REPORT: TREND MICRO 1H 2016 SECURITY ROUNDUP - THE REIGN OF RANSOMWARE (PDF)

The 1H 2016 Security Roundup features insights on the most noteworthy security stories from the first half of the year. The reign of ransomware continues, Business Email Compromise (BEC) schemes remain lucrative, and other exploit kit variants take Angler’s place.

Products, Partners & Solutions
Alliances & Partners
AWS Alliance
Cisco Alliance
Dell OEM
GCO EMEA Program
GCO NA Program
PartnerPlus NA Program
VMware Alliance
Other Alliances
Consulting & Support Services
Project Consulting Services
Support Services
Technical Account Management Services
Service Providers
ISP/Telco Solutions
MSP Solutions
Cloud and Data Center Security
Virtualization & Data Center
Deep Security
Deep Security as a Service
Deep Security for Web Apps
SecureCloud
ServerProtect
Complete User Protection
Control Manager
Email Encryption
Email Encryption Gateway
Endpoint & Mobile Device
Endpoint Application Control
Endpoint Encryption
Endpoint Vulnerability Protection
Enterprise Security Suites
ES & Data Protection Suite
ES Communication & Collaboration Suite
ES Endpoints & Mail Servers Suite
ES Endpoints Suite
ES Gateway Suite
ES Suite
Enterprise Data Protection (Add-on)/Endpoints
Hosted Email Encryption
Hosted Email Security
IM Security for MS Lync and OCS
Integrated Data Loss Prevention
iDLP Module for IM Security
iDLP Module for InterScan Messaging
iDLP Module for InterScan Web
iDLP Module for OfficeScan
iDLP Module for PortalProtect
iDLP Module for ScanMail
InterScan Messaging Security
InterScan Web Security
Mobile Security
OfficeScan
OfficeScan Intrusion Defense Firewall Plugin
PortalProtect for SharePoint
ScanMail
Trend Micro Remote Manager
Worry-Free Advanced & Standard
Worry-Free Services
Custom Defense
Advanced Threat Protection
Deep Discovery
Deep Discovery Analyzer
Deep Discovery Inspector
Deep Discovery Email Inspector
Deep Discovery Endpoint Sensor
Consumer
Consumer Security
DirectPass
Mobile Security for Consumers
Online Guardian for Families
SafeSync
Titanium Family
TM Security for Home
Company & Threat Marketing
Industry Solutions
Federal/Government
Education
Healthcare
Threat Marketing
Benchmark Tests
Smart Protection Network
Threat Protection
TrendLabs
Competitive Info
Against Kaspersky
Against McAfee
Against Microsoft
Against Sophos
Against Symantec
Against Websense
Against Other Competitors
Company Marketing
25th Anniversary
BrandZone
BZ Image Library
Company Collateral
Cybersecurity Strategists (Evangelists)
Executives
Learning Management System (LMS)
Social Media
Tradeshows & Events
2014 Directions Summit
2014 Global Partner Summit
2014 Global Sales Leadership Summit
2014 Sales Kickoff
2015 Global Customer Summit
2015 Global Partner Summit
2015 Global Sales Leadership Conference
2015 Partner Day
2015 Sales Kickoff
2016 Sales Kickoff
AWS 2013
AWS 2014
AWS Re:Invent 2014
AWS Re:Invent 2015
Dell World 2014
Gartner Security Summit 2015
Gartner Summit 2014
IBM Pulse 2014
Insight 2013
RSA 2013
RSA 2014
RSA 2015
RSA 2016
VMworld 2013
VMworld 2014
VMworld 2015
Other Shows
Asset Type
Product & Solution Collateral
Datasheet
FAQs External
Product Matrix
Product/Solution Brochure
Solution Brief
Video: Overview
Video: Product Demo
Video: White Board
Webcast
Field Enablement
Red Alert
Battlecard
Channel 1-Pager
FAQs Internal
PPT: Channel-Facing
PPT: Customer-Facing
PPT: Sales/Technical Training
Telesales Script
War Stories
Word Descriptions
Technical Marketing
Award Industry Recognition
Benchmark Test
Guide: Product
Guide: Reviewer
Guide: Sizing
Research Report/Primer/eGuide
Trend Responds
Video: Thought Leadership
White Papers
White Paper: 3rd-Party/Analyst Authored
White Paper: Trend Authored
Web
Infographic
SEM/SEO
Web Page: Content
Web Page: Graphic/Image
Web Style Guide
Communication
Advertising
Biography
Blog
Direct Mail
eDM/Email
Flyer
Newsletter
PR/Analyst Relations
Social Media
Customer References
Logo: Customer Reference
Success Story
Video: Customer Reference
Testimonial/Quote
Graphics / Imagery
Ad Graphic
Banner Graphic
Box Shot/Packaging Graphic
Event Imagery
Font
Icon Graphic
Logo Graphic
Photo
Royalty-free Stock Photo
Screen Shot
Marcom
Brand Guidelines
Brand Quickstart
Templates
Template: Battlecard
Template: Channel 1-Pager
Template: Creative Brief
Template: Datasheet
Template: FAQs
Template: PPT
Template: Report
Template: Solution Brief
Template: Success Story
Template: Web Page
Template: White Paper
Template: eDM/Email
Writing Style Guide
Brand Refresh 2015
Marketing Programs
Big Board
Calendar
Creative Brief
Go to Market Plan
Messaging Doc
Program Micro Kit
Program Plan
Tactic Guide
Source Files
BU
Consumer
ENT
MB
SB
Language
US English
Arabic
British English
Croatian
Czech
Danish
Dutch
Finnish
French
German
Greek
Hungarian
Italian
Japanese
Norwegian
Polish
Portuguese
Russian
Slovenian
Spanish
Swedish
Turkish
Region
Global
NA
APAC
EMEA
Global plus APAC
Global plus EMEA
Global plus Japan
Global plus LAR
Global plus NA
JAPAN
LAR
Marketing Programs
Cloud & Data Center Security Mktg Programs
AWS Event in a Box Q4 2013
Cloud Leadership Program
Deep Security for Web Apps Program
MB Virtualization Program
Virtualization Leadership Program
Heartbleed Vulnerability Mktg Program
Complete User Protection Mktg Programs
Forrester TEI Q1 2014
HES 2.1 Product Update
Mobile Bundle Upsell
Office 365 Security Program
Secure Web Gateway Displacement Program
Security for MS Comms-FF Sunset Upsell
Server Essentials
Switch Program
Windows XP Longevity Program
Worry-Free 9 Product Launch
Custom Defense Mktg Programs
Deep Discovery Q4 2013
Thought Leadership Mktg Programs
Project 2020
Document Version 1.0
Date Aug 18, 2016
Owner Carolyn Guevarra
Keywords 1H 2016 security roundup, threat landscape, ransomware, business email compromise, Exploit Kit, BEC