sb-as logo
Story image

Trend Micro leads market share for hybrid cloud security - IDC

09 Dec 2019

Cybersecurity solutions provider Trend Micro has announced it has been named by IDC as the number one vendor in Software-Defined Compute (SDC) workload protection, according to the analyst firm's new independent report: Worldwide Software-Defined Compute Workload Security Market Shares.

The report found that Trend Micro achieved a market share lead of 35.5%, almost triple its nearest competitor in 2018.

"We predicted a decade ago that organisations would need multi-layered security to protect their cloud environments and software-defined data centres," says Trend Micro network defence and hybrid cloud security executive vice president Steve Quane.

"We're glad to see our foresight and innovation being recognised by customers and to be ranked a #1 vendor for 2018 market share by IDC."

The firm defines SDC in the report as, "SDC technologies are often used in the context of public or private clouds, but can also be implemented in non-cloud environments--particularly virtualised and/or containerised environments.

These products accomplish their goals by ensuring the system does not run malicious software that can compromise business applications and data on the servers."

"For years, Trend Micro has steadily built out its SDC workload protection capabilities for virtual, public cloud and container environments, offering tight integration with AWS, Azure and Google Cloud Platform," says IDC Frank Dickson security and trust program vice president.

"Although the future has not been written, Trend Micro is the dominant player in this market."

Over this time, real-time security has been embedded into running applications and Trend Micro has focused on automation and security-as-code to seamlessly build protection into DevOps pipelines, including pre-runtime scanning of container images.

This continued with the August release of XDR, which correlates data across email, network, endpoint, server and cloud workloads to identify malicious activity which might otherwise go unnoticed.

Trend Micro further built on these capabilities with the acquisition of security posture management leader Cloud Conformity in October.

This month, Trend Micro launched a cloud security services program, Trend Micro Cloud One, to address customers' security challenges around data centre, IaaS, containers, storage and serverless architectures.

About Trend Micro

Trend Micro aims to help to make the world safe for exchanging digital information.

Our innovative solutions for consumers, businesses, and governments provide layered security for data centres, cloud environments, networks, and endpoints.

Its products aim to work together to seamlessly share threat intelligence and provide a connected threat defence with centralised visibility and control, enabling better, faster protection.

Story image
Oracle combines cloud automation with comms security in new solution
The Oracle Communications Security Shield (OCSS) Cloud is built on the company’s cloud infrastructure, and uses AI and real-time enforcement to combat the heightened risk of infrastructure attacks presented to contact centres and enterprises.More
Story image
Cybercrims' web skimming strategies taint web analytics platforms
“This is a technique we have not seen before, and one that is particularly effective."More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Story image
Trend Micro ranks number one in Global Hybrid Cloud Security - IDC 
The cloud security firm enjoyed a market share of 29.5% last year, three times that of the number two vendor.More
Story image
Inteview: Mimecast security expert on why email attacks are more successful than ever
Techday spoke to Mimecast Australia principal technical consultant Garrett O’Hara, who walks through why security experts are becoming increasingly pessimistic about email-borne attacks.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More