Trend Micro Completes Acquisition of Mobile Armor

Trend Micro Inc., which provides Internet content security, has completed the acquisition of Mobile Armor Inc. The acquisition agreement between Trend Micro and Mobile Armor was announced on November 29, 2010 and expands Trend Micro's data protection portfolio, extending its encryption offerings to span from endpoints all the way into the public cloud.

The new Trend Micro Endpoint Encryption offering, formerly known as the Mobile Armor Data Armor Suite, delivers the broadest coverage of any solution in the market. One centrally managed encryption solution includes full disk and file/folder capability, delivers software-based encryption and support for self-encrypting drives, and covers PCs, Windows smartphones and removable media. Additionally, pre-defined policies make it simple to set policies while robust reporting readily proves compliance.

"We are pleased to complete the acquisition of Mobile Armor and welcome our new employees, partners, and customers to the Trend Micro family," said Steve Quane, the company’s chief product officer. "Trend Micro is helping government agencies, enterprise customers, SMBs and consumers around the globe protect their data whether stored on a local PC or mobile device or in a virtualized environment or public cloud."

Trend Micro and Mobile Armor voluntarily notified and requested review of the acquisition by the U.S. Committee on Foreign Investment in the United States (CFIUS), and it raised no objections to the transaction. CFIUS is an inter-agency committee of the U.S. government authorized to review transactions that could result in control of a U.S. business in order to determine the effect of such transactions on the national security of the United States. Chaired by the treasury secretary, CFIUS includes representatives from a number of departments and agencies, including the departments of Homeland Security, Commerce, Defense and State.

Accordingly, Trend Micro Endpoint Encryption is available to organizations around the world seeking to ensure the privacy of sensitive data on their corporate devices of all kinds.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.