As the ?Underground Economy has grown and flourished, cybercriminals have developed new methods for tricking victims into downloading...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How It Works: Trend Micro Hosted Email Security

    As spam continues to grow at these dramatic rates, traditional on-premise email security products are failing to keep up. These products often suffer from inherent hardware capacity limits, rendering them unable to handle large spam volumes. Once the amount of spam exceeds the limit, these solutions rapidly become overloaded, significantly...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How Hosted Email Security - Inbound Filtering Adds Value to Your Existing Environment

    As spam continues to grow at these dramatic rates, many traditional, on-premise email security products are being supplemented with hosted email security. That's because most security products require sustained maintenance over time to stay effective. Too often, however, maintenance can be delayed as other critical business projects take priority. Businesses...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Multilayered Security in a Distributed Business-Critical Environment

    Noodles & Company limits the exposure of credit card information as much as possible, with restaurants holding the data for as little time as possible and transmitting the information directly to credit card. Their challenges are to increase protection on business-critical email communications, block threats that could compromise sensitive credit...

    Provided By Trend Micro

  • Webcasts // Feb 2010

    Data Classification and Working with Data Stakeholders

    Understanding business processes for the many departments within large organizations poses one of the largest challenges that information security professionals face when implementing a DLP solution. Most information security professionals know the primary business of their organization, but they may be unfamiliar with some of the details or lack specific...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Hosted Security Offers Powerful Protection Without Overhead

    Contiga Networks Systems has grown steadily by bringing the most responsive yet competitively priced technical services to the Orlando area. Their challenges are to provide maximized security for small business customers, minimize the impact on the customers' operations and keep up with the latest threats and remain highly cost effective...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    School District Switches to Trend Micro Enterprise Security

    The administration and faculty in the Camden County School System strive to graduate students that are prepared to achieve lifelong goals and to contribute to society. Camden County Schools wanted to protect the learning environment for K-12 students by reducing spam and other threats to faculty and staff productivity. To...

    Provided By Trend Micro

  • White Papers // Feb 2010

    Email Privacy 101

    The most fundamental principle of encryption is the secure exchange of secret keys between sender and receiver. This has been a challenge since the earliest systems invented by Julius Caesar and even more recently developed systems have struggled to overcome it elegantly. The key exchange has cracked this challenge. It...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    City Government Virtualizes Security at the Gateway

    The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization. Their challenges were to protect the municipal government's digital assets and maximize the productivity of city employees that deliver services to the community, conserve network bandwidth and minimize the...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    Wichita Switches to Trend Micro InterScan Messaging and Web Security Virtual Appliances for Simplicity and Efficiency

    The City of Wichita is the largest municipal organization in Kansas, distinguished by a long tradition of professional government and committed to providing efficient, high-quality services to its citizens. The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization....

    Provided By Trend Micro

  • Case Studies // May 2010

    Telecommunications Services Gain Improved Endpoint Security

    A specialized telecommunications service provider has offered technology solutions aimed at helping businesses in target industries. Their challenges are to eliminate infrastructure vulnerabilities and potential damage to corporate reputation, gain increased control over internal processes, consolidate systems and software to control costs and save time for IT administrators. They chose...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Multilayered Security in a Distributed Business-Critical Environment

    Noodles & Company limits the exposure of credit card information as much as possible, with restaurants holding the data for as little time as possible and transmitting the information directly to credit card. Their challenges are to increase protection on business-critical email communications, block threats that could compromise sensitive credit...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Defense and Security Electronics Company Selects Trend Micro Enterprise Security

    With operations spread across multiple countries, SELEX Sistemi Integrate found it increasingly challenging to secure its mission-critical resources. Their challenges are to simplify management of security, increase visibility of security within a large, global infrastructure and keep security up to date to avoid risks from the latest threats. They chose...

    Provided By Trend Micro

  • Case Studies // Apr 2009

    University of Windsor Reduces Malware 81% by Enabling Web Reputation Technology in Trend Micro OfficeScan

    The IT group at the University of Windsor recognizes the need for best-in-class security solutions to protect students, staff, and digital assets. A long-time customer of Trend Micro, the University currently deploys Trend Micro Enterprise Security: PC and File Server Protection: Trend Micro Office-Scan Client/Server Edition, Trend Micro Internet Security...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Academy Switches to Trend Micro to Protect Young Students

    At Alfred and Adele Davis Academy, a new network administrator pointed out several problems, their challenges are to protect students by filtering content, avoid system down time that would highly impact class time and enforce security policies that balance the need to be careful with the need to maximize learning....

    Provided By Trend Micro

  • Case Studies // Jan 2010

    City Government Virtualizes Security at the Gateway

    The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization. Their challenges were to protect the municipal government's digital assets and maximize the productivity of city employees that deliver services to the community, conserve network bandwidth and minimize the...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Hosted Security Offers Powerful Protection Without Overhead

    Contiga Networks Systems has grown steadily by bringing the most responsive yet competitively priced technical services to the Orlando area. Their challenges are to provide maximized security for small business customers, minimize the impact on the customers' operations and keep up with the latest threats and remain highly cost effective...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Hosted Security Strengthens Managed Services Business

    Star IT gives its customers the benefits of low fixed rates and customizable services while also increasing the level of security for sensitive corporate data. Their challenges are to introducing affordable managed services to the smallest business customers, minimize the cost of support for profitable services and provide consistent security...

    Provided By Trend Micro

  • Case Studies // Sep 2009

    Guess Gains Visibility and Control Over Blended Threats

    The IT team at Guess?, Inc. was spending too much time on security. Their challenges is that blended threats (spyware, grayware, malware) were not being effectively detected and blocked by the previous security solutions, client software and signature files were growing in size, and becoming difficult to push out over...

    Provided By Trend Micro

  • Case Studies // Nov 2009

    Manufacturer Adds a Network Security Overwatch Service

    Containers is the largest manufacturer were they are lacking oversight and visibility into hidden infections within the network and time-consuming management of infections that require manual clean up efforts. They chose Trend Micro to overcome these challenges. Trend Micro Threat Management Services uncover and mitigate previously undetected threats. The results...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    County Adopts Hybrid SaaS Email Security to Thwart Spammers

    Dane County challenges are to proactively secure the network against increasingly sophisticated spam attacks, minimize gateway appliance overhead, to maximize the benefits of virtualization and maximize the availability of mission-critical email with a resilient security solution. They chose Trend Micro to overcome these challenges. Dane County need to upgrade to...

    Provided By Trend Micro

  • Case Studies // Jul 2009

    UK Service Provider Relies on Trend Micro Hosted Security Solutions to Better Protect Small Businesses and Gain Ongoing Revenue Stream

    Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Their challenges are that server-based software is very high on resource consumption for the customer and also on administration overhead, hosted and managed solutions are very much part of their...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Ochsner Health System Automates Threat Mitigation

    Ochsner Health System is a thriving organization with high levels of network traffic. Their challenge is to minimize the risks to security from third-party laptops and devices on the network, discourage risky employee behavior such as streaming or file sharing that can introduce threats and speed the time to discovery...

    Provided By Trend Micro

  • White Papers // Sep 2008

    Threat Management Solution

    This paper provides users with the information necessary to create a plan for deploying the Threat Management Solution to their network environment. More specifically, this paper discusses network topology considerations, network traffic considerations, network growth considerations, and Threat Management Solution component placement. This paper also provides systematic instructions on how...

    Provided By Trend Micro

  • White Papers // Dec 2008

    Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

    Proprietary information and intellectual property assets are vital to the success of any organization. Although strides have been made to secure these assets from the outside world, the fact is, the greatest threat to data security comes from the inside - from the very users who have access to corporate...

    Provided By Trend Micro

  • White Papers // Jun 2009

    Infiltrating WALEDAC Botnet's Covert Operations: Effective Social Engineering, Encrypted HTTP2P Communications, and Fast-Fluxing Network

    The WALEDAC botnet has been involved in an almost continuous spate of spam runs since researchers discovered it in December 2008. Their creators routinely take advantage of various real-world events and occasions, using them as social engineering ploys to trick users into performing certain actions. This botnet has the ability...

    Provided By Trend Micro

  • White Papers // Oct 2008

    Intrusion Defense Firewall: Network-Level HIPS at the Endpoint

    Mobile computers that connect directly to the Internet outside of a company's firewall can introduce risk into the corporate network and thus require a higher level of security to protect against network intrusions. Host intrusion defense systems combine intrusion detection and prevention capabilities, and run on the host itself. This...

    Provided By Trend Micro

  • White Papers // Dec 2008

    Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

    Never before has the threat to corporate data assets been so great - and so costly. According to Attrition.org, an industry monitoring organization, in calendar year 2007, more than 162 million records such as credit cards and Social Security numbers were compromised through December 21 - both in the U.S....

    Provided By Trend Micro

  • White Papers // Feb 2009

    Email Encryption for InterScan Messaging Hosted Security

    With policy-based encryption, organizations avoid relying on individual users to secure important content. Conveniently, encryption is automatically applied when content filtering rules are triggered, helping to ensure that confidentiality and privacy requirements are met. Trend Micro provides a policy-based email encryption solution that seamlessly integrates with the content filtering capabilities...

    Provided By Trend Micro

  • Webcasts // May 2009

    Practical VM Security Techniques for Internal and External Virtualized Infrastructures

    Jumping onto the virtualization bandwagon makes great economic sense but can be risky if done without proper security measures. The presenter of this webcast discusses current trends in virtual infrastructure security while offering practical techniques for securely managing today's virtual infrastructures. The attendee will learn new approaches for virtualization security,...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Regulatory Compliance: Protecting Sensitive Information in an Increasingly Leaky World

    Information Technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Trend Micro Endpoint Security: High Performance for Everyday Usage Scenarios as Tested by NSS Labs

    An exponential growth in malware is driving the need to add more technology to endpoint security to protect users from complex threats. This has resulted in many endpoint security products having an increasing impact on user productivity. Endpoint security can affect the performance of several everyday operations, including opening and...

    Provided By Trend Micro

  • White Papers // Dec 2008

    When Encryption Isn't Enough: Trend Micro LeakProof Stops Data Leaks Where They Start

    Protecting proprietary information and intellectual property is vital to the success of any organization. Although strides have been made to secure these assets from the outside world, the fact is, the greatest threat to data security comes from the inside - from the very users who have access to corporate...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Email Encryption for InterScan Messaging Hosted Security: An Overview of the Email Encryption Add-On Service for Trend Micro's Hosted Email Security

    Trend Micro offers Email Encryption as an add-on service to InterScan Messaging Hosted Security. It integrates seamlessly with the content filtering capabilities of Trend Micro's hosted email security service that protects against spam, viruses and inappropriate content. Trend Micro Email Encryption leverages Identity-Based Encryption (IBE) to efficiently secure email addressed...

    Provided By Trend Micro

  • White Papers // Jan 2009

    Microsoft SharePoint Use Models and Security Risks

    Microsoft SharePoint 2007 is the latest version of server-based collaboration software from Microsoft, promising to connect people, processes, and information. It comprises two main components: 1) the core Windows SharePoint Services (WSS 3.0), which include the content repository, libraries, and services, making it accessible to a distributed user population and...

    Provided By Trend Micro

  • White Papers // Sep 2008

    Search Engines - How Trustworthy Are They?

    The World Wide Web has become the largest and most accessible source of information. As with every other information repository, its contents need to be indexed and well categorized, bringing henceforth the need for tools that allow fast and accurate searching in order to find the requested information. This process...

    Provided By Trend Micro

  • White Papers // Oct 2008

    Threat Management: Focus on Malicious URLs

    At the heart of many Web threats today is the seemingly innocuous URL in an email. Called a "Malicious URL" by cyber security experts, this link can lead to a range of unwanted eventualities. Enticed to click on these malicious links by persuasive social engineering, users are unknowingly succumbing to...

    Provided By Trend Micro

  • White Papers // Oct 2008

    Threat Management: Virtual Worlds

    As companies adopt telecommuting and workers become more mobile, work PCs are increasingly used for various non-work related activities. These activities expose employees to myriad online threats, and when the computer connects to company networks, the threats can increase corporate risk as well. The increasing popularity of virtual worlds and...

    Provided By Trend Micro

  • White Papers // Mar 2009

    Improving Quality, Safety and Efficiency of Healthcare: Security Best Practices for Health Information Exchange

    Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Healthcare delivery networks are now faced with the challenge of deploying HIE solutions in community and enterprise environments. These care delivery networks need to achieve interoperability across the landscape of diverse stakeholders...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Virtualizing Email Gateway Security: Flexible, Cost-Effective Protection at the Email Gateway

    Virtualization initiatives have gained momentum as businesses seek ways to reduce operations costs and complexity in the face of a weak economy and rising power costs. Green IT initiatives are being launched in many organizations to help reduce the impact of rising costs on the overall enterprise bottom line. At...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Trend Micro Web Gateway Security Web Security: Faster Protection, Greater Flexibility, Lower Total Cost

    As one continues to integrate the Internet into business processes - and as malware becomes more and more web-based - security has become the top priority for defending the web gateway. Relying on URL filtering products alone leaves exposed to today's sophisticated web threats, but deploying more point solutions increases...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Meeting the Challenges of Virtualization Security

    Virtualization enables the organization to attain significant gains in efficiency and cost-effectiveness, along with the additional benefits of a greener consolidated datacenter, increased scalability and improved time to resource fulfillment. Unfortunately, the advantages of virtualization are balanced by increased risk exposure as virtual systems in the datacenter face many of...

    Provided By Trend Micro

  • White Papers // May 2009

    Pushdo Cutwail: A Study of the Pushdo Cutwail Botnet

    The Pushdo botnet has been with around since January 20071. The botnet is also known as Pandex or Cutwail. While it does not grab as many headlines as its attention-seeking peers such as Storm or Conficker, according to recent reports it is the 2nd largest SPAM botnet on the planet2...

    Provided By Trend Micro

  • White Papers // Jun 2009

    Data-Stealing Malware on the Rise - Solutions to Keep Businesses and Consumers Safe

    The Data-stealing Malware Report is the inaugural report in a new series of quarterly focus reports published by Trend Micro to address the rapidly changing, ever evolving threat environment. The Focus Report Series is based on data from TrendLabs, Trend Micro's global network of research, service, and support centers committed...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Trend Micro Deep Security: Protecting the Dynamic Datacenter

    The purpose of IT security is to enable the business, not impede it, but the challenges and complexity one face for the IT security grow every day. Compliance requirements impose security standards for data and applications on servers. Physical servers are replaced with virtual machines to save money, be green,...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Meeting the Challenges of Virtualization Security: Server Defenses for Virtual Machines

    Virtualization enables the organization to attain significant gains in efficiency and cost-effectiveness, along with the additional benefits of a greener consolidated datacenter, increased scalability and improved time to resource fulfillment. Unfortunately, the advantages of virtualization are balanced by increased risk exposure as virtual systems in the datacenter face many of...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Cloud Computing Security: Making Virtual Machines Cloud Ready

    Cloud computing has been compared to the early proliferation of electricity. Homes, businesses and towns did not want to produce or rely on their own source of power. They began connecting into a greater power grid, supported and controlled by power utilities. Along with this utility connection came time and...

    Provided By Trend Micro

  • White Papers // Feb 2009

    Server and Application Protection: Behind the Lines

    Cyber attacks can bypass or penetrate even top-of-the-line perimeter security, and it's increasingly recognized as a security best practice to provide server and application protection to detect and prevent these attacks as an integral part of a defense-in-depth strategy. A comprehensive server and application protection system will include: firewall, IDS/IPS,...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Payment Card Industry (PCI) Data Security Standard: Meeting Stringent Requirements

    The prescriptive, multifaceted PCI Data Security Standard (PCI DSS) includes requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures. The PCI DSS is intended to help to proactively protect the payment transaction systems to prevent identity theft and fraud using customer account data. These...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Server Security for Healthcare

    Healthcare organizations are facing increasing scrutiny from regulators, practitioners, and patients to ensure the integrity, security, and confidentiality of healthcare information. Financially motivated attackers develop new threats daily with the intent to steal and sell valuable data - including identities and computing resources. Cybercriminals are able to bypass most perimeter...

    Provided By Trend Micro