Tag Archives: gartner

Why Stand-Alone IDPS Matters More Than Ever, and the 2018 Gartner Magic Quadrant

First, What is IDPS and Why Do We Care? 

Intrusion Prevention Systems (IPS) emerged as an improvement on Intrusion Detection Systems (IDS).  IDS are out-of-band collectors of network traffic that analyze the information and provide alerts.  Continue reading

Trend Micro Named a Leader in 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders’ quadrant illustrates our commitment to meeting the growing security and performance requirements of data centers and high-performance enterprise networks. Continue reading

Gartner Research: How to Prioritize and Remediate Active Vulnerabilities

Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!

 

Continue reading

Gartner puts Trend Micro highest among leaders in 2017 Magic Quadrant for Endpoint Protection Platforms

Hard work in 2016 definitely paid off for everyone on our endpoint security team here at Trend Micro. Recently Gartner, Inc. announced that Trend Micro had been positioned Highest and Furthest in the leader’s quadrant for its ability to Execute and Completeness of Vision in the 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Continue reading

Trend Micro Named a Leader in 2016 Gartner Endpoint Protection Platforms Magic Quadrant

TM download

Today’s threat landscape has never been more volatile or dangerous. Given what’s at stake, it can be difficult for IT buyers to know which provider to turn to keep critical corporate data secure, their users’ endpoints and servers up and running, and compliance officers happy. Continue reading