Business
Improve your risk posture with attack surface management
Security that enables business outcomes
Gain visibility and meet business needs with security
Connect with confidence from anywhere, on any device
Secure users and key operations throughout your environment
Move faster than your adversaries with powerful purpose-built XDR, attack surface risk management, and zero trust capabilities
Maximize effectiveness with proactive risk reduction and managed services
Understand your attack surface, assess your risk in real time, and adjust policies across network, workloads, and devices from a single console
Drive business value with measurable cybersecurity outcomes
See more, act faster
Evolve your security to mitigate threats quickly and effectively
Ensure code runs only as intended
Gain visibility and control with security designed for cloud environments
ICS/OT Security for the electric utility
ICS/OT Security for the oil and gas utility industry
Protecting your factory environments – from traditional devices to state-of-the-art infrastructures
Protect patient data, devices, and networks while meeting regulations
Strengthening NHS cyber-resilience to improve IT performance, system reliability, and patient care
Alleviate the financial and compliance pressures of cybersecurity while proactively countering your adversaries
Protect essential public services and citizen data with streamlined, cost effective solutions for local government
AI-powered cyber risk management to safeguard customer data, build trust and simplify compliance
Stop threats with easy-to-use solutions designed for your growing business
Bridge threat protection and cyber risk management
Your generative AI cybersecurity assistant
Stop breaches before they happen
Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform
Defend the endpoint through every stage of an attack
Optimized prevention, detection, and response for endpoints, servers, and cloud workloads
On-premises and cloud protection against malware, malicious applications, and other mobile threats
Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform
The most trusted cloud security platform for developers, security teams, and businesses
Simplify security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection
Protect application workflow and cloud storage against advanced threats
Proactively discover, assess, and reduce cyber risk
Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform
Expand the power of XDR with network detection and response
Protect against known, unknown, and undisclosed vulnerabilities in your network
Detect and respond to targeted attacks moving inbound, outbound, and laterally
Redefine trust and secure digital transformation with continuous risk assessments
Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform
Stop phishing, malware, ransomware, fraud, and targeted attacks from infiltrating your enterprise
Stop phishing, ransomware, and targeted attacks on any email service including Microsoft 365 and Google Workspace
See threats coming from miles away
Learn about solutions for ICS / OT security.
Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform
End-to-end identity security from identity posture management to detection and response
Prevent, detect, respond and protect without compromising data sovereignty
Augment security teams with 24/7/365 managed detection, response, and support
Augment threat detection with expertly managed detection and response (MDR) for email, endpoints, servers, cloud workloads, and networks
Our trusted experts are on call whether you're experiencing a breach or looking to proactively improve your IR plans
Stop breaches with the best response and detection technology on the market and reduce clients’ downtime and claim costs
Grow your business and protect your customers with the best-in-class complete, multilayered security
Stand out to customers with competency endorsements that showcase your expertise
Deliver modern security operations services with our industry-leading XDR
Partner with a leading expert in cybersecurity, leverage proven solutions designed for MSPs
We work with the best to help you optimize performance and value
Discover resources designed to accelerate your business’s growth and enhance your capabilities as a Trend Micro partner
Accelerate your learning with Trend Campus, an easy-to-use education platform that offers personalized technical guidance
Access collaborative services designed to help you showcase the value of Trend Vision One™ and grow your business
Locate a partner from whom you can purchase Trend Micro solutions
See how Trend outperforms the competition
Crowdstrike provides effective cybersecurity through its cloud-native platform, but its pricing may stretch budgets, especially for organizations seeking cost-effective scalability through a true single platform
Microsoft offers a foundational layer of protection, yet it often requires supplemental solutions to fully address customers' security problems
Palo Alto Networks delivers advanced cybersecurity solutions, but navigating its comprehensive suite can be complex and unlocking all capabilities requires significant investment
Content has been added to your Folio
Risk Management
Pwn2Own, one of the most anticipated cybersecurity competitions, is back—and this time, it's moving to a new home. After several exciting years in Toronto, the contest is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The global tradition of Pwn2Own has seen it move from cities like Amsterdam, Tokyo, and Austin, and now, we're excited to bring the action to Cork.
By: Dustin Childs Read time: ( words)
Save to Folio
Pwn2Own, one of the most anticipated cybersecurity competitions, is back—and this time, it’s moving to a new home. After several exciting years in Toronto, the contest is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The global tradition of Pwn2Own has seen it move from cities like Amsterdam, Tokyo, and Austin, and now, we’re excited to bring the action to Cork.
This year’s event is set to deliver more than just ground-breaking security research. Our awards ceremony and after-party will take place in the historic Cork City Gaol, offering a spooky and unforgettable backdrop for the closing festivities. But that’s just the tip of the iceberg—let’s dive into what makes Pwn2Own 2024 a must-watch event.
Fresh Categories and Big Payouts
We’re thrilled to announce that Meta is joining as a sponsor, bringing the new Messenger App category into the competition. WhatsApp will be in scope with both 0-click and 1-click exploits, with a prize of up to $300,000 for a successful 0-click vulnerability. Researchers have a golden opportunity to explore this globally used app, and we can’t wait to see what comes out of this challenge.
But that’s not all! Pwn2Own Ireland will also feature AI-enabled devices for the first time. Devices like Samsung and Google phones with AI features, Synology NAS systems with AI-driven photo albums, and AI-enhanced cameras will be part of the target lineup. Although there are no extra bonuses for AI-specific exploits, it will be fascinating to see if AI helps or hinders exploit attempts.
The Return of Fan Favourites
Back by popular demand is the SOHO Smashup category, where contestants will first exploit a router’s external interface, then pivot to another connected device within 30 minutes. The creativity and skill displayed in this category have always been a highlight, and this year promises to be no different.
We’re also bringing back the Surveillance Systems category, along with wired and wireless cameras, home automation hubs, smart speakers, and printers. Last year, we saw incredible exploits, including researchers taking control of a camera simply by showing it a QR code. This year, we expect even more surprises!
Registration for Pwn2Own Ireland 2024 closes on October 17th at 5:00 p.m. Irish Standard Time. No late entries will be accepted, so make sure you secure your spot. If you have any questions, feel free to contact us at pwn2own@trendmicro.com.
As always, the event will be live-tweeted and blogged, with real-time updates throughout the competition. Follow the latest developments using the hashtag #P2OIreland and be sure to follow @thezdi and @trendmicro on Twitter.
With cutting-edge research, high-stakes prizes, and a bit of Irish luck, Pwn2Own 2024 promises to be an unforgettable event. We look forward to seeing the latest in vulnerability research and crowning the next Master of Pwn!
Dustin Childs
Head of Threat Awareness for Trend Micro’s Zero Day Initiative
Select a country / region
Experience our unified platform for free
