Trend Micro Broadens Endpoint Security Platform

Trend Micro is augmenting its Endpoint Security Platform offerings with a Power Management Module that enables enterprises to shut down computers to conserve energy or turn on computers to apply patches and updates. It helps organizations achieve more effective protection through timely patches and updates as well as true energy cost savings—all without sacrificing an end user's need to access their computers either remotely or after hours.

The Trend Micro Power Management Module is one out of a series of modules offered through Trend Micro's relationship with BigFix. In mid-April, Trend Micro introduced Trend Micro™ Endpoint Security Platform—a combination of Trend Micro endpoint security and BigFix endpoint management—with four modules that allow organizations to customize the solution to their security and systems management needs. The newest module to be offered by Trend Micro extends the value of the Endpoint Security Platform, providing a power management solution in which IT teams can enforce conservation policies infrastructure-wide, while also enabling crucial security patches and updates to be installed on schedule. This module resolves the conflict between the need to power down machines to save on energy costs and the need to keep them on so IT can apply patches and updates.

"We are pleased to extend our agreement with BigFix that was announced earlier this year. By partnering with BigFix, we have brought together security and systems management on one platform that offers companies a level of visibility and control that was not previously offered," said Tom Miller, general manager of the enterprise business unit at Trend Micro. "Now, with the Trend Micro Power Management Module, we can help enterprises cut down energy costs and be environmentally responsible while also increasing the effectiveness of their endpoint security. It's a win for customers all the way around—go green, save costs, and be secure."

"Power management has been a serious challenge for many organizations. BigFix Power Management allows IT organizations to enforce conservation policies infrastructure-wide, while also providing granularity that enables application of policies to just a single computer when needed," said Amrit Williams CTO of BigFix. "We are delighted to be working with Trend Micro again to further unify endpoint security and systems management into a single solution that cuts costs and lowers security risks."

The Power Management Module is designed to integrate with the Trend Micro Endpoint Security Platform. The modular architecture of the platform allows enterprises to choose either a highly scalable, dedicated security solution, or an endpoint security solution combined with systems management, saving time, effort, and cost through system consolidation. The Trend Micro Power Management Module is an important addition to this modular architecture, complementing the other modules by ensuring that computers are turned on and ready to receive scheduled security updates and patches—increasing the effectiveness of the protection delivered by the other modules.

Unlike traditional security management systems, the Trend Micro Endpoint Security Platform provides a high-performance framework based on a single-server, single-agent, single-console technology that supports up to 250,000 users on just one management server. This highly scalable platform simplifies protection for large organizations, distributed environments, and even remote workers, regardless of connectivity. Enterprises get significant advantages in speed, flexibility, and scalability, while reducing the infrastructure and maintenance costs associated with traditional systems and security management.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.