Shibuya, Japan
Shibuya, Japan

Trend Micro Inc. is a global security software company founded in California, USA. It is headquartered in Tokyo, Japan and markets Trend Micro Internet Security, Trend Micro Deep Security, Trend Micro Worry-Free Business Security, OfficeScan, and other related security products and services. Eva Chen has been CEO for the company since 2005 succeeding Steve Chang, who is now Chairman. In September 2014, Trend Micro announced a three-year agreement with INTERPOL to help support the international police organization and its 190 member countries with additional knowledge, resources and tactics to decrease cybercrime on a global scale.Trend Micro competes in the threat and breach detection industry against FireEye, Sourcefire and Palo Alto. TrendLabs Trend Micro creates cloud security solutions for customers of VMware, AWS, Microsoft Azure and Microsoft Office 365. In the antivirus industry Trend Micro competes against Avira, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.Trend Micro is also a certificate authority and member of the CA/Browser Forum. Wikipedia.


Time filter

Source Type

Patent
Trend Micro | Date: 2016-11-18

Various apparatuses and methods are usable to identify an Advanced Persistent Threat (APT). Various network packets may be subjected to a suitable behavioral analysis to identify such APTs. Upon identifying an APT, a response is initiated which may include sending attack messages to various devices in the network.


Patent
Trend Micro | Date: 2016-10-13

According to an example, configurable network security may include receiving data flows directed to end node modules of a server, and selecting data flows from the received data flows based on an analysis of attributes of the received data flows. The selected data flows may be less than the received data flows. A number of IPS data plane modules of the server that are available for inspection of the selected data flows may be determined. The selected data flows may be distributed between the IPS data plane modules based on the determined number of the IPS data plane modules. The distributed data flows may be inspected using the IPS data plane modules to identify malicious and benign data flows, and to determine whether to drop the malicious data flows, direct the malicious data flows to a predetermined destination, or forward the benign data flows to the end node modules.


A load distribution for data units received by a particular packet inspection device that is part of a collection of packet inspection devices is determined, where the packet inspection devices in the collection are to examine content of corresponding received data units. For corresponding data units received by the particular packet inspection device, the determined load distribution favors keeping the corresponding data units at the particular packet inspection device. Based on metric information regarding utilization of at least the particular packet inspection device, the load distribution is dynamically modified.


Patent
Trend Micro | Date: 2015-08-06

Examples herein disclose packet size information collected over an encrypted tunnel. The examples identify an application communicated via the encrypted tunnel based on the packet size information.


Patent
Trend Micro | Date: 2016-09-02

Example embodiments disclosed herein relate to providing network security. A network security device parses an initial handshake or communication to establish an encrypted channel between two endpoints. The network security device validates a certificate chain between the two endpoints and determines a reputation for each of one or more signers of a respective one or more certificates of the certificate chain. The network security device determines a certificate reputation for the certificate chain.


Example embodiments disclosed herein relate to perform a security action, (e.g., filtering) based on reputation and a signature match. A reputation is determined of a devices associated with a network packet or network packet stream. It is determined whether a signature matches the network packet or an associated flow of the network packet. The security action is determined based on the reputation and the match.


Example embodiments disclosed herein relate to a network security system. The network security system intercepts inline DNS requests. It is determined whether a domain name associated with one of the inline DNS requests corresponds with one or more domain names. A security action is performed based on the determination.


Patent
Trend Micro | Date: 2016-10-03

A method and a system for efficient search of string patterns characterized by positional relationships in a character stream are disclosed. The method is based on grouping string patterns of a dictionary into at least two string sets and performing string search processes of a text of the character stream based on individual string sets with the outcome of a search process influencing a subsequent search process. A system implementing the method comprises a dictionary processor for generating string sets with corresponding text actions and search actions, a conditional search engine for locating string patterns belonging to at least one string set in a text according to a current search state, a text operator for producing an output text according to search results, and a search operator for determining a subsequent search state.


Patent
Trend Micro | Date: 2016-06-28

According to an example, security and access control may include receiving traffic that is related to an application tier of a plurality of application tiers, and that is to be routed to another application tier or within the application tier. The attributes of the traffic related to the application tier may be analyzed, and based on the analysis, an application related to the traffic and a type of the traffic may be determined. The type of the traffic may be compared to a policy related to the application to determine whether the traffic is valid traffic or invalid traffic. Based on a determination that the traffic is valid traffic, the valid traffic may be forwarded to an intended destination. Further, based on a determination that the traffic is invalid traffic, the invalid traffic may be forwarded to a predetermined destination or blocked.


Patent
Trend Micro | Date: 2016-06-29

According to an example, configurable workload optimization may include selecting a performance optimized application workload from available performance optimized application workloads. A predetermined combination of removable workload optimized modules may be selected to implement the selected performance optimized application workload. Different combinations of the removable workload optimized modules may be usable to implement different ones of the available performance optimized application workloads. The predetermined combination of the removable workload optimized modules may be managed to implement the selected performance optimized application workload. Data flows directed to the predetermined combination of the removable workload optimized modules may be received. The data flows may be analyzed based on attributes of the data flows, and redirected for processing by one of the removable workload optimized modules of the predetermined combination of the removable workload optimized modules based on the analysis.

Loading Trend Micro collaborators
Loading Trend Micro collaborators