Trend Micro buys HP TippingPoint

The acquisition will allow Trend Micro to offer an integrated intrusion prevention and breach detection solution

acquisition

Trend Micro has announced the acquisition of intrusion prevention system company HP Tipping Point for an estimated $300m (195m).

TippingPoint will enable Trend Micro to offer a complete intrusion prevention and breach detection solution to safeguard businesses against increasing threats to their data. The integrated security software will cover endpoints, network, data centre and the cloud and will be distributed via Trend Micro's new Network Defense division.

Organisations remain at risk of large-scale cyber threats and businesses should have the systems in place to prevent, detect and respond to threats, Trend Micro said. 

However, hackers and cyber criminals are increasingly able to circumvent many of the measures put in place, taking control of sensitive data using internal networks.

"To face this problem, organisations need a layered threat defense working seamlessly across the enterprise to address threats before, during and after an attack," said Eva Chen, CEO, Trend Micro.

"As an ideal complement to our market-leading protection for data centers and endpoints, this new next-generation network defense solution combines our best-in-class network breach detection system with proven intrusion prevention and response capabilities from TippingPoint. "

Trend Micros's combined intrusion protection and breach detection solution means if a compromise occurs, the system can quickly detect it and put measures in place to prevent escalation and further damage occurring.

"This acquisition complements Trend Micro's current threat defense expertise, extending its strength in endpoint, cloud, data center and breach detection to the network," said Mike Spanbauer, vice president of research, NSS Labs.

"By combining two strong brands, this move accelerates Trend Micro's enterprise position into a non-competing segment, and provides a single, complete threat defense solution for enterprises seeking to make a critical security investment."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What does a CISO do?
Careers & training

What does a CISO do?

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021