Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Small Business

    Trend Micro Releases Security Software 2015

    By
    Nathan Eddy
    -
    September 19, 2014
    Share
    Facebook
    Twitter
    Linkedin
      trend micro and Web security

      Security software specialist Trend Micro released the latest version of its security offering for protection from cyber-threats for PC, Mac, Android and now iOS platforms.

      The Trend Micro Security 2015 solution, aimed at consumers, is designed to resolve security and privacy issues that continue to affect Internet users.

      The solution protects user privacy on Facebook, Google+, Twitter and LinkedIn by identifying privacy settings on social sites that may expose personal information and lead to identity theft, and also protects against viruses by identifying and blocking dangerous links on Websites and in social networks, emails and instant messages.

      Seucrity 2015 also manages and encrypts passwords with the included password manager to sign into Websites without having to remember multiple passwords, creating difficult-to-hack passwords and encrypting them, but making those passwords available on all of your devices.

      In addition, the software guards against identity theft by detectecting spam emails containing phishing scams that can trick users into revealing private personal information.

      “We have solutions customized for every price point and home or home office environment, including Trend Micro Premium Security, which offers multi-device protection for up to five devices,” Shannon McCarty-Caplan, Trend Micro’s consumer security advocate, told eWEEK. “For users with a small office utilizing more sophisticated technology or servers, we recommend our Worry-Free Business Security product line, as it’s better integrated with business applications such as Windows Small Business Server, Microsoft Exchange and QuickBooks.”

      To help fight password and identity theft, Trend Micro Security 2015 includes a password manager, which encrypts all online passwords, enabling customers to log into Websites without the fear of password theft.

      “There has never been a better time to communicate and share our lives with friends and family online, using a multitude of devices and social networks. But as the ways to communicate increase, so do the threats to our private data,” she said. “This is why Trend Micro Security 2015 provides protection against threats and privacy concerns, regardless of the user’s device or operating system.”

      A recent study commissioned by Trend Micro revealed that Internet users participate in a variety of potentially risky behaviors, browsing suspect Websites and allowing apps to access public information from their social media profiles.

      The survey also found 40 percent of mobile users do not use a password to protect their devices, 28 percent of respondents allow mobile apps to access their social media profiles, and 10 percent of mobile users believe they have downloaded a malicious app to their device.

      “Even though consumers know their data is at risk, they are not taking the steps needed to protect themselves against cyber-criminals and identity thieves. In the same study, we found Internet users participate in a variety of potentially risky behaviors, browsing suspect Websites and allowing apps to access public information from their social media profiles,” McCarty-Caplan said. “For example, 67 percent of the consumers let their browser save their password when they are on the Internet, a practice we don’t condone because a cyber-criminal could easily hack your browser and steal your passwords, which can lead to identity theft and worse.”

      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×