Trend Micro Whitepapers


Sort by: Date | Company | Title


New Study Reveals Benefits from a Single Vendor, Multi-layered Solution
By Trend Micro | 29/5/2014
In a new custom study commissioned by Trend Micro, Forrester Consulting surveyed over 1100 IT security decision makers from North American, European, and Asia Pacific companies with 100-5,000 employees. The study identifies the benefits these IT professionals found from having a single-vendor, multi-layered solution. The benefits are: - Reduced operational friction - Reduced cost - Better protection Complete User Protection Trend Micro Complete User Protection is a multi-layer solution that provides your customers with the broadest range of interconnected threat and data protection across endpoints, email and collaboration, web, and mobile devices.
Download this now


Delivering a Secure Cloud
By Trend Micro | 14/10/2013
In this video, we hear from Sanjay Mehta, Managing Director of Trend Micro, on solutions that allow customers to secure their applications and data, whilst enjoying the benefits of Amazon Web Services Cloud Solutions.
Download this now


Global Cloud Security Software Market
By Trend Micro | 14/10/2013
Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.
Download this now


Helping Companies Fight Against Targeted Attacks
By Trend Micro | 23/9/2013
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Download this now


How Threat Actors Steal Your Data
By Trend Micro | 23/9/2013
Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem.
Download this now


Targeted Attack Campaigns
By Trend Micro | 23/9/2013
Advanced Persistent Threats (APTs) refer to a category of threats that aggressively pursue and chosen targets that over time attempt to get deeper into their network. For Enterprises, this is a high priority threat as human and systemic weaknesses can be mitigated with correct practices and solutions. In this report we look at targeted attack campaigns and how these can be mitigated.
Download this now


Local Government Finds Economies of Scale for Virtualised Environment and Secures Multiple Access Points
By Trend Micro | 1/8/2013
The City of Rockingham is the second largest city in Western Australia with more than 100,000 residents. They needed a cost effective solution to identify and take swift aversive action against cyber threats that enter their network or those that come-in via their growing number of Public Access Points – used by a myriad of wireless access devices. Download to find out how they met this business challenge.
Download this now


The 10-Step Security Action Plan
By Trend Micro | 1/8/2013
In this whitepaper, we look at ten essential steps in creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability to ward off a persistent attacker. For more, click to download
Download this now


Advanced Persistent Threats and Real-Time Threat Management
By Trend Micro | 13/3/2013
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Click to download!
Download this now


New Demands for Real-time Threat Management
By Trend Micro | 13/3/2013
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices. The first involves real-time risk management for day-to-day security adjustments and the second is real-time threat management to detect and address sophisticated, stealthy, and damaging security breaches. Download to find out how to tackle both!
Download this now