Kaspersky Endpoint Security Business Edition

Trend Micro announced today it is broadening its virtualization security portfolio to enable enterprises to fully leverage the benefits of their desktop infrastructures.

Trend Micro’s strategy for desktop virtualization is comprehensive in terms of protection technologies, flexible in terms of deployment scenarios and proven, having been on the market securing virtual desktop environments and enabling maximum ROI since 2009. The company’s latest virtual desktop-aware product, Trend Micro OfficeScan 10.5, was also announced today and rounds out Trend Micro’s virtualization portfolio.

Because different desktop virtualization scenarios require tailored solution approaches, Trend Micro is creating products and solutions that meet varied security needs. Enterprises can choose virtual appliance-based security solutions that are more easily provisioned, managed, and can also be lighter on the host. Now, they also have the option of in-guest, agent-based desktop virtualization security solutions, which provide flexible security levels for comprehensive protection that’s backed by the  infrastructure for faster, lighter, cloud-based protection.

Ahead of the game, Trend Micro delivers security solutions tailored to the specific needs of both virtualized and physical environments:

  • is the industry’s first anti-malware product built on hypervisor-based APIs such as VMsafe and specifically designed to secure active and dormant virtual machines. Available since July 2009, it delivers purpose-built anti-malware for VMware environments.
  • , available since November 2009, is the industry’s first security solution designed to provide intrusion defense for both virtual and physical systems leveraging both VMsafe-based virtual appliances and in-guest agents.
  • , announced today and scheduled to be available at the end of July, provides the industry’s first hypervisor “agnostic” endpoint protection for virtualized desktops operating in all leading virtual desktop environments.

endpoint security controls     endpoint security comparison