Axoft

F-Secure won awards from the AV-TEST Institute for the best protection.

F-Secure won awards from the AV-TEST Institute for the best protection

F-Secure Protection Service for Business (PSB) and F-Secure SAFE have been thoroughly tested by AV-TEST to receive awards.

“F-Secure SAFE and PSB Computer Protection products provided the highest level of security services during 2018, which AV-TEST recognized as its Best Protection 2018 award,” says AV-TEST technical director Mike Morgenstern.

AV-TEST tests solutions for Windows platforms on a monthly basis and awards the award for best protection for solutions that work best throughout the year. AV-TEST experts evaluate security products that protect against real threats, rather than theoretically evaluated in simulated testing conditions.

Tests are based on the use of many types of attacks, these are attacks using infected emails, downloads from websites, zero-day malware and others. Companies need to be sure that all their devices are protected from all threats, such as extortionists and data breaches. Consumers get a complete peace of mind with protection from viruses, Trojans, extortionists, knowing that their Internet banking is protected and that their whole family can safely use the Internet.

Mika Stolberg, CTO of F-Secure, proudly notes that “the strict testing process of AV-TEST shows how we try when it comes to protecting people and businesses. It’s great to be recognized for all our hard work, and we’re the best again.”

F-Secure has laboratories with a world-class research team and an active threat research team that uses attack techniques to identify and anticipate emerging threats. F-Secure uses a combination of both human experience and artificial intelligence to protect its clients: consultants on four continents respond to incidents, examine and eliminate data leaks.

“I think these victories show our continued commitment to protecting people and organizations who trust us,” Stolberg comments. “We would not have received this recognition from AV-TEST seven times without our constant investments in the best personnel and the creation of the best protection technologies that meet consistently high standards. Day after day, year after year”, he concluded.

About AV-TEST

AV-TEST is an independent provider of IT security and antivirus research services, focusing on detecting and analyzing the latest malware and using it in comprehensive comparative testing of security products.

About F-Secure

F-Secure is a manufacturer of software solutions for protecting against viruses, spyware, trojans, worms, spam and unauthorized intrusions. The company also produces security solutions for workstations, servers, gateways, smartphones and other mobile devices.

For questions about the acquisition of F-Secure solutions, you can contact the sales and development department of AXOFT Ukraine by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

MDaemon Announces SecurityGateway for Email Servers

MDaemon Announces SecurityGateway for Email Servers

MDaemon Technologies has announced the release of SecurityGateway for Email Servers Version 6.0, which includes a new cloud-based enterprise-class security gateway service and fully managed dedicated end-user servers, MSP, VAR, system integrators and IT consultants. Flexible uses of both local software and new cloud-based email security services include an extended and customizable Data Loss Prevention (DLP) rule set to isolate outgoing messages and protect the company from sending confidential or confidential information by email. And adding integrated e-mail archiving at no extra cost provides customers with affordable, flexible, and easy-to-use features to protect mail servers located anywhere in the world, the company said.

“We are pleased to share many years of experience in the field of email security and management, in order to offer our clients and partners a new cloud service, without requiring them to make expensive investments in equipment and infrastructure. By adding this new service, expanding our data leakage prevention functions and integrating archiving without increasing the cost of the product, we continue to offer customers unrivaled value,” said Kevin Beatty, vice president of marketing and business development.

MDaemon SecurityGateway for email servers includes several antivirus engines and proactive outbreak defense technology for detecting viruses, spam, phishing, spyware, and various types of business e-mail compromise threats. Along with the quarantine of incoming and outgoing email, SecurityGateway provides accurate delivery and receipt of legitimate email.

About MDaemon Technologies:

MDaemon Technologies is developing email security software. The company was founded in 1996. Its products are trusted by organizations in more than 140 countries and in 25 languages. The company’s flagship products, MDaemon Messaging Server and SecurityGateway for email servers, can be deployed in virtual, hosted or private local environments. The company’s products include the latest security technology and require minimal support and administration for operation and maintenance.

For questions about the purchase of MDaemon solutions, you can contact the sales and development department of AXOFT Ukraine by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Paessler and Martello become strategic partners

Paessler and Martello become strategic partners

Paessler AG and Savision, a subsidiary of network performance management solutions leader, Martello Technologies Group joined the Paessler Uptime Alliance to offer PRTG users a consolidated view of all IT systems from a single control panel using software. The alliance, first announced in April 2018, is designed to help partners integrate comprehensive, advanced IT infrastructure monitoring into their offerings to prevent downtime of critical IT systems.

PRTG is a one-stop monitoring solution that lets IT professionals know at any time what is happening across their entire IT infrastructure, including networks, systems, equipment, applications, and devices. PRTG is one of the world’s leading IT monitoring solutions.

Martello Savision iQ software translates infrastructure and application monitoring data into dashboards that automate and integrate IT operations with IT service management workflows. Savision iQ integrates with more than 35 applications, including the PRTG enterprise IT infrastructure monitoring solution.

Savision iQ and PRTG’s integrated integration provides a solution that detects, analyzes, and even solves IT problems before they become a problem. The combined solution collects information from several sources, such as monitoring tools, cloud platforms and ITSM systems. PRTG monitors the entire IT package around the clock and sends questions and anomalies to Savision iQ. These problems are correlated and analyzed using automated workflows for troubleshooting and troubleshooting. Savision iQ is designed to handle large amounts of data, allowing you to display and view multiple PRTG instances on a single panel. This makes the solution suitable for networks of all sizes.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Container Virtualization and Development Security

Container Virtualization and Development Security

Virtualization is the partitioning of a hardware server into several virtual machines (VMs). As a result, computing power is distributed among several “users.”

In simple terms, virtualization resembles a high-speed train, in which many passengers travel at once. They actually share the cost of fuel and vehicle maintenance, use it as needed and save space on the roads (compared to the situation where everyone could choose their own car instead of a train).

Virtualization is controlled by a software component called the hypervisor. It abstracts the VM from the hardware, so the user application does not know what works in the virtual environment.

This leads to the main advantage of virtualization: a virtual machine can be transferred from one server to another together with the operating system and applications.

How containers work

In the case of containers, it is not the hardware that is broken into individual components, but the operating system. Containers are an isolated environment for an application that contains everything necessary for its work, for example, program libraries, files and metadata.

It is possible to draw an analogy with sea containers, with the help of which individual shipments are transported on ships, wagons or trains. Software containers are modules with code that performs a specific task. Containers simplify assembly, testing and deployment pipelines in DevOps.

DevOps (development operations) is a methodology that began in 2009 and is aimed at the interaction of programmers and system administrators to increase the frequency of releases.

What is container management systems?

The container management system (orchestration system) is a web-based administration panel that manages the operation of containers. An example would be the open platform Kubernetes, developed by Google. There are other solutions – Docker, Rancher, OpenShift, and so on.

These solutions are needed for flexible scaling of the virtual infrastructure. These systems manage the “schedule” (they say when to start this or that service) and distribute the load on the servers so that computing resources are used evenly.

Developers and system administrators can finally agree on one thing – containers give developers the opportunity to experiment without any risks and restrictions. Virtual containers are directories (if you are a Windows supporter, you can call them folders), which are securely isolated from the rest of the operating system space. In essence, a container is a secure development system that shares the most important files with the host operating system, while allowing the developer to create an application without fear of possible negative consequences for the host. The container is equipped with its own IP-address, identifier, file system (only a few files are “borrowed” from the host) and the level of execution.

Everyone is already accustomed to the fact that system administrators and software developers are constantly arguing with each other about user rights, application rights, access with administrator privileges, application hosting, and requirements for allocated disk space. Container virtualization removes all these contradictions, except for the question of disk space. System administrators retain the privilege of allocating disk space for containers, but in other matters, developers administer their container as they wish. They can reload the container when they like, install any software and perform any tests and experiments without fear of disturbing the host.

What else makes containers so attractive for developers is the ability to debug the application in exactly the same environment in which it will be used. Traditionally, debugging is carried out in an environment that has a number of differences from industrial – a different processor architecture (for example, fewer cores), differences in versions of the basic software, a different schedule for installing updates.

These unpleasant differences create problems in software support that can drive an administrator crazy. Developers prefer to build applications using the latest versions of the software used. But working environment administrators will not allow to put such versions, as they have questions regarding stability and the presence of vulnerabilities, and these questions are quite fair, especially to software at the beta stage.

However, the use of containers removes a number of similar difficulties in debugging software on an industrial system. Developers can use the latest versions of the necessary tools and check the stability of their work. All possible vulnerabilities are “locked” in the container and do not carry risks for the industrial system.

However, the use of containers removes a number of similar difficulties in debugging software on an industrial system. Developers can use the latest versions of the necessary tools and check the stability of their work. All possible vulnerabilities are “locked” in the container and do not carry risks for the industrial system.

It is worth noting that Docker is one of the most popular container systems. It is an open platform that gives developers and system administrators the ability to create, distribute and execute distributed applications. In Docker containers, applications can run on any operating system. Using Docker allows you to accelerate the development of applications and reduce the time they prepare to start selling users.

Development safety

Important and necessary in the coming years, as the speed of development grows, cybersecurity shifts closer to the beginning of the cycle, and now developers are faced with the task of identifying threats and protecting them from the product not only during its launch, but also before the development cycle begins. Security solutions must be designed to successfully protect various environments (physical, virtual, and cloud), ensure that IT security and DevOps work closely together, and contribute to the consolidation of security tools and regulatory requirements, without interfering with development processes. With the growth of DevOps, new sources of vulnerabilities are emerging, and a larger segment of the business needs protection. This is where developers come to the aid of a new solution from Trend Micro, which expands the possibilities of protecting containers with the launch of Deep Security Smart Check.

Deep Security Smart Check helps DevOps experts ensure the safety of their development by quickly and continuously scanning for threats and vulnerabilities, a single control panel, notifications and scanning logs, thereby fulfilling the requirements of regulators. The Smart Check solution is optimized for leading container platforms with Docker API 2.0 support, such as the Docker Trusted Registry, Amazon Elastic Container Registry, Azure Container Registry and Google Container Registry; it also integrates with leading SIEM systems and orchestration tools, such as Jenkins, Kubernetes, SumoLogic, Splunk, etc.

If you are a developer, then you should try out the containers in your work. If you are a system administrator, then you should allow the use of these isolated environments in the systems you support, and Smart Check solutions allow architects and developers to embed security as code into applications before they are deployed, effectively providing protection in the early stages of development, and at the same time reducing the number of manual operations using automatic image scanning for new vulnerabilities and malware.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Avast Awarded Product of the Year by AV-Comparatives Safety Testing Lab

Avast Awarded Product of the Year by AV-Comparatives Safety Testing Lab

Avast Free Antivirus was awarded the Product of the Year 2018 by one of the most prestigious AV-Comparatives testing laboratories in the industry. The “Product of the Year” award is awarded to an antivirus product that consistently demonstrates the best results throughout the year. Although the cost of the product is not included in the test evaluation criteria, with this award Avast Free Antivirus surpassed all paid security products tested by AV-Comparatives.

AV-Comparatives is an independent testing laboratory known for rigorous testing of security software products.

“AV-Comparatives is one of the leading independent antivirus testing agencies in the industry, so winning the“ Product of the Year ”award is the same as winning the world championship in antivirus products. The recognition of Avast Free Antivirus as “Product of the Year” is testimony to our technological leadership in the field of cyber security, ”said Ondrej Vlchek, CTO, Executive Vice President and Manager of the Avast consumer business unit. “Whether it is new types of crypto mining attacks, banking trojans or increasingly sophisticated phishing campaigns, the complexity of the threats is constantly evolving. In 2018, we saw the dawn of artificial intelligence and the growth of IoT devices as a growing target for hackers. To stay ahead of these threats requires constant technical progress and innovation, and this is exactly what we are concentrating on at Avast. ” The full report can be viewed on the AV-Comparatives website.

Avast was named the winner of the well-deserved award “Product of the Year” after he received the Advanced + classification in each test conducted by AV-Comparatives in 2018, receiving a high rating of protection against real threats. Reviewers also praised Avast Free Antivirus for its clear, modern, touch-friendly interface and the comprehensive Smart Scan feature. In addition to this top award, Avast also received a gold award for its anti-malware test.

Every year, AV-Comparatives tests about 18 security-compatible Windows products as part of its annual security report. All products are tested for their ability to: protect against real threats, detect malware, provide protection without slowing down the PC, and remove malware that has already infected the PC. The highly coveted “Product of the Year” award is awarded to a product that receives the highest overall scores for all tests in a series of core tests for government consumers.

The award-winning basic anti-malware technology Avast Free Antivirus is also included in the consumer safety product family: Avast Internet Security, Avast Premier and Avast Ultimate, as well as the Avast Business Endpoint offering.

About Avast:

Avast is a global leader in digital security products. With hundreds of millions of users online, Avast offers Avast and AVG brands that protect people from online threats and the changing IoT threat environment. The company’s threat detection network is one of the most advanced in the world, using machine learning and artificial intelligence technologies to detect and prevent threats in real time.

To purchase SolarWinds solutions, please contact AXOFT Ukraine Sales and Development Department by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

SolarWinds Announces Free Flow Tool Bundle, Designed to Streamline Complex Network Management

SolarWinds Announces Free Flow Tool Bundle, Designed to Streamline Complex Network Management

SolarWinds, the leading provider of powerful and affordable IT management software, today introduced the SolarWinds® Flow Tool Bundle, a set of free analysis tools designed for quick distribution, testing and customization. NetFlow Traffic Analyzer, which helps technology professionals to get a more complete picture of their network infrastructure. Created to support their industry-leading network management portfolio, 1 the SolarWinds streaming toolkit is immediately available and can be installed on Windows® 7, 8 and 10, Windows Server® 2012 R2, 2016 and 2019.

“The development and accessibility of the Flow Tool Bundle demonstrates our continued commitment to providing free tools to the professional community of technology developers,” said Brandon Schopp, vice president of product management and strategy at SolarWinds. “By interacting with our users in forums such as THWACK, we can create products designed to meet the needs of modern technical professionals by providing them with the tools to succeed in dynamic and distributed environments.”

Main features of the Free Flow Tool Bundle

Package SolarWinds Flow Tool Bundle:

• NetFlow Replicator can help technicians more easily distribute stream data across multiple recipients to analyze traffic or security and customize random sampling of stream data packets to help reduce the load on the monitored system and collector.

• NetFlow Generator simulates network flow data so technicians can test and verify their configurations. This feature is especially useful when testing the behavior of more complex network objects, such as load balancers, firewall rules, and alert conditions.

• NetFlow Configurator remotely configures and activates NetFlow v5 on supported Cisco® devices. With this tool, technicians can easily set up a router to send NetFlow records to their collector.

Try now download Flow Tool Bundle for free↵

About SolarWinds

SolarWinds is a leading provider of powerful and affordable IT infrastructure management software. SolarWinds products provide organizations around the world, regardless of the type, size, or complexity of their IT infrastructure, the ability to monitor and control the performance of their IT environments, whether locally, in the cloud, or in hybrid models.

To purchase SolarWinds solutions, please contact AXOFT Ukraine Sales and Development Department by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Microsoft announces the release of a new version of Windows

Microsoft announces the release of a new version of Windows

Microsoft plans to release a new version of the server operating system for industry use – Windows Server IoT 2019. The new version will introduce several new features, and improvements to existing ones, including:

∗ System analytics

∗ Hybrid Cloud

∗ Working with container network connections using Kubernetes

∗ Group managed service accounts for containers

∗ Ability to encrypt virtual networks

With the release of the next Windows Server 2019, the “for Embedded Systems” brand in the product name will be replaced with “IoT”. Release is scheduled for March 4, 2019.

Windows Server IoT 2019 will be released in six different versions, among them:

∗Windows Server IoT 2019 Standard

∗Windows Server IoT 2019 Datacenter

∗Windows Server IoT 2019 Essentials

∗Windows Server IoT 2019 Telecommunications

∗Windows Server IoT 2019 for Storage Standard

∗Windows Server IoT 2019 for Storage Workgroup

More information about the new features Windows Server 2019 is possible on the Microsoft website.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

MathWorks accelerates aerospace design with MATLAB and Simulink

MathWorks accelerates aerospace design with MATLAB and Simulink

MathWorks introduced new flight analysis and visualization capabilities for aerospace design with MATLAB and Simulink. In the 2018b Release, the Aerospace Blockset adds flight management analysis tools to help analyze the flight performance of aerospace vehicles. Aerospace Toolbox adds the ability to customize user interfaces with cockpit flight instruments for visualizing and analyzing the movement and behavior of aerospace vehicles. Engineers can now develop continuous workflows from the early stages of vehicle design and development to in-flight prototyping, which shortens the time between design and testing.

Aerospace design must comply with strict design and regulatory requirements to ensure compliance with standards such as MIL-F-8785C, DO-178 B and DO-178 C, for which engineering teams usually rely on Simulink and DO Qualification Kit. Engineers working with their own or third-party flight visualization and analysis tools can now work directly in the Simulink environment for flight simulation, visualization and analysis. By using Model-Based Design and Simulink in the early stages of the design workflow, teams can more easily maintain models and code. They can also exchange models between groups and contractors to ensure that all requirements are met.

“The ability to model, model, analyze and visualize is crucial for a highly regulated aerospace industry. That’s why Simulink has become the preferred design environment for these engineers, ”said Paul Barnard, director of design automation marketing, MathWorks. “Now these teams can shorten the design time even more because they can iterate to create prototypes in a few weeks instead of many months. This will help them meet deadlines for development, while ensuring high accuracy and standards compliance, ”says site Aithority

Aerospace Blockset helps engineers quickly simulate, simulate and analyze the dynamics of spacecraft. In R2018b, a new flight control analysis tool has appeared, allowing for an expanded analysis of the dynamic characteristics of aerospace vehicles. Tools include start-up templates and functions for calculating and analyzing the flight qualities of gliders modeled in Simulink.

Aerospace Toolbox provides tools and functions that help analyze and visualize the movement of an aerospace vehicle using reference standards and models. New in the R2018b is the addition of flight instruments that display measurements using standard cockpit instruments.

About the company: MathWorks is an American company specializing in the development of software for mathematical calculations and simulation.

To purchase MathWorks solutions, please contact AXOFT Ukraine Sales and Development Department by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

IceWarp awards in the Corporate E-Mail category

IceWarp awards in the Corporate E-Mail category

IceWarp received the CIO CHOICE 2019 Award of Honor and Recognition as the most preferred brand in “corporate email”. This prestigious recognition was presented at the exclusive Red Carpet Night, celebrating innovation and excellence in the ICT ecosystem (Information and Communications Technology), created by CORE Media.

Already for the 7th year, the annual recognition of CIO CHOICE focuses on Information and Communications Technology (ICT) brands, which demonstrate a constant demand for excellence and form the basis of success in the industry. Recognition is awarded on the basis of independent voting in India by CIOs, the winners of which are listed on the CIO CHOICE 2019 website.

CIO CHOICE is the largest and only platform for online voting where CIOs identify and select products that have earned their trust. When ICT is recognized by CIO Choice, it means that its product, service or solution has been approved by CIOs.

There is an outstanding advisory group made up of CIOs from different verticals who lead the whole process, with KPMG as a knowledge partner.

Anoop Mathur, founder and president of CORE Media, said: “Congratulations to IceWarp for being honored with the CIO CHOICE 2019 award. Choosing a CIO is absolute evidence, since this poll by the CIO ultimately matters to any brand or product, so like this is the voice of the client. The CIO CHOICE trust mark gives corporate CIOs the confidence to interact confidently with a recognized brand for the first time, helping both ICT brands and CIOs. ”

“We are truly pleased that we have again been chosen as the preferred brand in this segment,” said the director general of Pramod Sharda in IceWarp. He further added: “I am immensely grateful to the CIO community for their continued faith in us and help in winning for two consecutive years. This also demonstrates our corporate email leadership. ”

IceWarp ability to provide solutions in line with industry standards and requirements for small and medium-sized enterprises and large enterprises in different regions and constant technological innovations helped us achieve this goal. What distinguishes us is the individuality, flexibility and support that we offer to our customers. The value we bring to customers is what the CIO values ​​in the “corporate email category”.

About company:

IceWarp, Inc. is a software development company based in Springfield, Va., that provides messaging, voice and collaboration solutions for small, medium and corporate enterprises. IceWarp has offices in the USA and the Czech Republic. The company has been operating since 1998 and is used by more than 50,000 companies worldwide. IceWarp Messaging Server is the main IceWarp product that is used as an alternative to Microsoft Exchange.

For questions about the acquisition of IceWarp solutions, you can contact the sales and development department of AXOFT Ukraine by phone +38 044 201 03 03 or by e-mail: sales@axoft.ua

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers

Attacks on industrial machines: security risks associated with connected radio remote controls

bart-ransomware

Attacks on industrial machines: security risks associated with connected radio remote controls

Trend Micro published the results of the A Security Analysis of Radio Remote Controllers for Industrial Applications study (PDF, EN) (“Analysis of systems of remote radio control of industrial equipment from a security point of view”), in which company experts consider the vulnerabilities of such systems on the example of the seven most popular manufacturers, the main types of cybercrime attacks on businesses with their use and key methods to prevent such attacks.

Radio remote control systems are widely used in manufacturing, construction, transportation of goods and other areas. They are equipped with many cranes, drilling equipment, engineering equipment and mining equipment, which is characterized by a long service life, high replacement costs and difficulties in updating the firmware and software. In this regard, in the era of the fourth industrial revolution (Industry 4.0), which involves the active interaction of devices with each other and with the outside world and the massive introduction of automation, such industrial equipment can become another “weak link” in protecting the enterprise from cybercriminals.

Considering the fact that millions of units of remotely controlled equipment are used in the world, which are practically unprotected from intruders, the latter can intercept the management of such equipment at the software level, substitute commands coming from the control panel, initiate emergency shutdown and organize various types of attacks using these methods . Among them it is necessary to single out: sabotage and temporary suspension of the enterprise’s activities, the scale and damage of which will differ greatly depending on how important the affected enterprise is for the industry; theft of products from ports and automated logistics centers using hoists and other radio-controlled equipment; extortion, in which the attacker purposefully causes a halt in production or damage to valuable equipment, leading to losses, and then demands a ransom in exchange for stopping the attacks.

The study examines the main methods of protection that are used in the development of remote radio control systems by the most popular manufacturers and their weak points, for example, secure connection using a common access code for the transmitter and receiver, and password protection of the transmitter terminal, unlocking certain transmitter functions using key cards and the use of redundant protection systems (say, an infrared communication channel that turns off the receiver if the remote control goes beyond ICS his actions). In the first cases, attackers may sooner or later learn passwords or make a copy / steal a key card, and in the latter, bypass the security protocol or act knowing the radius of its work, Trend Micro experts say. At the same time, the effectiveness of the applied methods of protection substantially depends on the general level of information security in the enterprise, and it is impossible to call them by themselves reliable or not.

In general, in the course of the study, Trend Micro found out that the industry (as opposed to the consumer sphere) practically does not develop the cyber defense culture of radio-controlled equipment, despite the fact that its cost and possible losses many times exceed the cost of consumer equipment. At the same time, one of the results of Trend Micro experts has already been the growing interest of equipment manufacturers on this issue and the acceptance of responsibility to customers for ensuring the cyber security of their products. The full research report is available on Trend Micro site.

About Trend Micro

Trend Micro Incorporated, the global leader in cybersecurity solutions, helps make the world safer for sharing digital information. Trend Micro’s innovative solutions for consumers, businesses, and government agencies provide layered security for data centers, cloud-based business solutions, networks, and endpoints. Trend Micro has more than 6,000 employees in 50 countries.

Become an Axoft Partner

Glad to cooperate with AXOFT!
Fill out and submit this form.
We will contact you to discuss the terms of cooperation.

promotional offers