Trend Micro

Trend Micro Inc.
Public (K.K.)
Traded as TYO: 4704
Industry Security software
Founded October 24, 1989 (1989-10-24)
Los Angeles, California, U.S.
Founder 陳怡樺 (Eva Chen)
張明正 (Steve Chang)
Jenny Chang
Headquarters 〒 151-0053
1 No. 2 - chome, Shibuya-ku Yoyogi
Tokyo, Japan
Area served
Key people
Eva Chen (CEO)
Mahendra Negi (CFO)
Raimund Genes (CTO)
Wael Mohamed (COO)
Steve Chang (Chairman)
Products Trend Micro Internet Security (aka PC-cillin and VirusBuster), Deep Security, Deep Discovery, OfficeScan, Smart Surfing for Mac, Titanium Internet Security for Netbooks, Worry-Free Business Security, Hosted Email Security, Worry-Free Business Services, InterScan Web Security, InterScan Web Security as a Service, InterScan Messaging Security, Data Loss Prevention, Core Protection for Virtual Machines, Enterprise Security Suite, HouseCall, Web Protection Add-on, Smart Surfing for the iPhone, HijackThis
Revenue Increase ¥ 124,317 million (2015)[1]
Decrease ¥ 30,976 million (2015)
Decrease ¥ 21,435 million (2015)
Number of employees
Decrease 5,190

Trend Micro Inc. (トレンドマイクロ株式会社 Torendo Maikuro Kabushiki-Gaisha, Chinese: 趨勢科技) is a global security software company founded in Los Angeles, California with global headquarters in Tokyo, Japan, and regional headquarters in Asia, Europe and the Americas. The company develops security software for servers, cloud computing environments, consumers, and small, medium and enterprise businesses. Its cloud and virtualization security products provide cloud security for customers of VMware,[2] Amazon AWS,[3] Microsoft Azure[4] and vCloud Air. Eva Chen serves as Trend Micro’s chief executive officer, a position she has held since 2005 when she succeeded founding CEO Steve Chang. Chang serves as chairman of Trend Micro.[5]


The company was founded in 1989 in Los Angeles by Steve Chang (張明正, Chang Ming-cheng), his wife, Jenny Chang, and her sister, Eva Chen (陳怡樺).[6] The company was established with proceeds from Steve Chang’s previous sale of a copy protection dongle to a United States-based Rainbow Technologies.[7] Shortly after establishing the company, its founders moved headquarters to Taipei.[8]

In 1992, Trend Micro took over a Japanese software firm to form Trend Micro Devices and established headquarters in Japan. It then made an agreement with CPU maker Intel under which it produced an anti-virus product for local area networks (LANs) for sale under the Intel brand. Intel paid royalties to Trend Micro for sales of LANDesk Virus Protect in the United States and Europe, while Trend paid royalties to Intel for sales in Asia. In 1993, Novell began bundling the product with its network operating system.[8] In 1996 the two companies agreed to a two-year continuation of the agreement in which Trend was allowed to globally market the ServerProtect product under its own brand alongside Intel's LANDesk brand.

Trend Micro was listed on the Tokyo Stock Exchange in 1998 under the ticker 4704.[7] The company began trading on the United States-based NASDAQ stock exchange in July 1999.[9]

In 2004, founding chief executive officer Steve Chang decided to split the responsibilities of CEO and chairman of the company.[7] Company co-founder Eva Chen succeeded Steve Chang as chief executive officer of Trend Micro in January 2005.[5] Chen had most recently served as the company’s chief technology officer since 1996 and before that executive vice president since the company’s founding in October 1989.[5] Steve Chang retained his position as company chairman.[5] In May, Trend Micro acquired Braintree, Massachusetts-based antispyware company InterMute for $15 million.[10] Trend Micro had fully integrated InterMute’s SpySubtract antispyware program into its antispyware product offerings by the end of that year.[10][11] In June 2005 Trend Micro acquired Kelkea, a San Jose, California-based developer of antispam software.[12] Kelkea developed Mail Abuse Prevention System (MAPS) and IP filtering software that allowed internet service providers to block spam and phishing scams.[13] Kelkea chief executive officer Dave Rand was retained by Trend Micro as its chief technologist for content security.[12]

In March 2007, Trend Micro acquired freeware antispyware program HijackThis from its creator Merijn Bellekom for an undisclosed sum.[14][15] Trend Micro delisted its depository shares from the NASDAQ stock exchange in May.[16] Later that year, in October, Trend Micro acquired Mountain View, California-based data loss prevention software developer Provilla.[17] Provilla was the creator LeakProof, software that allowed companies to block the transmission of sensitive data and warn security managers about transmission attempts.[17]

Trend Micro acquired Identum in February 2008 for an undisclosed sum.[18] Identum, which was founded in and later spun-off from the University of Bristol cryptography department, developed ID-based email encryption software.[18] The two companies were originally in talks for Trend Micro to license Identum’s technology, but Trend Micro later decided to purchase the firm outright.[18] Identum was renamed Trend Micro (Bristol) and its encryption technology was integrated into existing Trend Micro products.[19] Existing Identum products were continued but sold under the Trend Micro brand.[19] Also that year, Trend Micro sued Barracuda Networks for the latter's distribution of ClamAV as part of a security package.[20] Trend Micro claimed that Barracuda's use of ClamAV infringed on a software patent owned by Trend Micro for filtering viruses on an Internet gateway.[20] On May 19, 2011, the U.S. Patent and Trademark Office issued a Final Rejection[21] in the reexamination of Trend Micro's U.S. patent 5,623,600.[22]

In April 2009, Trend Micro acquired Ottawa, Ontario Canada-based Third Brigade for an undisclosed sum.[23] Third Brigade developed host-based intrusion prevention and firewall software that had been used by Trend Micro in its Trend OfficeScan anti-malware suite for two years prior to acquiring Third Brigade.[23] Third Brigade was reincorporated as Trend Micro Canada Technologies.[24]

Trend Micro acquired Leeds, England-based humyo in June 2010 for an undisclosed sum.[25] humyo provided cloud-based data storage and synchronization services to small businesses and individuals.[25][26] Later that year, in November, Trend Micro acquired Mobile Armor. Mobile Armor was a developer of full disk, file and folder, and removable media encryption for mobile devices.[27] Trend Micro integrated the company’s technology into a centrally-managed platform for mobile device security.[27]

In June 2012, Trend Micro acquired Marlborough, Massachusetts-based Secure Sockets Layer (SSL) certificate provider AffirmTrust for an undisclosed sum.[28] Trend Micro followed up with another acquisition, Taiwanese advanced network security firm Broadweb, in October 2012.[29] Broadweb was a developer of deep packet inspection technology that had the ability to block malicious data packets in real-time.[29] The technology was integrated into Trend Micro’s Custom Defense Solution, a suite that was designed to provide network-wide visibility and protection against advanced attacks and threats.[30]

Trend Micro relocated its US headquarters to the Las Colinas area of Irving, Texas in September 2013.[28] The relocation allowed the company to consolidate operations previously housed in Cupertino, California and Arlington, Texas.[28][31]

In September 2014, Trend Micro began a three-year partnership with INTERPOL wherein Trend Micro shared with the international police organization information on cybercrime threats via the company’s Threat Intelligence Service. According to INTERPOL, the information helped the international police organization and its 190 member countries decrease cybercrime on a global scale. Trend Micro also provided a cybercrime investigation training program to INTERPOL.[32] Also in 2014, Trend Micro expanded its Cloud App Security to work with Microsoft Office 365.[33] By 2016, the Cloud App Security software was expanded to cover Box, Dropbox and Google Drive.[34]

In October 2015, Trend Micro reached an agreement to buy TippingPoint, a network and software security developer from HP Inc. for $300 million.[35][36][37] That same year, Trend Micro was certified as a VCE validation ready solution and Vblock ready through the VCE Technology Alliance Partner program.[38][39] Later, Trend Micro joined the VCE Select Program, which allowed Trend Micro's Deep Security to be bundled with VCE's converged and hyper-converged infrastructure systems.[40] Gartner named Trend Micro to the "Leaders" ranking of its Magic Quadrant rating for Endpoint Protection Platforms in both 2015 and 2016.[41][42][43] In 2016, Trend Micro discovered that a variant of a virus affecting Android phones was able to infect smart TVs.[44]


In June 2008, Trend Micro introduced Trend Micro Smart Protection Network, a cloud-client content security infrastructure that delivers global threat intelligence to protect customers from online threats, such as data stealing malware, phishing attacks, and other web, email, and mobile threats. In 2012, Trend Micro added big data analytics to its Smart Protection Network.[45] Big data analytics allow the network to use behavioral-based identification methods to identify new security threats.[45] The network also combines in-the-cloud technologies with other client-based antivirus technologies to reduce dependency on conventional pattern file downloads on the endpoint.[46] Threat information from Trend Micro’s Smart Protection Network is deployed in real time to the company’s security software portfolio.[47]

Trend Micro receives its threat intelligence from TrendLabs, the company’s research, development, and support center. TrendLabs has ten labs worldwide, and is headquartered in the Philippines and employs 1,200 security experts and engineers.[48] The company’s Singapore-based lab provides malware forensics and analysis.[49]

See also


  1. "2015 Financial Data" (PDF). Trend Micro. 2016-02-18.
  2. Eduard Kovacs (27 August 2013). "Trend Micro Teams Up with VMware Deep Security Integrated with VMware NSX". Softpedia. Retrieved 15 March 2015.
  3. Ellen Messmer (25 June 2014). "Gartner: Best practices for Amazon AWS security". Network World. Retrieved 15 March 2015.
  4. Eduard Kovacs (13 May 2014). "Trend Micro and Microsoft Expand Partnership to Provide Security to Azure Customers". Softpedia. Retrieved 15 March 2015.
  5. 1 2 3 4 "Trend Micro". South China Morning Post. 23 November 2004.
  6. Naomi Nishihara (11 August 2015). "In cybersecurity, workers must think on feet, culture czar says". The Dallas Morning News. Retrieved 12 May 2015.
  7. 1 2 3 M.L. Cohen (2009). "Trend Micro Inc.". In Jay P. Pederson. International Directory of Company Histories. 97. Detroit: St. James Press. pp. 429–432.
  8. 1 2 Eugenia Yun (July 2001). "Hard Sell for Software". Retrieved 15 March 2015.
  9. "New Stock Listings". The Wall Street Journal. 12 July 1999.
  10. 1 2 Hiawatha Bray (11 May 2005). "Japanese Firm to Buy Braintree's Intermute for $1.5M". The Boston Globe.
  11. Jack Kapica (31 October 2005). "Trend Micro steps up fight against hackers". The Globe and Mail.
  12. 1 2 "Trend Micro tackles spam with Kelkea buy; The antivirus company's purchase of Kelkea beefs up its spam credentials and sets it on the road to tackling phishing.". CNET. 14 June 2005.
  13. "News bits". Network World. 20 June 2005.
  14. Neil J. Rubenking (13 March 2007). "Free HijackThis Tool Acquired by Trend Micro". PC Magazine.
  15. Ellen Messmer (14 March 2007). "Trend Micro acquires HijackThis antispyware; HijackThis to remain as freeware for public use". Network World Fusion.
  16. "Trend Micro Notice Regarding Completion of Delisting of Its ADRs from NASDAQ" (Press release). PR Newswire Asia. 1 June 2007.
  17. 1 2 Ellen Messmer (25 October 2007). "Trned Micro buys data=leak specialist Provilla". Network World Fusion.
  18. 1 2 3 "Data spy-beater sold to us rival". Bristol Evening Post. 28 February 2008.
  19. 1 2 "Trend Micro Purchases Identum for Identity-Based Email Encryption". Wireless News (Press release). 1 March 2008.
  20. 1 2 Extremetech Staff (29 January 2008). "Update: Barracuda Takes on Trend Micro over ClamAV Patents". PC Magazine. Retrieved 15 March 2015.
  21. "Ex Parte Reexamination" (PDF). U.S. Patent and Trademark Office. 2011-05-19. Retrieved 2015-10-04.
  22. "Anatomy of a Dying Patent - The Reexamination of Trend Micro's '600 Patent". 2011-06-13. Retrieved 2015-10-04.
  23. 1 2 Ellen Messmer (29 April 2009). "UPDATE: Trend Micro acquiring Third Brigade as part of data-center security strategy". Network World. Retrieved 15 March 2015.
  24. Rafael Ruffolo (29 April 2009). "Trend Micro buys Third Brigade, gains Canadian presence". IT World Canada. Retrieved 15 March 2015.
  25. 1 2 Lance Whitney (14 June 2010). "Trend Micro to buy cloud storage provider Humyo". CNET. Retrieved 15 March 2015.
  26. Chris Mellor (14 June 2010). "Trend Micro lays down bread for humyo cloud service". The Register. Retrieved 15 March 2015.
  27. 1 2 Tony Bradley (29 November 2010). "Trend Micro Boosts Data Protection with Mobile Armor Purchase". PC World. Retrieved 15 March 2015.
  28. 1 2 3 Don Seiffert (27 June 2012). "AffirmTrust acquired by billion-dollar Japanese company". Boston Business Journal. Retrieved 15 March 2015.
  29. 1 2 Charlie Osbrone (10 October 2013). "Trend Micro acquires advanced persistent threat defender Broadweb". ZDNet. Retrieved 15 March 2015.
  30. Tina Costanza (10 November 2013). "Trend Micro to enhance networks' protection with Broadweb acquisition". Silicon Republic. Retrieved 15 March 2015.
  31. "Trend Micro Opens New Global Operations Headquarters". Security Week. 18 September 2013. Retrieved 15 March 2015.
  32. Leon Spencer (1 October 2014). "Trend Micro to share threat information with Interpol". ZDNet. Retrieved 15 March 2015.
  33. Darryl K. Taft (July 15, 2014). "Trend Micro Offers New Security for Microsoft Office 365". eWeek. Retrieved May 18, 2016.
  34. Frank Griffin (March 11, 2016). "Trend Micro Expands its Cloud App Security Solution". Cloud Security Resource. Retrieved May 18, 2016.
  35. Osborne, Charlie (October 21, 2015). "Trend Micro Acquires HP's TippingPoint security team in $300 Million Deal". ZD Net. Retrieved November 25, 2015.
  36. Josh Beckerman (October 21, 2015). "H-P to Sell HP TippingPoint to Trend Micro". The Wall Street Journal. Retrieved May 18, 2016.
  37. John Leyden (October 21, 2015). "Trend Micro stumps up $300m to buy HP TippingPoint". The Register. Retrieved May 18, 2016.
  38. "Trend Micro Deep Security Earns VCE Validation". Cio Review. July 1, 2015. Retrieved May 18, 2015.
  39. Chris Player (June 26, 2015). "Trend Micro Deep Security gets VCE certification". ARN. Retrieved May 18, 2016.
  40. Hafizah Osman (November 11, 2015). "Trend Micro and VCE expand strategic alliance". ARN. Retrieved May 18, 2016.
  41. Sarah Kuranda (July 10, 2015). "Here's Who Made Gartner's 2015 Magic Quadrant For Secure Web Gateways". CRN. Retrieved May 18, 2016.
  42. Dan Kobialka (January 9, 2015). "Gartner Unveils Magic Quadrant for Endpoint Protection Platforms". MSPmentor. Retrieved May 18, 2016.
  43. Sarah Kuranda (March 17, 2016). "Here's Who Made Gartner's 2016 Magic Quadrant For Endpoint Protection Platforms". CRN. Retrieved May 18, 2016.
  44. Liam Tung (June 14, 2016). "Ransomware Now Locks Your Smart TV - And Then Demands Apple iTunes Gifts". ZDNet. Retrieved June 15, 2016.
  45. 1 2 Fahmida Y. Rashid (7 August 2012). "Trend Micro Adds Big Data Capabilities to its "Smart Protection Network" for Enhanced Cloud, Mobile and Targeted Attack Protection". SecurityWeek. Retrieved 15 March 2015.
  46. Stefanie Hoffman (18 June 2008). "Trend Micro Releases New 'Smart Protection Network'". CRN. Archived from the original on 24 September 2010. Retrieved 15 March 2015.
  47. Ellen Messmer (6 August 2012). "Trend Micro package protects against unpatched exploits". Network World. Retrieved 15 March 2015.
  48. "PH is hub of technology giant". Manila Standard Today. 3 February 2013. Retrieved 15 March 2015.
  49. Ellyne Phneah (21 August 2013). "Trned Micro establishes forensics research lab in S'pore". ZDNet. Retrieved 15 March 2015.

External links

This article is issued from Wikipedia - version of the 11/3/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.