sb-eu logo
Story image

Gartner names Trend Micro leader in endpoint protection platforms

03 Sep 2019

Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution.

Trend Micro has been named a Leader in every Gartner Magic Quadrant for this category since 2002.

“We are delighted to once again be named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms,” says Trend Micro product marketing vice president Wendy Moore.

“Our Apex One solution redefined endpoint security by combining automated detection and response with a comprehensive range of threat defence capabilities, all available from a single agent.

From our perspective, this recognition is a testament to our commitment to innovation and performance in an ever-changing market.”

Apex One is powered by threat intelligence and leverages Trend Micro’s cross-generational layered approach to security, known as XGen, to apply the right threat defence technique at the right time.

Trend Micro’s comprehensive support for both current and legacy/out-of-support operating systems and global presence combined with localised support to help meet regional regulatory and technical needs are also strong offerings.

The endpoint is increasingly the frontline in the war against cyber-threats and IT teams are overwhelmed by the volume of alerts they must manage.

Following the launch of Apex One, Trend Micro has launched its XDR solution, becoming the first to offer detection and response capabilities integrated across email, network, endpoint, server and cloud workloads.

Earlier this year, Trend Micro launched Deep Security as a Service on the Microsoft Azure Marketplace, enabling organisations to combine the benefits of security software-as-a-service (SaaS) with the convenience of consolidated cloud billing and usage-based, metered pricing.

The Deep Security as a Service solution provided Microsoft Azure customers with a fully hosted security management experience with rapid delivery of innovations.

Gartner disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact.

Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
ExtraHop listed as Representative Vendor in Gartner guide
Gartner’s Market Guide for Network Detection and Response (NDR) has named ExtraHop as a Representative Vendor this year.More
Story image
Attivo Networks highlights CISOs top concerns following move to remote working
“Much of this year's research indicates a continued demand for in-network detection that works reliably across existing and emerging attack surfaces and is effective against all attack vectors."More
Story image
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing. More
Story image
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. More
Story image
CIOs put too much trust in TLS certificates - survey
Despite the prolific usage of TLS certificates within organisations, many CIOs aren't concerned about security risks associated with TLS machine identities.More