Forrester cites Trend Micro as a leader in enterprise email security

0

Trend Micro has announced that it has been named a leader in enterprise email security in ‘The Forrester Wave: Enterprise Email Security, Q2 2019’ report. Trend Micro received the highest score among all 12 appraised vendors in the strategy category. Forrester describes Trend Micro with comments including, “Clients cite effectiveness, ease of deployment, and configurability as strengths.” Forrester additionally said, “Enterprises seeking a solution for defending against malicious and malware-laden emails should consider Trend Micro.”

“The number one threat vector continues to be email, which drives our commitment to continued innovation. Analyst evaluations are critical for solution assessment. In my view, this recent report takes into account our newer artificial intelligence (AI) features such as writing style analysis and computer vision, alongside solutions to protect cloud email platforms like Office 365 and Gmail that collectively helped us block over 41.5 billion threats in 2018,” said Wendy Moore, Vice President of Product Marketing for Trend Micro.

Nearly 86 per cent of all threats blocked by Trend Micro last year came via email. Phishing, business email compromise (BEC), malicious URLs, malevolent attachments and accidental and deliberate data loss are all common challenges.

A cross-generational blend of security techniques is the best agreed upon approach to achieve comprehensive protection against these and other threats. One of these techniques includes Writing Style DNA, an AI-powered tool which helps to spot BEC scammers by analysing email content. To date this has identified 5,400 attacks at 160 organisations, resulting in potential savings for customers of $858m. Another leading feature from Trend Micro blends computer vision image analysis technology with machine learning to “see” fake log-in pages, the result of this protects against phishing and account takeover.

Trend Micro’s email security benefits from intelligence sharing across all layers of the IT infrastructure to offer connected threat defense. It is available in multiple deployment options — appliance (physical and virtual), on-premises software, SaaS service, and as a hybrid solution.

LEAVE A REPLY

Please enter your comment!
Please enter your name here