Trend Micro, a cybersecurity leader, has discovered 60 percent of vulnerabilities worldwide in 2023, indicating its dominance in the cybersecurity business, according to a recent report by Omdia.
Trend’s Zero Day Initiative (ZDI), with its proactive and thorough approach to vulnerability disclosures, combined with our deep expertise, enables us to protect our customers faster than ever before, Kevin Simzer, COO at Trend Micro, said.
This leadership in cyber security business mitigates risks and translates into cost savings for enterprises, reinforcing commitment of Trend Micro to enhancing global cybersecurity and supporting business continuity, Kevin Simzer said.
The Omdia report has also revealed the position of cyber security solution providers such as Cisco, Google, Microsoft, Fortinet, McAfee, Check Point, among others.
Omdia’s analysis of nine global vendors / organizations revealed that Trend Micro disclosed over 2.5 times more vulnerabilities than its nearest competitor. The ZDI has maintained its position as the world’s largest vendor-agnostic bug bounty program for 16 consecutive years, leading the market since the first analysis in 2007.
The report highlights the integration of ZDI’s research into the Trend Vision One platform, which includes advanced capabilities such as XDR, attack surface management (ASM), and virtual patching. These features enable Trend Micro to offer superior and quicker protection to its customers, including network IPS protection immediately upon vulnerability discovery and disclosure to the vendor.
In 2023, Omdia classified 10 percent of all disclosed threats as critical, 69 percent as high severity, 21 percent as medium, and less than 1 percent as low. These findings underscore the program’s success in identifying and addressing significant vulnerabilities.
The average cost of a data breach due to an unpatched vulnerability reached an all-time high of $4.45 million in 2023, highlighting the substantial financial impact of security incidents. Contributing factors include detection and escalation, notification, post-breach response, and lost business.
Baburajan Kizhakedath