DALLAS, Oct. 19, 2023 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its recognition by Forrester as a Leader in endpoint security. The independent market analysis ...
DALLAS, July 17, 2025 /PRNewswire/ -- Global cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) has announced that it has been recognized an unprecedented 20 consecutive times as a ...
Trend Micro has patched a critical-severity vulnerability in Apex Central (on-premise) which allowed threat actors to run ...
DALLAS, Jan. 7, 2025 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel® (NASDAQ: INTC) designed to help ...
DALLAS, Sept. 23, 2024 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced it has been positioned by Gartner® in the Leaders' Quadrant of ...
Specifically, Trend Micro executives say that OfficeScan and the new Endpoint Security Platform, powered by Trend Micro's Threat Protection Network, are designed to address increasingly sophisticated ...
DALLAS, Jan. 7, 2025 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel® (NASDAQ: INTC) designed to help ...
Extends Agentic AI Safety from infrastructure to application with agentless EDR and integrated guardrails to secure next-generation AI factories To learn more about the combination of Trend Vision ...
Trend Micro patched a critical Apex Central on-prem Windows flaw (CVE-2025-69258) with CVSS 9.8 that allows remote code ...
Trend Micro announced that it is acquiring Mobile Armor, an endpoint encryption company. Enterprise security teams can use this transition as an opportunity to prioritize strategic requirements for ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
Identity and endpoint security are converging in 2026, and its reshaping the cybersecurity sector; this article provides an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results