sb-nz logo
Story image

Trend Micro ranks number one in Global Hybrid Cloud Security - IDC 

Trend Micro has been ranked first in 2019 market share for Hybrid Cloud Workload Security, according to IDC's Worldwide Hybrid Cloud Workload Security Market Shares, 2019 report.

The cloud security firm enjoyed a market share of 29.5% last year, three times that of the number two vendor.

"As IDC mentions in its report, our leadership position in this space is no accident. We spotted how important workload security was going to be more than a decade ago and have been building out our capabilities ever since," says Wendy Moore, vice president of product marketing for Trend Micro. 

"While other vendors shout loudly about their professed leadership, IDC's findings paint a different picture. Trend Micro continues to build on our market position with new products and capabilities designed to support our customers' growth ambitions in hybrid cloud and cloud infrastructure services," she explains.

IDC defines hybrid cloud workload protection as protecting the VMs and containers that run on top of SDC environments. Trend Micro made its first moves in this space back in 2009, by investing significantly in recently acquired host-based intrusion-prevention and firewall software for cloud and virtualised data centre environments.

The report goes on to mention that the keys to Trend Micro's position include significant cloud innovations, as well as the acquisition of Cloud Conformity to tackle customers' cloud misconfiguration challenges. Additionally, a partnership with Snyk helps to address vulnerabilities stemming from DevOps teams' reuse of open source code repositories.

Following the successful acquisition of Cloud Conformity, an AWS Technology Partner of the Year in 2019, Trend Micro has continued to build-out its non-AWS capabilities, with support for VMs on Google Cloud Platform (GCP), Kubernetes platform protection, and integration of container image scanning in the  Google Kubernetes Engine (GKE).

The company created a GCP Connector to automate the discovery and protection of GCP VM instances and was named 2019 Google Cloud Technology Partner of the Year for Security.

According to IDC, Trend Micro has not rested on its position, rather continues to invest.

To this end, Trend Micro launched Cloud One at the end of 2019. This unified SaaS platform holistically addresses customer cloud security challenges in several key areas: data centre servers and VMs; IaaS workloads; containers and container services; cloud security posture management; cloud file & object storage services; and serverless.

 The IDC market share ranking comes on the back of similar recognition for Trend Micro in the Forrester Wave: Cloud Workload Security, Q4 2019 report.

Story image
Training is essential to build cybersecurity awareness
More than ever, businesses need to ensure that all their workers have the right skills and training to protect the business from cybercrime.  More
Story image
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing. More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
Rackspace and Cloudflare join forces for managed edge security
Rackspace and Cloudflare join forces for managed edge security The solution includes a web application firewall, DDoS protection, DNS services and a global content delivery network, backed by 24/7 support.More
Story image
Device authentication services to reach $8.4 billion by 2026 in response to IoT cybersecurity
"There are several key technologies revolving around authentication security that currently transform the IoT device value chain."More
Story image
IBM report: Security response improving - containing attacks, not so much
“While more organisations are taking incident response planning seriously, preparing for cyber-attacks isn’t a one and done activity."More