Trend Micro logo

Trend Micro positioned as Leader in 2018 Gartner Magic Quadrant

Brand

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, has been named a Leader in the Gartner Inc.’s 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. Trend Micro improved its position in the Leaders quadrant compared to the previous year.

In under two years since the acquisition of TippingPoint, Trend Micro has further advanced its Intrusion Prevention System (IPS) solution. From Trend Micro’s perspective, the placement in this Gartner report demonstrates the company’s commitment to protect critical infrastructures from known and unknown vulnerabilities.

“We are pleased to be named as Leaders by Gartner this year again, after being evaluated among multiple leading security vendors in the intrusion detection and prevention space. What differentiates this performance over the previous year is our improved placement in both completeness of vision and ability to execute,” said Mr. Nilesh Jain, Vice President – South East Asia and India, Trend Micro.

Trend Micro’s IPS offering gives organizations a proactive approach to network security by equipping them with comprehensive contextual awareness and in-depth network traffic analysis to prevent intrusions before they occur. By inspecting and blocking inbound, outbound and lateral network traffic in real time, it defends datacenters and distributed enterprise networks with automated remediation of vulnerable systems. The solution pulls from intelligence gathered from Trend Micro’s security research teams to stay ahead of ever-changing threats and offer the industry’s most advanced detection capabilities.

Trend Micro’s solution goes beyond next-generation intrusion prevention systems (NGIPS) to protect the enterprise network with a cross-generational blend of threat protection techniques fuelled by market-leading threat intelligence. These solutions are optimized, specifically designed for and integrated with leading customer platforms and applications, and connected through shared threat intelligence with centralized visibility and control across layers of security.

Leave a Reply

two × four =