Entity

Time filter

Source Type

Shibuya, Japan

Trend Micro Inc. is a global security software company founded in California, USA. It is headquartered in Tokyo, Japan and markets Trend Micro Internet Security, Trend Micro Deep Security, Trend Micro Worry-Free Business Security, OfficeScan, and other related security products and services. Eva Chen has been CEO for the company since 2005 succeeding Steve Chang, who is now Chairman. In September 2014, Trend Micro announced a three-year agreement with INTERPOL to help support the international police organization and its 190 member countries with additional knowledge, resources and tactics to decrease cybercrime on a global scale.Trend Micro competes in the threat and breach detection industry against FireEye, Sourcefire and Palo Alto. TrendLabs Trend Micro creates cloud security solutions for customers of VMware, AWS, Microsoft Azure and Microsoft Office 365. In the antivirus industry Trend Micro competes against Avira, F-Secure, Kaspersky, McAfee, Panda Security, Sophos and Symantec among others.Trend Micro is also a certificate authority and member of the CA/Browser Forum. Wikipedia.


Patent
Trend Micro | Date: 2014-07-17

A method for detecting and locating occurrence in a data stream of any complex string belonging to a predefined complex dictionary is disclosed. A complex string may comprise an arbitrary number of interleaving coherent strings and ambiguous strings. The method comprises a first process for transforming the complex dictionary into a simple structure to enable continuously conducting computationally efficient search, and a second process for examining received data in real time using the simple structure. The method may be implemented as an article of manufacture having a processor-readable storage medium having instructions stored thereon for execution by a processor, causing the processor to match examined data to an object complex string belonging to the complex dictionary, where the matching process is based on equality to constituent coherent strings, and congruence to ambiguous strings, of the object complex string.


Patent
Trend Micro | Date: 2014-07-17

A method for detecting and locating occurrence in a data stream of any complex string belonging to a predefined complex dictionary is disclosed. A complex string may comprise an arbitrary number of interleaving coherent strings and ambiguous strings. The method comprises a first process for transforming the complex dictionary into a simple structure to enable continuously conducting computationally efficient search, and a second process for examining received data in real time using the simple structure. The method may be implemented as an article of manufacture having a processor-readable storage medium having instructions stored thereon for execution by a processor, causing the processor to match examined data to an object complex string belonging to the complex dictionary, where the matching process is based on equality to constituent coherent strings, and congruence to ambiguous strings, of the object complex string.


Patent
Trend Micro | Date: 2014-07-17

A method for detecting and locating occurrence in a data stream of any complex string belonging to a predefined complex dictionary is disclosed. A complex string may comprise an arbitrary number of interleaving coherent strings and ambiguous strings. The method comprises a first process for transforming the complex dictionary into a simple structure to enable continuously conducting computationally efficient search, and a second process for examining received data in real time using the simple structure. The method may be implemented as an article of manufacture having a processor-readable storage medium having instructions stored thereon for execution by a processor, causing the processor to match examined data to an object complex string belonging to the complex dictionary, where the matching process is based on equality to constituent coherent strings, and congruence to ambiguous strings, of the object complex string.


Value based licensing/billing methods and system for security software is provided, which use an effective vulnerability protection measure provided by a new or updated IPS filter deployed on host computer to determine the licensing/billing fee of the new or updated IPS filter over a billing period. The effective vulnerability protection measure is determined based on vulnerability and host attributes, and, in the embodiment of the invention, is based on a vulnerability time gap or time protected of the host computer.


A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating systems kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.

Discover hidden collaborations