Few security firms are as big as Trend Micro, which offers a portfolio of holistic security services for businesses of all sizes as well as end users.
So it is no surprise that Trend Micro is in the running for Best SMB Security Product, Best Enterprise Security Product and Best Cloud Security Product at the V3 Technology Awards 2014.
V3 spoke to Trend Micro technical director Ross Dyer (pictured) to get an insight into the firm's recipe for success and its plans for the future.
V3: How do you feel being shortlisted for this year's awards?
Dyer: We believe this represents an acknowledgement of Trend Micro's continued innovation and focus on technology that helps organisations secure the exchange of digital information. Trend is proud to be a leader in this space.
What were the biggest trends this year?
In 2014 there were key shifts in organised cyber attacks. What is most worrisome is that there is evidence that cyber criminals are now combining cyber attacks with financial fraud schemes like 'front-running' hedging strategies and the 'shorting' of stocks after a breach.
These secondary schemes of monetisation represent a harbinger of a crime wave not yet seen in modern history.
What were the biggest threats?
Throughout the first three months of this year we saw how unusual targets like point of sale (PoS) terminals proved worthy of attack. Used in the retail and hospitality industries to accept payments and provide operational information in accounting, sales tracking and inventory management, PoS systems cut costs and provide productivity gains.
PoS systems could have a dramatic effect on any retail or hospitality business with the benefits they bring. As such, PoS system owners need to consider security especially as cyber criminals will continue to find ways to compromise devices in their evolving quest to obtain money.
Online banking malware also exhibited a variety of notable behaviors in 2014. In January, for instance, we found ZeuS/ZBOT samples that targeted 64-bit systems. Their routines include preventing the execution of various anti-malware analysis tools and sporting a Tor component that hides communications with command-and-control servers.
That same month, a Banload variant used a different infection approach - checking for security plug-ins before executing malicious routines. Control Panel malware and a unique 'timed' ZeuS/ZBOT downloader further proved that no two online banking malware were the same when it came to technique.
What do you think the biggest security trends will be in 2015?
Organisations will look more seriously at the proposed EU Data Protection legislation and how it affects them. This will drive a stronger adoption of best practice and understanding of how to secure data and deal with breaches.
We expect further attacks against business and government organisations, whether by restricting access to services or stealing data. The security industry will respond with stronger strategies around understanding the large volumes of security information, and provide clients with better visibility and planning advice.
How do you plan to deal with these trends?
Trend Micro is working hard to help clients reduce cost and complexity and to provide industry leading security protection.
Securing the user and the multiple devices they use through to the network level and on to the cloud is the cornerstone of Trend Micro's approach. We will be working with strategic partners and systems integrators to help deliver end-to-end security strategy and protection.
Using photocatalysts to convert carbon dioxide into usable energy such as methane or ethane
Trained on curated data from Moorfields Eye Hospital, the neural network also shows clinicians how it reached its judgement
Yokohama National University demonstrate technology that could lead to a fault-tolerant universal quantum computer
Top-of-the-range Threadripper 2990WX now available from Scan, Ebuyer, Overclockers, Novatech and Amazon