Skip to content

Our Technology

We continually advance our technologies to deliver on our mission to make the world safe for the exchange of digital information.
 

Our cloud-era security model addresses the risks and opportunities inherent in cloud computing and the mobility of people, their devices and their data, as well as confronting the dangerous increase in targeted attacks on business and government.
 

Building on the superior technology of our Smart Protection Network™ infrastructure, we’re integrating global threat intelligence and data protection along with unified security management to deliver adaptive security that protects your important data wherever it resides.
 

Global threat intelligence derived from our cloud-based detection and correlation technologies combined with local intelligence derived from sensors throughout a customer’s network, work to identify and protect against targeted attacks.
 

Integrated data protection enables contextual awareness throughout the organization to ensure the confidentiality and protection of valuable data.

 

Innovation Timeline

2012

Mobile App Reputation Technology

 

2011

SecureCloud

Breakthrough encryption key management and data protection for public and private clouds

2010

Virtualization security

Agentless Anti-Malware for virtualized desktops and data centers

2009

Data centre security

Deep Security for Physical, Virtual and Cloud Servers

2008

Smart Protection Network

  • A cloud/client content security infrastructure compliance
  • Encryption
  • Email Archiving
2007

Data Loss Prevention

  • LeakProof™
  • Web Threat Protection
  • Web Reputation
2006 Botnet Identification Service
2005 E-mail Reputation Services
2004

Trend Micro and Cisco

Integrated security in the network

2003

Integrated Gateway Content Security

InterScan Messaging Security Suite
2002

Two-Hour Virus Response SLA

Threat Lifecycle Management strategy
Enterprise Protection Strategy (EPS)
1999

Web Filtering

InterScan WebManager

1998

Web-Based Centralized Management

Control Manager

1997

Email Server Virus Protection

ScanMail™

1996

Internet Gateway Virus Protection

InterScan™

1995

LAN Server Virus Protection

ScanMail™

 


Threat Detection and Prevention

All of our solutions are powered by global threat intelligence from the Smart Protection Network cloud security infrastructure to rapidly and accurately collect and identify new threats.

  • One of the world’s largest, most reliable email, file and web reputation databases, including new Mobile App Reputation technology
  • Patent-pending global correlation engine and custom data mining tools allow us to identify all components of a threat
  • Global network of intelligent sensors correlate global threat intelligence with local threat data to identify and protect against targeted attacks
  • Smart feedback from more than 100+ million users continually updates threat response

 

Data Protection

Combining data loss prevention, device control, encryption and key management with contextual awareness secures data across physical, virtual and cloud environments

  • Data protection integrated into endpoint, server, network, messaging, gateway, and SaaS security solutions
  • Patent-pending policy-based key management safely delivers encryption keys to valid devices
  • Identity-Based Encryption (IBE) available at gateway, desktop and hosted
  • Full disk encryption, USB encryption, file/folder encryption, removable media encryption available for endpoints
  • Certifications include: CAVP, FIPS 140-2 (Level 2 &3); NIST, NIAP, EAL4+, NSA approval, DARTT validation

Learn more about the data protection capabilities in our enterprise, small business and home/home office products.

 

Infrastructure Support

Securing data as it moves between platforms or cloud vendors, regardless of access device, enables customers to take full advantage of improvements in IT infrastructures.

  • Industry’s first and only agentless anti-malware is optimized for virtual environments
  • Agentless integrity monitoring improves security without increasing footprint
  • Data protection secures information in public, private, and hybrid clouds, and virtual environments
  • Mobile device security and management addresses consumerization of IT

Learn more about how these technologies help meet the challenges of cloud security and consumerization.

 


Social Media

Connect with us on