STOCK TITAN

Trend Micro Expands to 5G Networks: Industry's Broadest Cybersecurity Platform

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary
Trend Micro Incorporated (TMICY) emphasizes the importance of unified visibility, detection, protection, and response in enterprise security due to emerging threats and attacks.
Positive
  • None.
Negative
  • None.

#1 criteria for enterprise security has become unified visibility, detection, protection, and response due to new threats and attacks

DALLAS, Feb. 27, 2024 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced it will be showcasing its unique, platform-based approach to protecting the ever-expanding enterprise attack surface, including protecting 5G deployments, at Mobile World Congress (MWC) Barcelona 2024.

"Trend offers a blend of deep domain expertise and commitment to powerful and centralized protection."

Join Trend and CTOne at MWC Barcelona in booth 4A50, Hall 4, February 26-29: https://ctone.com/2024/01/join-us-at-2024-mobile-world-congress-in-barcelona/

Kevin Simzer, COO at Trend: "Private 5G networks are already transforming industries as diverse as healthcare, retail, energy, and manufacturing. But such projects also add complexity and expand the digital attack surface, threatening to erode business value. As visitors to our MWC stand will experience live, Trend offers a blend of deep domain expertise and commitment to powerful, centralized protection with the world's broadest enterprise security platform, including 5G security."

Over the coming years, private 5G networks will power everything from corporate campuses and smart factories to shopping malls. But they also introduce new risk in the form of network function virtualization complexity, information technology and operational technology (IT/OT) convergence challenges, unprotected IoT devices, and new deployments of 5G communications technology (CT).

Such a broad attack surface demands holistic security across IT, OT, and CT environments to unify and simplify risk management for security teams and support their zero-trust strategies. This is the joint value of the Trend and CTOne – a Trend Micro subsidiary – platform approach, which delivers continuous detection, broad protection, and rapid response across the entire enterprise, including private 5G environments.

The platform leverages the deep next-generation wireless expertise of CTOne, which was launched last year with a mission to advance 5G network security. At MWC, CTOne will also be showcasing its newly announced CTOne SecureRAN solution, designed specifically to mitigate the cyber risks associated with Open Radio Access Network (O-RAN) architectures.

CTOne's solutions align perfectly with Trend's strategic vision for securing digital transformation and the enterprise attack surface, emphasizing the importance of securing private 5G networks to manage risk in modern business operations.

The Trend Vision One™ platform in combination with CTOne offers end-to-end protection and AI-driven XDR across endpoint, email, cloud,  RAN (Radio Access Network), MEC (Multi-Access Edge Computing), and 5GC (core) environments.

To see it in action, including a live cyber-attack on a simulated 5G-connected smart factory, visit Trend's booth at MWC.

About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world. www.TrendMicro.com.  

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/trend-micro-expands-to-5g-networks-industrys-broadest-cybersecurity-platform-302071813.html

SOURCE Trend Micro Incorporated

FAQ

Why has unified visibility become crucial in enterprise security according to Trend Micro Incorporated's PR?

Unified visibility is essential in enterprise security due to new threats and attacks that require comprehensive monitoring and detection across all systems and networks.

What are the key components highlighted by Trend Micro Incorporated for enterprise security?

Trend Micro Incorporated emphasizes the importance of detection, protection, and response alongside unified visibility in enterprise security.

What is the ticker symbol for Trend Micro Incorporated?

The ticker symbol for Trend Micro Incorporated is TMICY.

TREND MICRO INC S/ADR

OTC:TMICY

TMICY Rankings

TMICY Latest News

TMICY Stock Data

7.10B
128.17M
0.01%
Software Publishers
Information
Link
United States of America
Shibuya Ku

About TMICY

trend micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. for the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. in today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. with the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. organizations need a smart protection strategy. trend micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. trend micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. leveraging these solutions, organizations can prot