sb-as logo
Story image

IDC names Trend Micro number one vendor for SDC security

Trend Micro has been ranked the number one vendor in the 2018 market share for software-defined compute (SDC) workload protection, according to global analyst firm IDC.

The new independent report: Worldwide Software Defined Compute Workload Security Market Shares, 2018 revealed Trend Micro achieved a market share lead of 35.5%, almost triple its nearest competitor in 2018.

“We predicted a decade ago that organisations would need multi-layered security to protect their cloud environments and software-defined data centres,” says Trend Micro ANZ technical director Mick McCluney.

“Were glad to see our foresight and innovation being recognised by so many customers and to be ranked a #1 vendor for 2018 market share by IDC,” says McCluney.

The firm defines SDC in the report as, SDC technologies are often used in the context of public or private clouds, but can also be implemented in non-cloud environments particularly virtualised and/or containerised environments.

These products accomplish their goals by ensuring the system does not run malicious software that can compromise business applications and data on the servers.

IDC program vice president, security and trust Frank Dickson says, “For years, Trend Micro has steadily built out its SDC workload protection capabilities for virtual, public cloud and container environments, offering tight integration with AWS, Azure and Google Cloud Platform. Although, the future has not been written, Trend Micro is the dominant player in this market.”

Over this time, real-time security has been embedded into running applications and Trend Micro has focused on automation and security-as-code to seamlessly build protection into DevOps pipelines, including pre-runtime scanning of container images.

This development continued with the August release of XDR, which correlates data across email, network, endpoint, server and cloud workloads to identify malicious activity which might otherwise go unnoticed. Trend Micro further built on these capabilities with the acquisition of security posture management leader Cloud Conformity in October.

This month, Trend Micro launched a cloud security services program, Trend Micro Cloud One, to address customers security challenges around data center, IaaS, containers, storage and serverless architectures.

Trend Micro provides cybersecurity solutions including layered security for data centres, cloud environments, networks and endpoints to consumers, businesses, and governments. The vendor’s products work together to share threat intelligence and provide a connected threat defence with centralised visibility and control. The company has more than 6,000 employees in 50 countries.

Story image
Beware of these six L7 DDoS attacks
As more services are migrating online, DDoS attacks are increasingly shifting away from the network layer, and into the application layer, writes Radware product marketing manager Eyal Arazi.More
Story image
Just 6,000 accounts responsible for over 100,000 email attacks - report
Barracuda has today released a report detailing how 6,170 malicious accounts that use Gmail, AOL, and other email services were responsible for more than 100,000 business email compromise (BEC) attacks on nearly 6,600 organisations. More
Story image
App install fraud up $945 million in APAC
Asia Pacific was exposed to US$945 million in app install fraud in the first half of 2020. This is according to the AppsFlyer annual fraud report The State of Mobile Ad Fraud 2020 Edition. More
Story image
Why greater network visibility is needed to reduce the threat posed by IoT in the enterprise
At home and abroad, organisations have joined the rush to embrace Internet of Things (IoT) technology, but a new survey shows they’re only just beginning to wake up to the enormous risk those devices pose, writes ExtraHop A/NZ Regional Sales Manager Glen Maloney.More
Link image
How to take control of the entire data lifecycle
Cloudera's Data Platform powers data-driven decision making by easily, quickly, and safely connecting and securing the data lifecycle.More
Download image
Hardware Security Modules - and why they need to be virtualised
Unbound's vHSM provides advanced key management functionality, as well as easy and secure remote administration support - meaning there is no need for users to compromise on security any longer.More