Trend Micro

Displaying 1-40 of 148 results

  • Research // Mar 2012

    IT Priorities Special Report: Security Emerging Technologies, and the New IT Security Landscape

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By Trend Micro

  • Case Studies // Feb 2011

    Securing the Technology That Advances K12 Education

    Walled Lake Consolidated School District has faced its share of challenges that giving students the benefits of technology without exposing them to Internet threats, avoid learning disruptions that result from infections, with reduced budgets and staff, manage security solutions and maximize the value they deliver to the students and staff...

    Provided By Trend Micro

  • Case Studies // Dec 2010

    Service Provider Helps Small Businesses Address Compliance

    Total Care Computer Consulting brings in-depth industry experience to its clients, their challenges are to provide small businesses with broad protection from escalating threats, help clients meet evolving compliance requirements, introduce effective data loss prevention to safeguard vital data assets and cost-effectively deliver affordable managed services for the security solutions....

    Provided By Trend Micro

  • Case Studies // Dec 2010

    Keeping SMBs Secure While Simplifying Management

    Viritim Systemhaus serves a broad range of businesses and enterprises, with small and medium businesses making up a key market segment. Viritim Systemhaus challenges are to secure small and medium business customers' systems and email, provide good value, in terms of cost of ownership, work smarter, saving time, to keep...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    County Adopts Hybrid SaaS Email Security to Thwart Spammers

    Dane County challenges are to proactively secure the network against increasingly sophisticated spam attacks, minimize gateway appliance overhead, to maximize the benefits of virtualization and maximize the availability of mission-critical email with a resilient security solution. They chose Trend Micro to overcome these challenges. Dane County need to upgrade to...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    Trend Micro InterScan Messaging Security Virtual Appliance Adds In-the-Cloud Pre-Filter for Resource Efficiency and Proactive, Up-to-the-Minute Security

    The local Dane County government agencies serve more 450,000 citizens in more than 60 cities, towns, and villages. Dane County wanted to minimize gateway appliance overhead, to maximize the benefits of virtualization and also wanted to maximize the availability of mission-critical email with a resilient security solution. To master these...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Botnet Chronicles: A Journey to Infamy

    Botnets are considered one of the most prevalent and dangerous threats lurking on the Web today. The damage they cause can range from information theft and malware infection to fraud and other crimes. A botnet refers to a network of bots or zombie computers widely used for malicious criminal activities...

    Provided By Trend Micro

  • White Papers // Nov 2010

    The Dark Side of Trusting Web Searches: From Blackhat SEO to System Infection

    This paper will explain how cybercriminals leverage blackhat SEO to compromise systems. It will share the observations regarding various sites that have been compromised and on doorway pages that have been specially crafted for use in blackhat SEO attacks. It will also identify the techniques that cybercriminals use to mask...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Service Provider Switches Customers to Trend Micro Security

    Bauman Lyons are outsourcing their IT skills, their challenges are to stop threats that were getting through the previous security solutions, avoid disruptions to the business, and help users stay focused, simplify and centralize management of security and keep cost of ownership low for security. They chose Trend Micro to...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Academy Switches to Trend Micro to Protect Young Students

    At Alfred and Adele Davis Academy, a new network administrator pointed out several problems, their challenges are to protect students by filtering content, avoid system down time that would highly impact class time and enforce security policies that balance the need to be careful with the need to maximize learning....

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Software Company Adds Web Protection at the Gateway

    The IT professionals at Gladstone introduced a multi-tiered deployment of security solutions to protect PCs, servers, and email communications. Gladstone plc need to allow employees to surf the web without introducing vulnerabilities to the business, keep control of web security in IT; don't depend on users making smart choices, integrate...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Research and Testing Put Trend Micro in First Place

    Pen-Cal is recognized as a leader in the field of benefits consulting - an impressive accomplishment for a small business, their challenges are to protect extremely sensitive customer data, avoid disruptions to financial trading systems and connections with trading partners, keep security simple enough for a small IT team to...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Schools Switch to Trend Micro Endpoint Security Platform

    Bay County challenges are to clean up Conficker virus and prevent vulnerabilities that could lead to similar attacks in the future, increase visibility over the status of security at any point in time and minimize complexity to simplify functional deployments, enhancements, and day-to-day management of security and systems. They chose...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Defense and Security Electronics Company Selects Trend Micro Enterprise Security

    With operations spread across multiple countries, SELEX Sistemi Integrate found it increasingly challenging to secure its mission-critical resources. Their challenges are to simplify management of security, increase visibility of security within a large, global infrastructure and keep security up to date to avoid risks from the latest threats. They chose...

    Provided By Trend Micro

  • White Papers // Jul 2010

    Addressing Data Security Challenges in the Cloud

    Enterprises increasingly recognize cloud computing compelling economic and operational benefits. Vitalizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by cloud computing. Deploying...

    Provided By Trend Micro

  • Case Studies // Jun 2010

    Trend Micro Worry-Free Business Security Aces the Test

    The professionals at Real Time Consultants provide technology expertise and IT services to a diverse range of small and medium businesses. They wanted to block emerging threats including the latest spyware, web threats, and cybercrime attack and also they wanted protection from the latest emerging threats. And Simplify security for...

    Provided By Trend Micro

  • White Papers // Jun 2010

    Unmasking FAKEAV

    This white paper aims to educate companies' IT department staff on how rogue antivirus or FAKEAV applications arrive on systems. It aims to arm them with the right Trend Micro solutions that can help them combat these threats. FAKEAV threats have been rampant in the past few years and are...

    Provided By Trend Micro

  • Case Studies // May 2010

    Telecommunications Services Gain Improved Endpoint Security

    A specialized telecommunications service provider has offered technology solutions aimed at helping businesses in target industries. Their challenges are to eliminate infrastructure vulnerabilities and potential damage to corporate reputation, gain increased control over internal processes, consolidate systems and software to control costs and save time for IT administrators. They chose...

    Provided By Trend Micro

  • White Papers // May 2010

    Making Virtual Machines Cloud-Ready

    Cloud computing has been compared to the early proliferation of electricity. Homes, businesses and towns did not want to produce or rely on their own source of power. They began connecting into a greater power grid, supported and controlled by power utilities. Along with this utility connection came time and...

    Provided By Trend Micro

  • White Papers // May 2010

    Trend Micro Deep Security: Similarities and Differences With Cisco CSA

    Your enterprise invested in Cisco Security Agent (CSA) because it understands the importance of a defense-in-depth strategy for protecting servers, desktop and laptop computers from threats that can bypass perimeter security. However, with the recent announcement of Cisco's End-of-Life plans for CSA, one needs to explore alternatives that will continue...

    Provided By Trend Micro

  • White Papers // Apr 2010

    ZeuS: A Persistent Criminal Enterprise

    After the Kneber botnet incident earlier this year, the ZeuS botnet was thrown into the limelight of notorious cybercriminal campaigns that the general public is currently talking about. ZeuS, however, has been in the wild for years and has gone through continual improvements, making it one of the most effective...

    Provided By Trend Micro

  • White Papers // Mar 2010

    SK-KEM Sakai Kasahara Key Exchange Mechanism

    SK-KEM is a third generation crypto system that solves the key exchange problem without adding complexity to the user. Implementations of SK-KEM will see users able to add encryption to their email with a single click, or even set an option in their email program to encrypt every message in...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Trend Micro Data Protection: Solutions for Privacy, Disclosure and Encryption

    Enterprises are faced with addressing several common compliance requirements across multiple geographies and industries. These include protecting confidential data in common usage scenarios, notifying relevant parties when this data is disclosed, and securing this information with data loss prevention and encryption technologies. Factors - such as finding accurate, usable, and...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Hosted Security Strengthens Managed Services Business

    Star IT gives its customers the benefits of low fixed rates and customizable services while also increasing the level of security for sensitive corporate data. Their challenges are to introducing affordable managed services to the smallest business customers, minimize the cost of support for profitable services and provide consistent security...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Expanded AV Product Testing to Include Blocking by Source Reputation

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Ochsner Health System Automates Threat Mitigation

    Ochsner Health System is a thriving organization with high levels of network traffic. Their challenge is to minimize the risks to security from third-party laptops and devices on the network, discourage risky employee behavior such as streaming or file sharing that can introduce threats and speed the time to discovery...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How Hosted Email Security - Inbound Filtering Adds Value to Your Existing Environment

    As spam continues to grow at these dramatic rates, many traditional, on-premise email security products are being supplemented with hosted email security. That's because most security products require sustained maintenance over time to stay effective. Too often, however, maintenance can be delayed as other critical business projects take priority. Businesses...

    Provided By Trend Micro

  • White Papers // Mar 2010

    The Business of Cybercrime: A Complex Business Model

    As online crime has grown more prevalent, consumer confidence has plummeted. Unlike the old days when hackers created viruses to be mischievous, modern-day malware authors create threats primarily to make a profit. As the ?Underground Economy has grown and flourished, cybercriminals have developed new methods for tricking victims into downloading...

    Provided By Trend Micro

  • White Papers // Mar 2010

    How It Works: Trend Micro Hosted Email Security

    As spam continues to grow at these dramatic rates, traditional on-premise email security products are failing to keep up. These products often suffer from inherent hardware capacity limits, rendering them unable to handle large spam volumes. Once the amount of spam exceeds the limit, these solutions rapidly become overloaded, significantly...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Multilayered Security in a Distributed Business-Critical Environment

    Noodles & Company limits the exposure of credit card information as much as possible, with restaurants holding the data for as little time as possible and transmitting the information directly to credit card. Their challenges are to increase protection on business-critical email communications, block threats that could compromise sensitive credit...

    Provided By Trend Micro

  • Webcasts // Feb 2010

    Data Classification and Working with Data Stakeholders

    Understanding business processes for the many departments within large organizations poses one of the largest challenges that information security professionals face when implementing a DLP solution. Most information security professionals know the primary business of their organization, but they may be unfamiliar with some of the details or lack specific...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Hosted Security Offers Powerful Protection Without Overhead

    Contiga Networks Systems has grown steadily by bringing the most responsive yet competitively priced technical services to the Orlando area. Their challenges are to provide maximized security for small business customers, minimize the impact on the customers' operations and keep up with the latest threats and remain highly cost effective...

    Provided By Trend Micro

  • White Papers // Feb 2010

    Email Privacy 101

    The most fundamental principle of encryption is the secure exchange of secret keys between sender and receiver. This has been a challenge since the earliest systems invented by Julius Caesar and even more recently developed systems have struggled to overcome it elegantly. The key exchange has cracked this challenge. It...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    School District Switches to Trend Micro Enterprise Security

    The administration and faculty in the Camden County School System strive to graduate students that are prepared to achieve lifelong goals and to contribute to society. Camden County Schools wanted to protect the learning environment for K-12 students by reducing spam and other threats to faculty and staff productivity. To...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    City Government Virtualizes Security at the Gateway

    The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization. Their challenges were to protect the municipal government's digital assets and maximize the productivity of city employees that deliver services to the community, conserve network bandwidth and minimize the...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    Wichita Switches to Trend Micro InterScan Messaging and Web Security Virtual Appliances for Simplicity and Efficiency

    The City of Wichita is the largest municipal organization in Kansas, distinguished by a long tradition of professional government and committed to providing efficient, high-quality services to its citizens. The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization....

    Provided By Trend Micro

  • White Papers // Jan 2010

    When Encryption Isn't Enough

    It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these data loss threats, many enterprises have successfully deployed or are in the process of deploying an...

    Provided By Trend Micro

  • White Papers // Jan 2010

    Trend Micro Data Loss Prevention: Leveraging Data Loss Prevention Technology to Secure Corporate Assets

    In today's virtual enterprise, it's rarely practical or cost-effective to search employees for iPods or other USB devices. A more comprehensive, effective system for preventing data leaks is required at every port, on every endpoint in the enterprise, and on any network whether corporate, public, or WAN. To protect sensitive...

    Provided By Trend Micro

  • Case Studies // Dec 2009

    Manufacturer Simplifies Security Across All Platforms

    Wesgar sets itself apart with a commitment to strategic partnerships, both with customers and with suppliers. Their challenges are to block spyware and the latest web threats, avoid complexity that would consume limited IT resources and protect the latest operating systems and virtualization platforms. They chose Trend Micro to overcome...

    Provided By Trend Micro

  • White Papers // Dec 2009

    Protecting the Microsoft Exchange 2007 and 2010 Environment

    Since its debut in 1996, Trend Micro Scan Mail for Microsoft Exchange has seen many changes in email threats and scanning technologies. Scan Mail scanning software has always provided customers with a high-performance, low-administration solution that effectively keeps critical organizational email free of unwanted and malicious content in the face...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Payment Card Industry (PCI) Data Security Standard: Meeting Stringent Requirements

    The prescriptive, multifaceted PCI Data Security Standard (PCI DSS) includes requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures. The PCI DSS is intended to help to proactively protect the payment transaction systems to prevent identity theft and fraud using customer account data. These...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Server Security for Healthcare

    Healthcare organizations are facing increasing scrutiny from regulators, practitioners, and patients to ensure the integrity, security, and confidentiality of healthcare information. Financially motivated attackers develop new threats daily with the intent to steal and sell valuable data - including identities and computing resources. Cybercriminals are able to bypass most perimeter...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Trend Micro: Cost-Effective Virtualization Security

    Virtualization can help the organization achieve significant datacenter operations savings - one can reduce hardware costs and energy demands and achieve greater flexibility in deploying mission-critical software applications. Organizations have leveraged consolidation to attain deployment of 10 or more Virtual Machines (VMs) for each physical server in their IT infrastructure...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Network Security Overwatch Layer: Smarter Protection for the Enterprise

    Even though most of the businesses make use of the best security options available, but none of them can be sure if that security is good enough. Despite continuous efforts IT professionals have not been successful in building a security system that is always effective, this is probably because of...

    Provided By Trend Micro

  • White Papers // Dec 2009

    Protecting the Microsoft Exchange 2007 and 2010 Environment

    Since its debut in 1996, Trend Micro Scan Mail for Microsoft Exchange has seen many changes in email threats and scanning technologies. Scan Mail scanning software has always provided customers with a high-performance, low-administration solution that effectively keeps critical organizational email free of unwanted and malicious content in the face...

    Provided By Trend Micro

  • White Papers // Oct 2008

    InterScan? Messaging Hosted Security Advanced

    Spam email messages are the most dreaded messages that come through one's e-mail. As each day goes by the amount of spam messages that enters a person's account doubles. With spamming comes the threat of security breach as most of the time, they carry malicious viruses that even the most...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Trend Micro Web Gateway Security

    As the web becomes more important to modern business, it also becomes more dangerous. A new malware threat is created every two seconds, and cybercriminals are better organized to deliver increasing numbers of sophisticated web-borne threats. URL filtering alone at the Internet gateway is insufficient to protect organizations from threats...

    Provided By Trend Micro

  • Case Studies // Jun 2010

    Trend Micro Worry-Free Business Security Aces the Test

    The professionals at Real Time Consultants provide technology expertise and IT services to a diverse range of small and medium businesses. They wanted to block emerging threats including the latest spyware, web threats, and cybercrime attack and also they wanted protection from the latest emerging threats. And Simplify security for...

    Provided By Trend Micro

  • Case Studies // Nov 2009

    Chemical Solution Provider Lowers Risks With URL Filtering

    Chemithon Enterprises, Inc. delivers chemical process development, engineering, and plant equipment solutions and services to more than 450 operating plants in the U.S., Africa, South America, Europe, and many Pacific-Rim countries. Chemithon's IT group found that its previous PC and server security solution was creating a number of problems for...

    Provided By Trend Micro

  • White Papers // Aug 2009

    A Cybercrime Hub

    This paper discussed some parts of a large ongoing cybercriminal operation that dates back to at least 2005. An Estonian company is actively administering a huge number of servers in numerous datacenters, which together form a network to commit cybercrime. It appears that the company from Tartu, Estonia controls everything...

    Provided By Trend Micro

  • White Papers // Aug 2009

    Security Guide to Social Networks

    Social networking sites are websites designed for human interaction. They enable users to meet others; keep in touch with them; and share experiences. They are all built on a similar foundation - the user builds a network of contacts bound by an element of trust. The user then creates content...

    Provided By Trend Micro

  • White Papers // Jun 2010

    Unmasking FAKEAV

    This white paper aims to educate companies' IT department staff on how rogue antivirus or FAKEAV applications arrive on systems. It aims to arm them with the right Trend Micro solutions that can help them combat these threats. FAKEAV threats have been rampant in the past few years and are...

    Provided By Trend Micro

  • White Papers // Sep 2009

    Improving Quality, Safety and Efficiency of Healthcare

    Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Healthcare delivery networks are now faced with the challenge of deploying HIE solutions in community and enterprise environments. These care delivery networks need to achieve interoperability across the landscape of diverse stakeholders...

    Provided By Trend Micro

  • White Papers // Feb 2010

    Email Privacy 101

    The most fundamental principle of encryption is the secure exchange of secret keys between sender and receiver. This has been a challenge since the earliest systems invented by Julius Caesar and even more recently developed systems have struggled to overcome it elegantly. The key exchange has cracked this challenge. It...

    Provided By Trend Micro

  • White Papers // Mar 2009

    How to Build a Business Case for Email Encryption

    Email is the most common method of communication in the modern world. However, email is inherently insecure and data is most vulnerable while it is in transit. Anyone who wants to read email can do so relatively easily using software utilities downloaded from the Internet. The longer one ignores this...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Trend Micro Data Protection: Solutions for Privacy, Disclosure and Encryption

    Enterprises are faced with addressing several common compliance requirements across multiple geographies and industries. These include protecting confidential data in common usage scenarios, notifying relevant parties when this data is disclosed, and securing this information with data loss prevention and encryption technologies. Factors - such as finding accurate, usable, and...

    Provided By Trend Micro

  • White Papers // Sep 2009

    The Case for a New Benchmark Testing Methodology

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • White Papers // Nov 2009

    Trend Micro Enterprise Security for the Healthcare Industry

    The healthcare industry is in a time of great transition, with a government mandate for EHR/EMR systems, increasing security regulations, and greater compliance scrutiny and punitive actions. While EHR systems will ultimately lead to more efficient and effective patient care, they also increase the criminal appeal of attack and an...

    Provided By Trend Micro

  • White Papers // Mar 2010

    Expanded AV Product Testing to Include Blocking by Source Reputation

    An expanded method for testing AV products is described and demonstrated. The proposed method expands AV product protection scoring from malware file detection rates to include credit for blocking access to the URLs that serve downloaded malware files. This expansion is required because AV vendors have responded to the vast...

    Provided By Trend Micro

  • White Papers // Jan 2010

    When Encryption Isn't Enough

    It seems as though every week there are several highly publicized and embarrassing disclosures and reports of breaches of private information such as customer records, employee records, and intellectual property. In response to these data loss threats, many enterprises have successfully deployed or are in the process of deploying an...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Multilayered Security in a Distributed Business-Critical Environment

    Noodles & Company limits the exposure of credit card information as much as possible, with restaurants holding the data for as little time as possible and transmitting the information directly to credit card. Their challenges are to increase protection on business-critical email communications, block threats that could compromise sensitive credit...

    Provided By Trend Micro

  • Case Studies // Aug 2010

    Defense and Security Electronics Company Selects Trend Micro Enterprise Security

    With operations spread across multiple countries, SELEX Sistemi Integrate found it increasingly challenging to secure its mission-critical resources. Their challenges are to simplify management of security, increase visibility of security within a large, global infrastructure and keep security up to date to avoid risks from the latest threats. They chose...

    Provided By Trend Micro

  • Case Studies // Apr 2009

    University of Windsor Reduces Malware 81% by Enabling Web Reputation Technology in Trend Micro OfficeScan

    The IT group at the University of Windsor recognizes the need for best-in-class security solutions to protect students, staff, and digital assets. A long-time customer of Trend Micro, the University currently deploys Trend Micro Enterprise Security: PC and File Server Protection: Trend Micro Office-Scan Client/Server Edition, Trend Micro Internet Security...

    Provided By Trend Micro

  • Case Studies // Oct 2010

    Academy Switches to Trend Micro to Protect Young Students

    At Alfred and Adele Davis Academy, a new network administrator pointed out several problems, their challenges are to protect students by filtering content, avoid system down time that would highly impact class time and enforce security policies that balance the need to be careful with the need to maximize learning....

    Provided By Trend Micro

  • Case Studies // Jan 2010

    City Government Virtualizes Security at the Gateway

    The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization. Their challenges were to protect the municipal government's digital assets and maximize the productivity of city employees that deliver services to the community, conserve network bandwidth and minimize the...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    Hosted Security Offers Powerful Protection Without Overhead

    Contiga Networks Systems has grown steadily by bringing the most responsive yet competitively priced technical services to the Orlando area. Their challenges are to provide maximized security for small business customers, minimize the impact on the customers' operations and keep up with the latest threats and remain highly cost effective...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Hosted Security Strengthens Managed Services Business

    Star IT gives its customers the benefits of low fixed rates and customizable services while also increasing the level of security for sensitive corporate data. Their challenges are to introducing affordable managed services to the smallest business customers, minimize the cost of support for profitable services and provide consistent security...

    Provided By Trend Micro

  • Case Studies // Sep 2009

    Guess Gains Visibility and Control Over Blended Threats

    The IT team at Guess?, Inc. was spending too much time on security. Their challenges is that blended threats (spyware, grayware, malware) were not being effectively detected and blocked by the previous security solutions, client software and signature files were growing in size, and becoming difficult to push out over...

    Provided By Trend Micro

  • Case Studies // Nov 2009

    Manufacturer Adds a Network Security Overwatch Service

    Containers is the largest manufacturer were they are lacking oversight and visibility into hidden infections within the network and time-consuming management of infections that require manual clean up efforts. They chose Trend Micro to overcome these challenges. Trend Micro Threat Management Services uncover and mitigate previously undetected threats. The results...

    Provided By Trend Micro

  • Case Studies // Nov 2010

    County Adopts Hybrid SaaS Email Security to Thwart Spammers

    Dane County challenges are to proactively secure the network against increasingly sophisticated spam attacks, minimize gateway appliance overhead, to maximize the benefits of virtualization and maximize the availability of mission-critical email with a resilient security solution. They chose Trend Micro to overcome these challenges. Dane County need to upgrade to...

    Provided By Trend Micro

  • Case Studies // Jul 2009

    UK Service Provider Relies on Trend Micro Hosted Security Solutions to Better Protect Small Businesses and Gain Ongoing Revenue Stream

    Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Their challenges are that server-based software is very high on resource consumption for the customer and also on administration overhead, hosted and managed solutions are very much part of their...

    Provided By Trend Micro

  • Case Studies // Mar 2010

    Ochsner Health System Automates Threat Mitigation

    Ochsner Health System is a thriving organization with high levels of network traffic. Their challenge is to minimize the risks to security from third-party laptops and devices on the network, discourage risky employee behavior such as streaming or file sharing that can introduce threats and speed the time to discovery...

    Provided By Trend Micro

  • Case Studies // Apr 2008

    Lakeridge Health Uses Trend Micro Messaging and Web Security for Comprehensive Gateway Web Threat Protection

    Lakeridge Health (LH) serves a community of more than 500,000 residents within an area of 19,000 square kilometers in Ontario. When web threats began to increase, LH's user help desk was flooded with complaints about spyware and other infections. To master these needs LH chose Trend Micro. LH deployed multiple...

    Provided By Trend Micro

  • Case Studies // Sep 2009

    Business Solution Provider Protects Applications and Sensitive Customer Data With Trend Micro Deep Security

    A public company with proven stability, Workstream is the premier provider of enterprise and mid-market talent management solutions and the only company to address the complete employee lifecycle. With increased virtualization, the company needed to extend security posture to ensure they would be protected from new types of attacks and...

    Provided By Trend Micro

  • Case Studies // Oct 2009

    Physician Organization Secures VMware Virtualized Environment With Trend Micro Deep Security

    Beth Israel Deaconess Physician Organization (BIDPO) provides medical management services in support of its 1,500 members throughout eastern Massachusetts. BIDPO needed to build something that was modular, so BIDPO could grow into it gradually. BIDPO wanted the flexibility to buy components and migrate applications as more physician practices came online....

    Provided By Trend Micro

  • Case Studies // Nov 2008

    Trend Micro LeakProof Enables a Manufacturer to Discover Data Security Issues and Strengthen Its Foundation for Compliance

    Associated Fuel Pump Systems Corporation (AFCO) manufactures high-quality electric fuel pumps for some of the largest automotive companies in the world. Recent attentions on security in general - and preventing data leaks in particular - have given rise to a comprehensive corporate initiative aimed at data security. To master this...

    Provided By Trend Micro

  • Case Studies // Feb 2010

    School District Switches to Trend Micro Enterprise Security

    The administration and faculty in the Camden County School System strive to graduate students that are prepared to achieve lifelong goals and to contribute to society. Camden County Schools wanted to protect the learning environment for K-12 students by reducing spam and other threats to faculty and staff productivity. To...

    Provided By Trend Micro

  • Case Studies // Jan 2010

    Wichita Switches to Trend Micro InterScan Messaging and Web Security Virtual Appliances for Simplicity and Efficiency

    The City of Wichita is the largest municipal organization in Kansas, distinguished by a long tradition of professional government and committed to providing efficient, high-quality services to its citizens. The IT team for the City of Wichita has always faced the budget challenges that come with being a government organization....

    Provided By Trend Micro

  • Case Studies // Nov 2010

    Trend Micro InterScan Messaging Security Virtual Appliance Adds In-the-Cloud Pre-Filter for Resource Efficiency and Proactive, Up-to-the-Minute Security

    The local Dane County government agencies serve more 450,000 citizens in more than 60 cities, towns, and villages. Dane County wanted to minimize gateway appliance overhead, to maximize the benefits of virtualization and also wanted to maximize the availability of mission-critical email with a resilient security solution. To master these...

    Provided By Trend Micro

  • Case Studies // Sep 2009

    Trend Micro Case Study: St. Lawrence College

    Established in 1967, St. Lawrence College serves students from three campuses in eastern Ontario, Canada. St. Lawrence College wanted to provide a more resilient and flexible infrastructure that can adapt to changing requirements while reducing power and cooling costs. To master these challenges Lawrence College implemented virtualization to consolidate servers...

    Provided By Trend Micro