Nokia and Trend Micro establish a strategic alliance
by Mirko Zorz - Wednesday, 6 November 2002.
Nokia, and Trend Micro, announced a Memorandum of Understanding to establish a strategic alliance focused on delivering network-based, best-of-breed content security solutions to enterprises.

The two established security leaders intend to leverage their respective strengths in the appliance and antivirus/content security marketplaces to provide businesses with content security solutions designed to be robust, rapidly deployable, easily maintained and have unmatched performance.

"Trend Micro’s proven innovation and market leadership in antivirus and content security solutions brings an important strategic component to Nokia’s best-of-breed network security system approach," said Dan MacDonald, vice president of product management and marketing, Nokia Internet Communications. "Together Nokia and Trend Micro will address the ubiquitous business problem of email borne exploits by delivering a unique, secure content management system that customers have been looking for and that offers key attributes like auto updating, statistical protection and unmatched performance and reliability."

The Nokia-Trend Micro purpose-built, secure content management system, Nokia Message Protector SC6600, aims to provide easy to deploy, defense-in-depth email protection through statistical virus protection, SPAM rejection and intelligent exploit rejection. The system is designed to ensure maximum integrity and uptime of the enterprise messaging infrastructure and internal tests show that it can scan more than 120,000 messages per hour. The Nokia Message Protector SC6600 will be exclusively available from Nokia and backed by its "First call, Final resolution" support network to ensure that customers have a single point of contact for all support issues.

Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //